<?xml version="1.0" encoding="UTF-8"?>

<xml>

<chapter title="1. About information security"><section title="1.1. Understanding and using the NZISM"><subsection title="Objective"><paragraph
    title="1.1.1."


><![CDATA[<p>The New Zealand Information Security Manual details processes and controls essential for the protection of all New Zealand Government information and systems. Controls and processes representing good practice are also provided to enhance the baseline controls. Baseline controls are minimum acceptable levels of controls and are often described as “systems hygiene”.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="1.1.2."


><![CDATA[<p>The NZISM is intended for use by New Zealand Government departments, agencies and organisations. Crown entities, local government and private sector organisations are also encouraged to use the NZISM.</p>]]></paragraph>
<paragraph
    title="1.1.3."


><![CDATA[<p>This section provides information on how to interpret the content and the layout of content within the NZISM.</p>]]></paragraph>
<paragraph
    title="1.1.4."


><![CDATA[<p>Information that is Official Information or protectively marked UNCLASSIFIED, IN-CONFIDENCE, SENSITIVE or RESTRICTED is subject to a single set of controls in this NZISM.  These are essential or minimum acceptable levels of controls (baseline controls) and have been consolidated into a single set for simplicity, effectiveness and efficiency.  </p>]]></paragraph>
<paragraph
    title="1.1.5."


><![CDATA[<p>All baseline controls will apply to all government systems, related services and information. In addition, information classified CONFIDENTIAL, SECRET or TOP SECRET has further controls specified in this NZISM.</p>]]></paragraph>
<paragraph
    title="1.1.6."


><![CDATA[<p>Where the category “All Classifications” is used to define the scope of rationale and controls in the NZISM, it includes any information that is Official Information, UNCLASSIFIED, IN-CONFIDENCE, SENSITIVE, RESTRICTED, CONFIDENTIAL, SECRET, TOP SECRET or any endorsements, releasability markings or other qualifications appended to these categories and classifications.</p>]]></paragraph>
</block>
<block title="The purpose of this Manual"><paragraph
    title="1.1.7."


><![CDATA[<p>The purpose of the NZISM is to provide a set of essential or baseline controls and additional good and recommended practice controls for use by government agencies. &nbsp;The use or non-use of good practice controls MUST be based on an agency’s assessment and determination of residual risk related to information security.</p>]]></paragraph>
<paragraph
    title="1.1.8."


><![CDATA[<p>The NZISM is updated regularly. &nbsp;It is therefore important that agencies ensure that they are using the latest version of the NZISM.</p>]]></paragraph>
</block>
<block title="Target audience"><paragraph
    title="1.1.9."


><![CDATA[<p>The target audience for the NZISM is primarily security personnel and practitioners within, or contracted to, an agency. &nbsp;This includes, but is not limited to:</p>
<ul>
<li>security executives;</li>
<li>security and information assurance practitioners;</li>
<li>IT Security Managers;&nbsp;</li>
<li>Departmental Security Officers; and</li>
<li>service providers.</li>
</ul>]]></paragraph>
</block>
<block title="Structure of this Manual"><paragraph
    title="1.1.10."


><![CDATA[<p>The NZISM seeks to present information in a consistent manner. &nbsp;There are a number of headings within each section, described below.</p>
<ul>
<li>Objective – the desired outcome when controls within a section are implemented.</li>
<li>Context – the scope, applicability and any exceptions for a section.</li>
<li>References – references to external sources of information that can assist in the interpretation or implementation of controls.</li>
<li>Rationale &amp; Controls&nbsp;
<ul>
<li>Rationale – the reasoning behind controls and compliance requirements.</li>
<li>Control – risk reduction measures with associated compliance requirements.</li>
</ul>
</li>
</ul>]]></paragraph>
<paragraph
    title="1.1.11."


><![CDATA[<p>This section provides a summary of key structural elements of the NZISM. &nbsp;The detail of processes and controls is provided in subsequent chapters. &nbsp;It is important that reference is made to the detailed processes and controls in order to fully understand key risks and appropriate mitigations.</p>]]></paragraph>
</block>
<block title="The New Zealand Government Security Classification System"><paragraph
    title="1.1.12."


><![CDATA[<p>The requirements for classification of government documents and information are based on the <strong>Cabinet Committee Minute EXG (00) M 20/7</strong> and <strong>CAB (00) M42/4G(4)</strong>. &nbsp;The Protective Security Requirements (PSR) <a title="PSR Mandatory requirements - Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">INFOSEC2</a> require agencies to use the <a title="NZ Government Security Classification System" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/security-classification-system-and-handling-requirements/" target="_blank">NZ Government Security Classification System</a> and the NZISM for the classification, protective marking and handling of information assets. &nbsp;For more information on classification, protective marking and handling instructions, refer to the <a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz" target="_blank">Protective Security Requirements</a>, <a title="NZ Government Security Classification System" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/security-classification-system-and-handling-requirements/" target="_blank">NZ Government Security Classification System</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Key definitions"> <block title="Accreditation Authority"><paragraph
    title="1.1.13."


><![CDATA[<p>The Agency Head is generally the Accreditation Authority for that agency for all systems and related services up to and including those classified RESTRICTED. &nbsp;See also <a title="Roles &amp; responsibilities" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12255">Chapter 3 – Roles and Responsibilities</a> and <a title="Accreditation framework" href="http://nzism.gcsb.govt.nz/ism-document#Section-12591">Section 4.4 – Accreditation Framework</a>.</p>]]></paragraph>
<paragraph
    title="1.1.14."


><![CDATA[<p>Agency heads may choose to delegate this authority to a member of the agency’s executive.  The Agency Head remains accountable for ICT risks accepted and the information security of their agency. </p>]]></paragraph>
<paragraph
    title="1.1.15."


><![CDATA[<p>In all cases the Accreditation Authority will be at least a senior agency executive who has an appropriate level of understanding of the security risks they are accepting on behalf of the agency.</p>]]></paragraph>
<paragraph
    title="1.1.16."


><![CDATA[<p>For multi-national and multi-agency systems the Accreditation Authority is determined by a formal agreement between the parties involved. &nbsp;Consultation with the <a title="Government Chief Digital Officer" rel="noopener noreferrer" href="https://www.digital.govt.nz/digital-government/leadership" target="_blank">Office of the Government Chief Digital Officer (GCDO)</a> may also be necessary.</p>]]></paragraph>
<paragraph
    title="1.1.17."


><![CDATA[<p>For agencies with systems that process, store or communicate NZEO or information compartmented for national security reasons, the Director-General of the GCSB is the Accreditation Authority irrespective of the classification level of that information<em>.</em></p>]]></paragraph>
</block>
<block title="Certification and Accreditation Processes"><paragraph
    title="1.1.18."


><![CDATA[<p>Certification and accreditation of information systems is the fundamental governance process by which the risk owners and agency head derive assurance over the design, implementation and management of information systems and related services provided to or by government agencies. &nbsp; This process is described in detail in <a title="System certification &amp; accreditation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 – System Certification and Accreditation</a>.</p>]]></paragraph>
<paragraph
    title="1.1.19."


><![CDATA[<p>Certification and Accreditation are two distinct processes.</p>]]></paragraph>
<paragraph
    title="1.1.20."


><![CDATA[<p>Certification is the formal assertion that an information system and related services comply with minimum standards and agreed design, including any security requirements.</p>]]></paragraph>
<paragraph
    title="1.1.21."


><![CDATA[<p><em>In all cases</em>, certification and the supporting documentation or summary of other evidence will be prepared by, or on behalf of, the host or lead agency.  The certification is then provided to the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="1.1.22."


><![CDATA[<p>Accreditation is the formal authority to operate an information system and related services, and requires the recognition and acceptance of associated risk and residual risks.</p>]]></paragraph>
<paragraph
    title="1.1.23."


><![CDATA[<p>A waiver is NOT an exception (see below).  A waiver is the formal acknowledgement that a particular compliance requirement of the NZISM cannot currently be met.  A waiver is granted by the Accreditation Authority on the basis that full compliance with the NZISM is achieved or compensating controls are implemented within a time specified by the Accreditation Authority.  Waivers are valid in the short term only and full accreditation cannot be granted until all conditions of the waiver have been met.  The need for a waiver may occur when specified controls cannot be practically implemented because of technology, resource or other serious limitations.  It is essential that risk is managed through the application of specified conditions.</p>]]></paragraph>
<paragraph
    title="1.1.24."


><![CDATA[<p>An exception is NOT a waiver (see preceding paragraph).  An exception is the formal acknowledgement that a requirement of the NZISM cannot be met and that a dispensation from the particular compliance requirement is granted by the Accreditation Authority.  This exception is valid for the term of the Accreditation Certificate or some lesser time as determined by the Accreditation Authority.  This may occur, for example, the system is to be in use for a very short time (usually measured in hours), or the requirement cannot be met and there is no viable alternative.  It is essential that any consequential risk is acknowledged and appropriate measures are taken to manage any increased risk.</p>]]></paragraph>
<paragraph
    title="1.1.25."


><![CDATA[<p>The requirements described above are <strong>summarised</strong> in the table below.  Care MUST be taken when using this table as there are numerous endorsements, caveats and releasability instructions in the <a title="Classification system" href="https://protectivesecurity.govt.nz/classification-system/" target="_blank">New Zealand Government Security Classification System</a><a title="NZ Government Security Classification System" href="https://www.protectivesecurity.govt.nz/information-security/security-classification-system-and-handling-requirements/" target="_blank"></a> that may change where the authority for accreditation lies.</p><table class="table-main">
<tbody>
<tr>
<td>Information Classification</td>
<td>MUST and MUST NOT controls</td>
<td>SHOULD and SHOULD NOT controls</td>
<td>Accreditation Authority</td>
</tr>
<tr>
<td>
<p><strong>Information classified <span class="box-text-black">RESTRICTED</span> and below,</strong></p>
<p> </p>
<p><strong> including <span class="table-main">UNCLASSIFIED</span> </strong></p>
<p><strong>and Official Information </strong></p>
</td>
<td>
<p>Controls are baseline or “systems hygiene” controls and are essential for the secure use of a system or service. Non-use is high risk and mitigation is essential. </p>
<p>If the control <em><strong>cannot</strong></em> be directly implemented, suitable compensating controls MUST be selected to manage identified risks.</p>
<p>The Accreditation Authority <strong><em>may</em></strong> grant a Waiver or Exception from a specific requirement <em><strong>if</strong></em> the level of residual risk is within the agency’s risk appetite.</p>
<p>Some baseline controls cannot be <em><strong>individually</strong></em> risk managed by agencies without jeopardising multi-agency, All-of-Government or international systems and related information.</p>
</td>
<td>
<p>Control represents good and recommended practice. Non-use may be medium to high risk.</p>
<p>Non-use of controls is formally recorded, compensating controls selected as required and residual risk acknowledged to be within the agency’s risk appetite and formally agreed and signed off by the Accreditation Authority.</p>
</td>
<td>Agency Head/Chief Executive/Director General (or formal delegate)</td>
</tr>
<tr>
<td><strong>All systems or services classified <span class="box-text-green">CONFIDENTIAL</span> and above.</strong></td>
<td>
<p>This is a baseline for any use of High Assurance Cryptographic Equipment (HACE) or the establishment of any compartments or the handling of any endorsed information (see below).</p>
<p>The Controls are baseline or “systems hygiene” controls and are essential for the secure use of a system or service. Non-use is high or very high risk and mitigation is essential.</p>
<p>If the control <strong><em>cannot</em></strong> be directly implemented and suitable compensating controls MUST be selected to manage identified risks.</p>
<p>The Accreditation Authority <strong><em>may</em></strong> grant a Waiver or Exception from a specific requirement <em><strong>if</strong></em> the level of residual risk is within the agency’s risk appetite.</p>
<p>Some baseline controls cannot be <strong><em>individually</em></strong> risk managed by agencies without jeopardising multi-agency, All-of-Government or international systems and related information.</p>
</td>
<td>
<p>This is a baseline for any use of High Assurance Cryptographic Equipment (HACE) or the establishment of any compartments or the handling of any endorsed information (See below).</p>
<p>Control represents good and recommended practice. Non-use may be high risk</p>
<p>Non-use of controls is formally recorded, compensating controls selected as required and residual risk formally acknowledged to be within the agency’s risk appetite and agreed and signed off by the Accreditation Authority</p>
</td>
<td>Agency Head/Chief Executive/Director General (or formal delegate)</td>
</tr>
<tr>
<td>
<p><strong>All use of High Assurance Cryptographic Equipment (HACE)</strong></p>
<p><strong>All systems or services with compartmented or caveated information classified <span class="box-text-green">CONFIDENTIAL</span> and above.</strong></p>
</td>
<td>
<p>Accreditation based on work conducted by the agency and authority to operate by the Agency Head.</p>
<p>Controls are baseline or “systems hygiene” controls and are essential for the secure use of a system or service. Non-use is high or very high risk and mitigation is essential.</p>
<p>If the control <strong><em>cannot</em></strong> be directly implemented and suitable compensating controls MUST be selected to manage identified risks.</p>
<p>The Accreditation Authority <strong><em>may</em></strong> grant a Waiver or Exception from a specific requirement <em><strong>if</strong></em> the level of residual risk is within the agency’s risk appetite.</p>
<p>Some baseline controls cannot be <strong><em>individually</em></strong> risk managed by agencies without jeopardising multi-agency, All-of-Government or international systems and related information.</p>
</td>
<td>
<p>Accreditation based on work conducted by the agency and authority to operate by the Agency Head.</p>
<p>Control represents good and recommended practice. Non-use may be high risk</p>
<p>Non-use of controls is formally recorded, compensating controls selected as required and residual risk formally acknowledged to be within the agency’s risk appetite and agreed and signed off by the Accreditation Authority.</p>
</td>
<td>Director GCSB (or formal delegate)</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="“All Classifications” category"><paragraph
    title="1.1.26."


><![CDATA[<p>The “All Classifications” category is used to describe the applicability of controls for any information that is Official Information or protectively marked UNCLASSIFIED, IN-CONFIDENCE, SENSITIVE, RESTRICTED, CONFIDENTIAL, SECRET or TOP SECRET, including any caveats or releasability endorsements associated with the respective document classification.</p>]]></paragraph>
</block>
<block title="Compartmented Information"><paragraph
    title="1.1.27."


><![CDATA[<p>Compartmented information is information requiring special protection through separation or is “compartmented” from other information stored and processed by the agency.</p>]]></paragraph>
</block>
<block title="Concept of Operations (ConOp) Document"><paragraph
    title="1.1.28."


><![CDATA[<p>Systems, operations, campaigns and other organisational activities are generally developed from an executive directive or organisational strategy.  The ConOp is a document describing the characteristics of a proposed operation, process or system and how they may be employed to achieve particular objectives.  It is used to communicate the essential features to all stakeholders and obtain agreement on objectives and methods.  ConOps should be written in a non-technical language to facilitate agreement on understanding and knowledge and provide clarity of purpose.  ConOp is a term widely used in the military, operational government agencies and other defence, military support and aerospace enterprises.</p>]]></paragraph>
</block>
<block title="Information"><paragraph
    title="1.1.29."


><![CDATA[<p>The New Zealand Government requires information important to its functions, resources and classified equipment to be adequately safeguarded to protect public and national interests and to preserve personal privacy.  Information is defined as any communication or representation of knowledge such as facts, data, and opinions in any medium or form, electronic as well as physical.  Information includes any text, numerical, graphic, cartographic, narrative, or any audio or visual representation.</p>]]></paragraph>
</block>
<block title="Information Asset"><paragraph
    title="1.1.30."


><![CDATA[<p>An information asset is any information or related equipment that has value to an agency or organisation.  This includes equipment, facilities, patents, intellectual property, software and hardware.  Information Assets also include services, information, and people, and characteristics such as reputation, brand, image, skills, capability and knowledge.</p>]]></paragraph>
</block>
<block title="Information Assurance (IA)"><paragraph
    title="1.1.31."


><![CDATA[<p>Confidence in the governance of information systems and that effective measures are implemented to manage, protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.</p>]]></paragraph>
</block>
<block title="Information Security"><paragraph
    title="1.1.32."


><![CDATA[<p>Although sometimes described as cyber security, Information security is considered a higher level of abstraction than cyber security relating to the protection of information regardless of its form (electronic or physical).  The accepted definition of information security within government is: “measures relating to the confidentiality, availability and integrity of information”.</p>]]></paragraph>
<paragraph
    title="1.1.33."


><![CDATA[<p>A number of specialised security areas contribute to information security within government; these include: physical security, personnel security, communications security and information and communications technology (ICT) security along with their associated governance and assurance measures.</p>]]></paragraph>
</block>
<block title="Information Systems"><paragraph
    title="1.1.34."


><![CDATA[<p>The resources and assets for the collection, storage, processing, maintenance, use, sharing, dissemination, disposition, display, and transmission of information. This includes necessary and related services provided as part of the information system, for example; Telecommunication or Cloud Services.</p>]]></paragraph>
</block>
<block title="Information Systems Governance"><paragraph
    title="1.1.35."


><![CDATA[<p>An integral part of enterprise governance consists of the leadership and organisational structures and processes to ensure that the agency’s information systems support and sustain the agency’s and Government’s strategies and objectives.  Information Systems Governance is the responsibility of the Agency Head and the Executive team.</p>]]></paragraph>
</block>
<block title="Secure Area"><paragraph
    title="1.1.36."


><![CDATA[<p>In the context of the NZISM a secure area is defined as any area, room, group of rooms, building or installation that processes, stores or communicates information classified CONFIDENTIAL, SECRET, TOP SECRET or any compartmented or caveated information at these classifications. &nbsp;A secure area may include a SCIF (see below). &nbsp;The physical security requirements for such areas are specified in the <a title="PSR Policy Framework — PHYSEC" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR Policy Framework - PHYSEC.</a></p>]]></paragraph>
</block>
<block title="Security Posture"><paragraph
    title="1.1.37."


><![CDATA[<p>The Security Posture of an organisation describes and encapsulates the security status and overall approach to identification and management of the security of an organisation’s networks, information, systems, processes and personnel.  It includes risk assessment, threat identification, technical and non-technical policies, procedures, controls and resources that safeguard the organisation from internal and external threats.</p>]]></paragraph>
</block>
<block title="Sensitive Compartmented Information Facility (SCIF)"><paragraph
    title="1.1.38."


><![CDATA[<p>Any accredited area, room, or group of rooms, buildings, or installation where Sensitive Compartmented Information (SCI) is stored, used, discussed, processed or communicated.  The Accreditation Authority for a SCIF is the Director GCSB or formal delegate.</p>]]></paragraph>
</block>
<block title="System Owner"><paragraph
    title="1.1.39."


><![CDATA[<p>A System Owner is the <strong>person</strong> within an agency responsible for the information resource and for the maintenance of system accreditation. This may include such outsourced services such as telecommunications or cloud. Their responsibilities are described in more detail in <a title="System Owners" href="http://nzism.gcsb.govt.nz/ism-document#Section-12415">Section 3.4 – System Owners</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Interpretation of controls"> <block title="Controls language"><paragraph
    title="1.1.40."


><![CDATA[<p>The definition of controls in this manual is based on language as defined by the Internet Engineering Task Force (IETF)’s Request For Comment (RFC) 2119 to indicate differing degrees of compliance.</p>]]></paragraph>
</block>
<block title="Applicability of controls"><paragraph
    title="1.1.41."


><![CDATA[<p>Whilst the NZISM provides controls for specific technologies, not all systems will use all of these technologies. &nbsp;When a system is developed, the agency will determine the appropriate scope of the system and which controls within this manual are applicable.</p>]]></paragraph>
<paragraph
    title="1.1.42."


><![CDATA[<p>If a control within the NZISM is outside the scope of the system then non-compliance processes <em>do not apply</em>. &nbsp;However, if a control is within the scope of the system yet the agency chooses <em>not to implement</em> the control, then they are required to follow the non-compliance procedures as outlined below in order to provide appropriate governance and assurance.</p>]]></paragraph>
<paragraph
    title="1.1.43."


><![CDATA[<p>The procedures and controls described in the NZISM are designed, not only to counter or prevent known common attacks, but also to protect from emerging threats.</p>]]></paragraph>
</block>
<block title="Identification and Selection of controls"><paragraph
    title="1.1.44."


><![CDATA[<p>In all cases controls have been selected as the most effective means of mitigating identified risks and threats.  Each control has been carefully researched and risk assessed against a wide range of factors, including useability, threat levels, likelihood, rapid technology changes, sustainability, effectiveness and cost.  </p>]]></paragraph>
</block>
<block title="Controls with a “MUST” or “MUST NOT” requirement"><paragraph
    title="1.1.45."


><![CDATA[<p>A control with a “MUST” or “MUST NOT” requirement indicates that use, or non-use, of the control is essential in order to effectively manage the identified risk, unless the control is demonstrably not relevant to the respective system.  These controls are baseline controls, sometimes described as systems hygiene controls.</p>]]></paragraph>
<paragraph
    title="1.1.46."


><![CDATA[<p>The rationale for non-use of baseline controls MUST be clearly demonstrated to the Accreditation Authority as part of the certification process, before approval for exceptions is granted.  MUST and MUST NOT controls take precedence over SHOULD and SHOULD NOT controls.</p>]]></paragraph>
</block>
<block title="Controls with a “SHOULD” or “SHOULD NOT” requirement"><paragraph
    title="1.1.47."


><![CDATA[<p>A control with a “SHOULD” or “SHOULD NOT” requirement indicates that use, or non-use, of the control is considered good and recommended practice. Valid reasons for not implementing a control could exist, including:</p><ol style="list-style-type: lower-alpha;">
<li>A control is not relevant in the agency;</li>
<li>A system or ICT capability does not exist in the agency; or </li>
<li>A process or control(s) of equal strength has been substituted.</li>
</ol>]]></paragraph>
<paragraph
    title="1.1.48."


><![CDATA[<p>While some cases may require a simple record of fact, agencies must recognise that non-use of any control, without due consideration, may increase residual risk for the agency. This residual risk needs to be agreed and acknowledged by the Accreditation Authority. In particular an agency should pose the following questions:</p><ol style="list-style-type: lower-alpha;">
<li>Is the agency willing to accept additional risk?</li>
<li>Have any implications for All-of-Government systems been considered?</li>
<li>If, so, what is the justification?</li>
</ol>]]></paragraph>
<paragraph
    title="1.1.49."


><![CDATA[<p>A formal auditable record of this consideration and decision is required as part of the IA governance and assurance processes within an agency.</p>]]></paragraph>
</block>
<block title="Non-compliance"><paragraph
    title="1.1.50."


><![CDATA[<p>Non-compliance is a risk to the agency and may also pose risks to other agencies and organisations.  Good governance requires these risks are clearly articulated, measures are implemented to manage and reduce the identified risks to acceptable levels, that the Accreditation Authority is fully briefed, acknowledges any residual and additional risk and approves the measures to reduce risk. </p>]]></paragraph>
<paragraph
    title="1.1.51."


><![CDATA[<p>In some circumstances, full compliance with the NZISM may not be possible, for example some legacy systems may not support the configuration of particular controls. &nbsp;In such circumstances, a risk assessment should clearly identify <em>compensating</em> controls to reduce risks to an acceptable level. &nbsp;Acceptance of risk or residual risk, without due consideration is NOT adequate or acceptable.</p>]]></paragraph>
<paragraph
    title="1.1.52."


><![CDATA[<p>It is recognised that agencies may not be able to immediately implement all controls described in the NZISM due to resource, budgetary, capability or other constraints. &nbsp;Good practice risk management processes will acknowledge this and prepare a timeline and process by which the agency can implement all appropriate controls described in the NZISM. &nbsp;</p>]]></paragraph>
<paragraph
    title="1.1.53."


><![CDATA[<p>Simply acknowledging risks and not providing the means to implement controls <em>does not</em> represent effective risk management.</p>]]></paragraph>
<paragraph
    title="1.1.54."


><![CDATA[<p>Where multiple controls are not relevant or an agency chooses not to implement multiple controls within the NZISM the system owner may choose to logically group and consolidate controls when following the processes for non-compliance.</p>]]></paragraph>
</block>
<block title="Rationale Statements"><paragraph
    title="1.1.55."


><![CDATA[<p>A short rationale is provided with each group of controls.  It is intended that this rationale is read in conjunction with the relevant controls in order to provide context and guidance.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Risk management"> <block title="Risk Management Standards"><paragraph
    title="1.1.56."


><![CDATA[<p>For security risk management to be of true value to an agency it MUST relate to the specific circumstances of an agency and its systems, as well as being based on an industry recognised approach or risk management guidelines. For example, guidelines and standards produced by <a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">Standards New Zealand</a> and the <a title="International Organization for Standardization" rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">International Organization for Standardization (ISO).</a></p>]]></paragraph>
<paragraph
    title="1.1.57."


><![CDATA[<p>The <a title="International Organization for Standardization" rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">International Organization for Standardization</a> has published an international risk management standard, including principles and guidelines on implementation, outlined in <a title="ISO 31000:2018 - Risk Management Guidelines" rel="noopener noreferrer" href="https://www.iso.org/standard/65694.html" target="_blank">ISO 31000:2018 - Risk Management - Guidelines</a>. &nbsp;Refer to the tables below for additional reference materials.</p>]]></paragraph>
</block>
<block title="The NZISM and Risk Management "><paragraph
    title="1.1.58."


><![CDATA[<p>The NZISM encapsulates good and recommended best-practice in managing technology risks and mitigating or minimising threat to New Zealand government information systems.</p>]]></paragraph>
<paragraph
    title="1.1.59."


><![CDATA[<p>Because there is a broad range of systems across government and the age and technological sophistication of these systems varies widely, there is no single governance, assurance, risk or controls model that will accommodate all agencies information and technology security needs. </p>]]></paragraph>
<paragraph
    title="1.1.60."


><![CDATA[<p>The NZISM contains guidance on governance and assurance processes and technological controls based on comprehensive risk and threat assessments, research and environmental monitoring.</p>]]></paragraph>
<paragraph
    title="1.1.61."


><![CDATA[<p>The NZISM encourages agencies to take a similar risk-based approach to information security.  This approach enables the flexibility to allow agencies to conduct their business and maintain resilience in the face of a changing threat environment, while recognising the essential requirements and guidance provided by the NZISM.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="1.1.62."


><![CDATA[<p><strong>Key Standards</strong></p>
<table class="table-main" style="width: 117.103%;">
<tbody>
<tr>
<td style="width: 13.3582%;"><strong>Reference</strong></td>
<td style="width: 16.3746%;"><strong>Title</strong></td>
<td style="text-align: center; width: 11.491%;"><strong>Publisher</strong></td>
<td style="width: 58.7475%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 13.3582%;">
<p><strong>NZISM</strong></p>
<p>&nbsp;</p>
</td>
<td style="width: 16.3746%;"><strong>New Zealand Information Security Manual</strong></td>
<td style="text-align: center; width: 11.491%;">GCSB</td>
<td style="width: 58.7475%;">
<p><a class="ss-broken" rel="noopener noreferrer" href="https://nzism.gcsb.govt.nz/" target="_blank">https://nzism.gcsb.govt.nz/</a>&nbsp;&nbsp;</p>
</td>
</tr>
<tr>
<td style="width: 13.3582%;"><strong>PSR</strong></td>
<td style="width: 16.3746%;"><strong>Protective Security Requirements&nbsp;</strong></td>
<td style="text-align: center; width: 11.491%;">NZSIS</td>
<td style="width: 58.7475%;"><a title="Link to protective security" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz" target="_blank">https://protectivesecurity.govt.nz</a></td>
</tr>
<tr>
<td style="width: 13.3582%;"><strong><strong>ISO/IEC 27000:2018&nbsp;</strong></strong></td>
<td style="width: 16.3746%;"><strong>Information Technology – Security Techniques – Information Security Management Systems – Overview and Vocabulary (fifth edition)</strong></td>
<td style="text-align: center; width: 11.491%;">
<p>ISO</p>
<p>&nbsp;</p>
</td>
<td style="width: 58.7475%;">
<p><a title="ISO/IEC 27000:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/73906.html" target="_blank">https://www.iso.org/standard/73906.html</a></p>
</td>
</tr>
<tr>
<td style="width: 13.3582%;"><strong><strong>CNSS Instruction No. 4009 6 April 2015</strong></strong></td>
<td style="width: 16.3746%;"><strong>&nbsp;National Information Assurance (IA) Glossary, (US)&nbsp;</strong></td>
<td style="text-align: center; width: 11.491%;">Committee on National Security Systems (CNSS)</td>
<td style="width: 58.7475%;">
<p><a title="CNSSI 4009 PDF" rel="noopener noreferrer" href="https://rmf.org/wp-content/uploads/2017/10/CNSSI-4009.pdf" target="_blank">https://rmf.org/wp-content/uploads/2017/10/CNSSI-4009.pdf [PDF, 1.04 MB]</a></p>
<p>&nbsp;</p>
</td>
</tr>
<tr>
<td style="width: 13.3582%;"><strong><strong>NISTIR 7298 Revision 3<strong>, July 2019</strong></strong></strong></td>
<td style="width: 16.3746%;"><strong>&nbsp;Glossary of Key Information Security Terms</strong></td>
<td style="text-align: center; width: 11.491%;">NIST</td>
<td style="width: 58.7475%;">
<p><a title="NIST 7298 revision 3 FINAL" rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/nistir/7298/rev-3/final" target="_blank">https://csrc.nist.gov/publications/detail/nistir/7298/rev-3/final</a><a title="Link to nvlpubs nist pdf" rel="noopener noreferrer" href="http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf" target="_blank">&nbsp;</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="1.1.63."


><![CDATA[<p><strong>Additional Guidance</strong></p>
<table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher&nbsp;</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td colspan="4">
<p><strong><strong>Approved Products</strong></strong></p>
</td>
</tr>
<tr>
<td><strong>I</strong>SO/IEC 15408-1:2009&nbsp;</td>
<td>
<p class="no-uppercase">Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model</p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="ISO/IEC 15408-1:2009" rel="noopener noreferrer" href="https://www.iso.org/standard/50341.html" target="_blank">https://www.iso.org/standard/50341.html</a><a title="Link to ISO" rel="noopener noreferrer" href="http://www.iso.org/" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>ISO/IEC 15408-2:2008</td>
<td>
<p>Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components</p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 15408-2:2008" rel="noopener noreferrer" href="https://www.iso.org/standard/46414.html" target="_blank">https://www.iso.org/standard/46414.html</a></td>
</tr>
<tr>
<td>ISO/IEC 15408-3:2008</td>
<td>
<p>Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components</p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 15408-3:2008" rel="noopener noreferrer" href="https://www.iso.org/standard/46413.html" target="_blank">https://www.iso.org/standard/46413.html</a></td>
</tr>
<tr>
<td>&nbsp;&nbsp;</td>
<td>AISEP Evaluated Products List</td>
<td style="text-align: center;">
<p>ASD</p>
</td>
<td>
<p><a title="Evaluated products guidance" rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism/cyber-security-guidelines/guidelines-evaluated-products" target="_blank">https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism/cyber-security-guidelines/guidelines-evaluated-products&nbsp;</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Other Evaluated Products Lists</td>
<td style="text-align: center;">
<p><span>NSA</span></p>
<p><span><span>NCSC UK</span></span></p>
<p><span><span><span>CSEC</span></span></span></p>
<p><span><span><span><span>Common Criteria</span></span></span></span></p>
</td>
<td>
<p><a title="Link to https://nsa.gov  " rel="noopener noreferrer" href="https://nsa.gov/" target="_blank">https://nsa.gov</a></p>
<p><a title="Link to NCSC UK" rel="noopener noreferrer" href="https://ncsc.gov.uk/" target="_blank">https://ncsc.gov.uk/</a></p>
<p><a title="link to cse" rel="noopener noreferrer" href="https://cse-cst.gc.ca/" target="_blank">https://cse-cst.gc.ca</a></p>
<p><a title="Certified Products List" rel="noopener noreferrer" href="https://commoncriteriaportal.org/products/" target="_blank">https://commoncriteriaportal.org/products</a></p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Archiving of information</strong></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Public Records Act 2005 (as amended)</td>
<td style="text-align: center;">
<p>Archives New Zealand</p>
<p><span>Parliamentary Counsel Office</span></p>
</td>
<td>
<p><a title="Archives" rel="noopener noreferrer" href="https://archives.govt.nz" target="_blank">https://archives.govt.nz</a>&nbsp;&nbsp;</p>
<p><a title="NZ Legislation" rel="noopener noreferrer" href="https://legislation.govt.nz/" target="_blank">https://legislation.govt.nz/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Archives, Culture, and Heritage Reform Act 2000 (as amended)</td>
<td style="text-align: center;">
<p><span>Parliamentary Counsel Office</span></p>
</td>
<td>
<p><a title="NZ Legislation" rel="noopener noreferrer" href="https://legislation.govt.nz/" target="_blank">https://legislation.govt.nz/</a></p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Business continuity</strong></p>
</td>
</tr>
<tr>
<td>ISO 22301:2019</td>
<td>
<p>Security and Resilience - Business Continuity Management Systems - Requirements</p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="ISO 22301:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/75106.html" target="_blank">https://www.iso.org/standard/75106.html</a></p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Cable security</strong></p>
</td>
</tr>
<tr>
<td>NZCSS 400</td>
<td>New Zealand Communications Security Standard No 400 (Document classified CONFIDENTIAL)</td>
<td style="text-align: center;"><span>GCSB</span></td>
<td>
<p>CONFIDENTIAL document available on application to authorised personnel</p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Cryptographic Security</strong></p>
</td>
</tr>
<tr>
<td>NZCSP 301</td>
<td>New Zealand Communications Security Policy No 301 (Document classified RESTRICTED)</td>
<td style="text-align: center;">GCSB</td>
<td>
<p>RESTRICTED document available on application to authorised personnel</p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Emanation security</strong></p>
</td>
</tr>
<tr>
<td>NZCSS 400</td>
<td>New Zealand Communications Security Standard No 400 (Document classified CONFIDENTIAL)</td>
<td style="text-align: center;">GCSB</td>
<td>
<p>CONDFIDENTIAL document available on application to authorised personnel</p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Information classification</strong></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Protective Security Requirements (New Zealand Government Security Classification System Handling Requirements for protectively marked information and equipment)</td>
<td style="text-align: center;"><span>NZSIS</span></td>
<td>
<p><a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz" target="_blank">https://protectivesecurity.govt.nz</a></p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Information security management&nbsp;</strong></p>
</td>
</tr>
<tr>
<td>ISO/IEC 27001:2013</td>
<td>
<p>Information technology — Security techniques — Information security management systems — Requirements</p>
</td>
<td style="text-align: center;">ISO</td>
<td>
<p><a title="ISO/IEC 27001:2013" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></p>
</td>
</tr>
<tr>
<td>ISO/IEC 27002:2022</td>
<td>
<p>Information security, cybersecurity, and privacy protection — Information security controls</p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td>
<p><a title="ISO/IEC 27002:2022" rel="noopener noreferrer" href="https://www.iso.org/standard/75652.html" target="_blank">https://www.iso.org/standard/75652.html</a></p>
</td>
</tr>
<tr>
<td>ISO/IEC 270xx series</td>
<td>Other standards and guidelines in the ISO/IEC 270xx series, as appropriate</td>
<td style="text-align: center;"><span>ISO</span></td>
<td>
<p><a title="ISO/IEC 270xx series" rel="noopener noreferrer" href="https://www.iso.org/standards.html" target="_blank">https://www.iso.org/standards.html</a>&nbsp;</p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Key management – commercial grade</strong></p>
</td>
</tr>
<tr>
<td>ISO/IEC 11770</td>
<td>ISO/IEC 11770 Parts 1-6: Information Technology – Security Techniques – Key Management</td>
<td style="text-align: center;"><span><span>IS0</span></span></td>
<td>
<p><a title="ISO/IEC 11770 Parts 1-6" rel="noopener noreferrer" href="https://www.iso.org/standards.html" target="_blank">https://www.iso.org/standards.html</a>&nbsp;</p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Management of electronic records that may be used as evidence</strong></p>
</td>
</tr>
<tr>
<td>ISO/IEC 27037:2012<strong>&nbsp;</strong></td>
<td>
<p>Information Technology – Security Techniques - Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence</p>
</td>
<td style="text-align: center;">
<p><span><span>ISO</span></span></p>
</td>
<td>
<p><a title="ISO/IEC 27037:2012" rel="noopener noreferrer" href="https://www.iso.org/standard/44381.html" target="_blank">https://www.iso.org/standard/44381.html</a></p>
</td>
</tr>
<tr>
<td colspan="4"><strong><strong>Personnel security</strong></strong></td>
</tr>
<tr>
<td>PSR</td>
<td>Protective Security Requirements</td>
<td style="text-align: center;">NZSIS</td>
<td>
<p><a title="PSR - Personnel Security" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/personnel-security/" target="_blank">https://protectivesecurity.govt.nz/personnel-security/</a></p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Physical security</strong></p>
</td>
</tr>
<tr>
<td>PSR</td>
<td>Protective Security Requirements</td>
<td style="text-align: center;"><span>NZSIS</span></td>
<td>
<p><a title="PSR - Physical Security" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/physical-security/" target="_blank">https://protectivesecurity.govt.nz/physical-security/</a></p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Privacy requirements</strong></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Privacy Act 2020</td>
<td style="text-align: center;">
<p>Office of The Privacy Commissioner</p>
<p>Parliamentary Counsel Office</p>
</td>
<td>
<p><a title="Office of the privacy commissioner" rel="noopener noreferrer" href="https://privacy.org.nz" target="_blank">https://privacy.org.nz</a></p>
<p>&nbsp;</p>
<p><span><a title="NZ Legislation" rel="noopener noreferrer" href="https://legislation.govt.nz/" target="_blank">https://legislation.govt.nz/</a></span></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Privacy advice, guidance and tools to help government agencies improve their privacy capability and maturity.</td>
<td style="text-align: center;">
<p><span>GCPO</span></p>
</td>
<td>
<p><a title="Privacy" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/privacy-security-and-risk/privacy/" target="_blank">https://digital.govt.nz/standards-and-guidance/privacy-security-and-risk/privacy/</a></p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Risk management</strong></p>
</td>
</tr>
<tr>
<td>ISO 31000:2018</td>
<td>Risk Management -- Guidelines</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="ISO 31000:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/65694.html" target="_blank">https://www.iso.org/standard/65694.html</a></p>
</td>
</tr>
<tr>
<td>ISO/IEC 27005:2018</td>
<td>Information technology — Security techniques — Information security risk management</td>
<td style="text-align: center;"><span><span>ISO</span></span></td>
<td><a title="ISO/IEC 27005:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/75281.html" target="_blank">https://www.iso.org/standard/75281.html</a>&nbsp;</td>
</tr>
<tr>
<td>HB 436:2013</td>
<td>
<p>Risk Management Guidelines (Companion to withdrawn standard ISO 31000:2009)</p>
</td>
<td style="text-align: center;"><span>Standards NZ</span></td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td>ISO Guide 73:2009</td>
<td>Risk Management – Vocabulary – Guidelines for use in Standards</td>
<td style="text-align: center;"><span><span><span>ISO</span></span></span></td>
<td><span><a title="ISO Guide 73:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/44651.html" target="_blank">https://www.iso.org/standard/44651.html</a><span>&nbsp;</span></span></td>
</tr>
<tr>
<td>NIST SP 800-30 rev. 1&nbsp;</td>
<td>Guide for conducting Risk Assessments</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf [PDF, 807 KB]</a></p>
</td>
</tr>
<tr>
<td colspan="4"><strong><strong>Security Management</strong></strong><a title="Link to standards" rel="noopener noreferrer" href="http://www.standards.co.nz" target="_blank"></a></td>
</tr>
<tr>
<td>HB 167:2006</td>
<td>Security Risk Management</td>
<td style="text-align: center;"><span><span>Standards NZ</span></span></td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td colspan="4">
<p><strong>Security And Intelligence Legislation</strong></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Intelligence and Security Act 2017</td>
<td style="text-align: center;">
<p>Parliamentary Counsel Office</p>
</td>
<td>
<p><a title="NZ Legislation" rel="noopener noreferrer" href="https://legislation.govt.nz/" target="_blank">https://legislation.govt.nz/</a><a title="Link to legislation" rel="noopener noreferrer" href="http://www.legislation.govt.nz%20" target="_blank">&nbsp;</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Telecommunications (Interception Capability and Security) Act 2013 (as amended)</td>
<td style="text-align: center;">
<p><span>Parliamentary Counsel Office</span></p>
</td>
<td>
<p><a title="NZ Legislation" rel="noopener noreferrer" href="https://legislation.govt.nz/" target="_blank">https://legislation.govt.nz/</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Non-compliance"><paragraph
    title="1.1.64.R.01."

    tags="Governance"


><![CDATA[<p>Controls for classified systems and information within the NZISM with a “MUST” or “MUST NOT” compliance requirement <span style="text-decoration: underline;"><strong>cannot</strong></span> be effectively <em>individually</em> risk managed by agencies without jeopardising their own, multi-agency or All-of-Government information assurance.</p>]]></paragraph>
<paragraph
    title="1.1.64.R.02."

    tags="Governance"


><![CDATA[<p>Controls within the NZISM with a “SHOULD” and “SHOULD NOT” requirement may be risk managed by agencies. As the individual control security risk for non-compliance is not as high as those controls with a ‘MUST’ or ‘MUST NOT’ requirement, the Accreditation Authority can consider the justification for the acceptance of risks, consider any mitigations then acknowledge and accept any residual risks.</p>]]></paragraph>
<paragraph
    title="1.1.64.R.03."

    tags="Governance"


><![CDATA[<p>Deviations from the procedures and controls in the NZISM may represent risks in themselves. It is important that governance and assurance is supported by evidence, especially where deviations from the procedures and controls in the NZISM are accepted.  In this case a formal approval or signoff by the Accreditation Authority is essential. Ultimately, the Agency Head remains accountable for the ICT risks and information security of their agency.</p>]]></paragraph>
<paragraph
    title="1.1.64.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="127"
><![CDATA[<p>System owners seeking a dispensation for non-compliance with any baseline controls in the NZISM MUST be granted a dispensation by their Accreditation Authority. Where High Assurance Cryptographic Systems (HACS) are implemented, the Accreditation Authority will be the Director-General GCSB or a formal delegate.</p>]]></paragraph>
</block>
<block title="Justification for non-compliance"><paragraph
    title="1.1.65.R.01."

    tags="Governance"


><![CDATA[<p>Without sufficient justification and consideration of security risks by the system owner when seeking a dispensation, the agency head or their authorised delegate will lack the appropriate range of information to the make an informed decision on whether to accept the security risk and grant the dispensation or not.</p>]]></paragraph>
<paragraph
    title="1.1.65.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="131"
><![CDATA[<p>System owners seeking a dispensation for non-compliance with baseline controls MUST complete an agency risk assessment which documents:</p><ul>
<li>the reason(s) for not being able to comply with this manual;</li>
<li>the effect on any of their own, multi-agency or All-of-Government system;</li>
<li>the alternative mitigation measure(s) to be implemented;</li>
<li>The strength and applicability of the alternative mitigations;</li>
<li>an assessment of the residual security risk(s); and</li>
<li>a date by which to review the decision.</li>
</ul>]]></paragraph>
</block>
<block title="Consultation on non-compliance"><paragraph
    title="1.1.66.R.01."

    tags="Governance"


><![CDATA[<p>When an agency stores information on their systems that belongs to a foreign government they have an obligation to inform and seek agreement from that third party when they do not apply all appropriate controls in the NZISM. These third parties will place reliance on the application of controls from the NZISM. If the agency fails to implement all appropriate controls, the third party will be unaware that their information may have been placed at a heightened risk of compromise. As such, the third party is denied the opportunity to consider their own additional risk mitigation measures for their information in light of the agency’s desire to risk manage controls from the NZISM.</p>]]></paragraph>
<paragraph
    title="1.1.66.R.02."

    tags="Governance"


><![CDATA[<p>Most New Zealand Government agencies will store or processes information on their systems that originates from another New Zealand Government Agency. The use of the <a title="NZ Government Security Classification System" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/classification-system/" target="_blank">NZ Government Security Classification System</a>, and implementation of its attendant handling instructions, provides assurance to the originating agency that the information is adequately safeguarded.</p>]]></paragraph>
<paragraph
    title="1.1.66.R.03."

    tags="Governance"


><![CDATA[<p>Additional controls, not described or specified in the NZISM, are welcomed as a means of improving and strengthening security of information systems, provided there are no obvious conflicts or contradictions with the controls in the NZISM. A comprehensive risk assessment of the additional controls is a valuable means of determining the effectiveness of additional controls.</p>]]></paragraph>
<paragraph
    title="1.1.66.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="137"
><![CDATA[<p>If a system processes, stores or communicates classified information from another agency, that agency MUST be consulted before a decision to be non-compliant with the <a title="NZ Government Security Classification System" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/classification-system/" target="_blank">NZ Government Security&nbsp;Classification System</a> is made.</p>]]></paragraph>
<paragraph
    title="1.1.66.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="138"
><![CDATA[<p>If a system processes, stores or communicates classified information from a foreign government, that government MUST be consulted before a decision to be non-compliant with NZISM controls is made.</p>]]></paragraph>
</block>
<block title="All-of-Government Systems"><paragraph
    title="1.1.67.R.01."

    tags="Governance"


><![CDATA[<p>All-of-Government systems, because they are connected to multiple agencies, have the potential to cause significant and widespread disruption should system failures, cyber-attacks or other incidents occur.</p>]]></paragraph>
<paragraph
    title="1.1.67.R.02."

    tags="Governance"


><![CDATA[<p>Any deviation from the baseline controls specified in the NZISM MUST be carefully considered and their implication and risk for all government systems understood and agreed by all interested parties.</p>]]></paragraph>
<paragraph
    title="1.1.67.R.03."

    tags="Governance"


><![CDATA[<p>Interested parties may include the lead agency, the Government CIO and key service providers, such as with cloud services.</p>]]></paragraph>
<paragraph
    title="1.1.67.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="143"
><![CDATA[<p>If a system processes, stores or communicates data and information with multiple agencies or forms part of an All-of-Government system, interested parties MUST be formally consulted before non-compliance with any baseline controls.</p>]]></paragraph>
</block>
<block title="Reviewing non-compliance"><paragraph
    title="1.1.68.R.01."

    tags="Governance"


><![CDATA[<p>As part of the process of providing justification for a dispensation to the Accreditation Authority, an assessment of the degree of compliance, identification of areas of non-compliance and determination of residual security risk is undertaken by the agency or lead agency. This assessment is based on the risk environment at the time the dispensation is sought. As the risk environment will continue to evolve over time it is important that agencies revisit the assessment on an annual basis and update it according to the current risk environment, and if necessary reverse any decisions to grant a dispensation if the security risk is no longer of an acceptable level.</p>]]></paragraph>
<paragraph
    title="1.1.68.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="146"
><![CDATA[<p>Agencies SHOULD review decisions to be non-compliant with any controls at least annually.</p>]]></paragraph>
</block>
<block title="Recording non-compliance"><paragraph
    title="1.1.69.R.01."

    tags="Governance"


><![CDATA[<p>Without appropriate records of decisions to risk manage controls from the NZISM, agencies have no record of the status of information security within their agency. &nbsp;Furthermore, a lack of such records will hinder any governance, compliance or auditing activities that may be conducted. &nbsp;</p>]]></paragraph>
<paragraph
    title="1.1.69.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="151"
><![CDATA[<p>Agencies MUST retain a copy and maintain a record of the supporting risk assessment and decisions to be non-compliant with any baseline controls from the NZISM.</p>]]></paragraph>
<paragraph
    title="1.1.69.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="152"
><![CDATA[<p>Where good and recommended practice controls are NOT implemented, agencies MUST record and formally recognise that non-use of any controls without due consideration may increase residual risk for the agency. This residual risk MUST be agreed and acknowledged by the Accreditation Authority.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="1.2. Applicability, Authority and Compliance"><subsection title="Objective"><paragraph
    title="1.2.1."


><![CDATA[<p>Agencies understand and follow the requirements of the New Zealand Information Security Manual (NZISM). Protection of government information and systems is a core accountability.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="1.2.2."


><![CDATA[<p>The NZISM provides guidance and specific ICT controls that form part of a suite of requirements produced by GCSB relating to information security.  Its role is to promote a consistent approach to information assurance and information security across all New Zealand Government agencies.  It is based on security risk assessments for any information that is processed, stored or communicated by government systems with corresponding risk treatments (control sets) to reduce the level of security risk to an acceptable level.</p>]]></paragraph>
</block>
<block title="Applicability"><paragraph
    title="1.2.3."


><![CDATA[<p>The NZISM applies to information and systems operated by, or on behalf of:</p>
<ul>
<li>New Zealand Government departments, agencies and organisations as listed in:
<ul>
<li>Parts 1 and 2 of Schedule 1 to the Ombudsmen Act 1975 (as amended); and</li>
<li>Schedule 1 to the Official Information Act 1982.</li>
</ul>
</li>
<li>any other organisations that have entered into a formal Agreement with the New Zealand Government to have access to classified information.</li>
</ul>]]></paragraph>
</block>
<block title="Authority"><paragraph
    title="1.2.4."


><![CDATA[<p>The Intelligence and Security Act 2017 provides that one of the functions of the GCSB is to co-operate with, and provide advice and assistance to, any public authority whether in New Zealand or overseas, or to any other entity authorised by the Minister responsible for the GCSB on any matters relating to the protections, security and integrity of communications; and information structures of importance to the Government of New Zealand.  The NZISM is one aspect of the GCSB’s advice and assistance to government agencies on information security. </p>]]></paragraph>
<paragraph
    title="1.2.5."


><![CDATA[<p>This function furthers the objective of the GCSB to contribute to:</p><ul>
<li>The national security of New Zealand; and</li>
<li>The international relations and well-being of New Zealand; and</li>
<li>The economic well-being of New Zealand.</li>
</ul>]]></paragraph>
<paragraph
    title="1.2.6."


><![CDATA[<p>The NZISM is intended to structure and assist the implementation of government policy that requires departments and agencies to protect the privacy, integrity and confidentiality of the information they collect, process, store and archive.  While these overarching requirements are mandatory for departments and agencies, compliance with the NZISM is not required as a matter of law.  The controls in the NZISM could be made binding on departments and agencies, either by legislation, or Cabinet direction.</p>]]></paragraph>
<paragraph
    title="1.2.7."


><![CDATA[<p>The <a title="PSR Framework" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy" target="_blank">Protective Security Requirements Framework</a> provides a specific authority and mandate through a Cabinet Directive <strong>CAB MIN (14) 39/38.</strong></p>]]></paragraph>
<paragraph
    title="1.2.8."


><![CDATA[<p>The NZISM is published by the Government Chief Information Security Officer (GCISO). See 2.1.20 for more information about the GCISO.&nbsp;The GCISO mandate:</p>
<ul>
<li>confirms the GCISO's ability to set information security standards for GCISO mandated agencies;</li>
<li>clarifies the expectation for the GCISO to set assurance activities, and develop assurance methodologies, to meet standards and guidelines;</li>
<li>confirms GCISO access to information security investment information (along with joint System Leads for Data and Digital) from GCISO mandated agencies, including baseline spending; and</li>
<li>confirms the expectation of the GCISO to provide investment advice and guidance to the government on cyber security matters for the public sector.</li>
</ul>]]></paragraph>
<paragraph
    title="1.2.9."


><![CDATA[<p>Agencies mandated under the GCISO authority are those set out as mandated agencies in the Protective Security Requirements.</p>]]></paragraph>
</block>
<block title="Compliance by smaller agencies"><paragraph
    title="1.2.10."


><![CDATA[<p>As smaller agencies may not always have sufficient staffing or budgets to comply with all the requirements of the NZISM, they may choose to consolidate their resources with another larger host agency to undertake a joint approach.</p>]]></paragraph>
<paragraph
    title="1.2.11."


><![CDATA[<p>In such circumstances smaller agencies may choose to either operate on systems fully hosted by another agency using their information security policies and information security resources or share information security resources to jointly develop information security policies and systems for use by both agencies. &nbsp;The requirements within the NZISM can be interpreted as either relating to the host agency or to both agencies, depending on the approach taken.</p>]]></paragraph>
<paragraph
    title="1.2.10."


><![CDATA[<p>In situations where agencies choose a joint approach to compliance, especially when an agency agrees to fully host another agency, the agency heads may choose to seek a memorandum of understanding regarding their information security responsibilities.</p>]]></paragraph>
</block>
<block title="Legislation and other government policy"><paragraph
    title="1.2.13."


><![CDATA[<p>Agencies should rely on their own inquiries. While the NZISM does contain examples of relevant legislation (see table <a title="Reference table" href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-12063">1.1.63</a>), there is no comprehensive consideration of legislation.&nbsp;&nbsp;</p>]]></paragraph>
<paragraph
    title="1.2.14."


><![CDATA[<p>All controls within the NZISM may be used as the basis for internal and external annual audit programmes, any review or investigation by the Controller and Auditor-General or referenced for assurance purposes by the Government Chief Digital Officer (GCDO).</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Compliance"><paragraph
    title="1.2.15.R.01."

    tags="Governance"


><![CDATA[<p>In complying with the latest version of the NZISM agencies awareness of the current threat environment for government systems and the associated acceptable level of security risk is vital. Furthermore, if a system is designed to an out-dated standard, agencies may need additional effort to obtain accreditation for their systems.</p>]]></paragraph>
<paragraph
    title="1.2.15.R.02."

    tags="Governance"


><![CDATA[<p>GCSB continuously monitors technology developments in order to identify business risks, technology risks and security threats. &nbsp;If a significant risk is identified, research may be undertaken, additional controls identified and implementation timeframes specified.</p>]]></paragraph>
<paragraph
    title="1.2.15.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="177"
><![CDATA[<p>Agencies undertaking system design activities for in-house or out-sourced projects MUST use the latest version of the NZISM for information security requirements.</p>]]></paragraph>
<paragraph
    title="1.2.15.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="178"
><![CDATA[<p>When GCSB makes a determination that newly introduced standard, policy or guideline within the NZISM, or any additional information security policy, is of particular importance, agencies MUST comply with any new specified requirements and implementation timeframes.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="2. Information Security Services within Government"><section title="2.1. Overview of Key Agencies"><subsection title="Objective"><paragraph
    title="2.1.1."


><![CDATA[<p>Agency security personnel and senior management are aware of and utilise information security services offered by the New Zealand Government.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="2.1.2."


><![CDATA[<p>This section provides an overview of the GCSB and other government organisations providing information security advice to agencies.</p>
<p>&nbsp;</p>]]></paragraph>
</block>
<block title="Government Communications Security Bureau"><paragraph
    title="2.1.3."


><![CDATA[<p>The Government Communications Security Bureau (GCSB) has two statutory missions: intelligence, and cyber security.</p>
<p>&nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.4."


><![CDATA[<p><strong>Intelligence mission</strong></p>
<p>The GCSB uses signals intelligence collection capabilities to produce intelligence that provides decision advantage to government agencies in conduct of their legislatively mandated functions. The provision of this intelligence is one way that the GCSB contributes to the safety and security of New Zealand and New Zealand’s interests.</p>
<p>&nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.5."


><![CDATA[<p><strong>Cyber security mission</strong></p>
<p>New Zealand needs cyber security to:&nbsp;</p>
<ul>
<li>protect and maintain the digital services that the country relies on; &nbsp;</li>
<li>protect its intellectual property; &nbsp;</li>
<li>maintain its reputation as a stable and secure place to do business; and&nbsp;</li>
<li>ensure that governmental and democratic processes remain free from interference.</li>
</ul>]]></paragraph>
<paragraph
    title="2.1.6."


><![CDATA[<p>The National Cyber Security Centre (NCSC) supports the GCSB’s cyber security mission, including the Director-General’s system leadership and GCISO responsibilities. &nbsp;</p>
<p>&nbsp;</p>]]></paragraph>
</block>
<block title="National Cyber Security Centre"><paragraph
    title="2.1.7."


><![CDATA[<p>As the Government’s lead operational cyber security agency, the NCSC performs a range of functions, offers services, and supports New Zealand government agencies undertake their cyber security responsibilities. &nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.8."


><![CDATA[<p>The NCSC responds to cyber incidents that potentially affect New Zealand’s security or economic wellbeing. It provides advanced cyber security services and advice to government agencies and nationally significant organisations to help defend them against cyber threats.&nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.9."


><![CDATA[<p><span>On</span> 31 August 2023 CERT NZ was transferred to the NCSC to create a single operational cyber security agency.</p>]]></paragraph>
<paragraph
    title="2.1.10."


><![CDATA[<p><span>The combined agency engages across the economy to improve the nation’s cyber resilience. </span><span>Supporting&nbsp;nationally significant organisations, businesses, organisations, and individuals who are, or may be, affected by cyber security incidents.</span></p>]]></paragraph>
<paragraph
    title="2.1.11."


><![CDATA[<p>Agencies can contact the NCSC for advice and assistance on the reporting and management of information security incidents.&nbsp; The NCSC’s response will be commensurate with the nature and urgency of the information security incident (see Section 7.2 – Reporting information security incidents).&nbsp; There is a 24 hour, seven day a week service available if necessary, by emailing <a href="mailto:ncscincidents@ncsc.govt.nz">ncscincidents@ncsc.govt.nz</a>.&nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.12."


><![CDATA[<p>The NCSC provides specialist advice and assistance to New Zealand government departments in relation to cryptography, communications, and various information processing technologies.</p>]]></paragraph>
<paragraph
    title="2.1.13."


><![CDATA[<p>The NCSC publishes the NZISM which sets out the information security requirements for New Zealand government organisations. An agency can contact the NCSC for advice and assistance relating to the interpretation of the NZISM by emailing: <a href="mailto:nzism@ncsc.govt.nz">nzism@ncsc.govt.nz</a>.&nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.14."


><![CDATA[<p>The NCSC supports regulatory regimes by providing risk assessments and advice to identify and manage risks to New Zealand’s national security. Network operators can contact the Regulatory Unit by email: <a href="mailto:ticsa@ncsc.govt.nz">ticsa@ncsc.govt.nz</a>.&nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.15."


><![CDATA[<p>The NCSC provides specialised technical security services focussed on countering unauthorised surveillance techniques and emanation security services focussed on preventing spread of unintentional signals. Contact the technical security services team by email:&nbsp;<u><a href="mailto:techliaison@gcsb.govt.nz">techliaison@gcsb.govt.nz</a></u>. &nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.16."


><![CDATA[<p>Finally, agencies can contact the NCSC for advice and assistance on the purchasing, provision, deployment, operation, and disposal of High Assurance Cryptographic Equipment. &nbsp;The cryptographic liaison can be contacted by email at <a href="mailto:cryptohelpdesk@gcsb.govt.nz">cryptohelpdesk@gcsb.govt.nz</a>.&nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.17."


><![CDATA[<p>For general enquiries the NCSC can be contacted on <a href="mailto:info@ncsc.govt.nz">info@ncsc.govt.nz</a>.&nbsp;</p>
<p>&nbsp;</p>]]></paragraph>
</block>
<block title="Government Chief Information Security Officer"><paragraph
    title="2.1.18."


><![CDATA[<p>The Government Chief Information Security Officer (GCISO) is responsible for the strategic direction and prioritisation of the New Zealand Government’s approach to information security and offers services to protect the Government's most sensitive information.</p>]]></paragraph>
<paragraph
    title="2.1.19."


><![CDATA[<p>The role was created in response to the ongoing evolution of the cyber threat environment, emerging vulnerabilities, and technological change for the New Zealand Government.&nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.20."


><![CDATA[<p>The GCISO role was established by the Te Kawa Mataaho Public Service Commission in 2018. In July 2022, the Public Service Commissioner formally appointed the GCISO as System Lead for Information Security.</p>]]></paragraph>
<paragraph
    title="2.1.21."


><![CDATA[<p>The GCSB Director-General holds the role of GCISO.</p>]]></paragraph>
<paragraph
    title="2.1.22."


><![CDATA[<p>The GCISO draws on the technical expertise, relationships, and unique insights of both the NCSC and the GCSB to uplift information security practice across government.&nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.23."


><![CDATA[<p>The objective of the GCISO is to uplift cyber resilience in the Public Service, and enable secure digital transformation through specific initiatives, which focus on:&nbsp;</p>
<ul>
<li>promoting standards and policy.&nbsp;</li>
<li>providing guidance.&nbsp;</li>
<li>promoting secure by design.&nbsp;</li>
<li>technical advice.&nbsp;</li>
<li>increasing service delivery.&nbsp;&nbsp;</li>
<li>building assurance; and &nbsp;</li>
<li>supporting the information security workforce.</li>
</ul>]]></paragraph>
<paragraph
    title="2.1.24."


><![CDATA[<p>The NZISM is a key part of the GCISO's standards setting role. It is developed by the NCSC as part of its support of the GCISO.&nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.25."


><![CDATA[<p>The GCISO coordinates its system leadership role with other Te Kawa Mataaho Public Service Commission appointed system leaders, particularly the Government Chief Digital Officer (GCDO) and the Government Chief Data Steward (GCDS).&nbsp;</p>
<p>&nbsp;</p>]]></paragraph>
</block>
<block title="Government System Leadership"><paragraph
    title="2.1.26."


><![CDATA[<p><strong>Government Chief Digital Officer</strong></p>
<p>The GCDO is the government system lead for digital. This role oversees the development and management of digital for the state sector. &nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.27."


><![CDATA[<p>The GCDO is responsible for:&nbsp;</p>
<ul>
<li>setting digital policy and standards,&nbsp;</li>
<li>improving investments,&nbsp;</li>
<li>establishing and managing services,&nbsp;</li>
<li>developing capability, and&nbsp;</li>
<li>system assurance (assuring digital government outcomes).&nbsp;</li>
</ul>]]></paragraph>
<paragraph
    title="2.1.28."


><![CDATA[<p><strong>Government Chief Data Steward</strong></p>
<p>The GCDS is the&nbsp;government system lead for data. This role supports the use of data as a resource across government to help deliver better services to New Zealanders.&nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.29."


><![CDATA[<p>The GCDS responds to new and emerging data issues, and ensures that government agencies have the capability and skills to maximise the value of data. This is achieved through setting data standards, establishing common capabilities, developing data policy, strategy, and planning.&nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.30."


><![CDATA[<p><strong>Government Protective Security Lead</strong></p>
<p>The Government Protective Security Lead (GPSL) is the functional lead for protective security.&nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.31."


><![CDATA[<p>The GPSL provides the formal, system-level, functional leadership for government protective security.</p>]]></paragraph>
<paragraph
    title="2.1.32."


><![CDATA[<p><strong>Government Chief Privacy Officer</strong></p>
<p>The Government Chief Privacy Officer (GCPO) is the government practice lead for privacy. This role leads an all-of-government approach to privacy to raise public sector privacy maturity and capability.</p>]]></paragraph>
<paragraph
    title="2.1.33."


><![CDATA[<p>The GCPO&nbsp;is responsible for: &nbsp;</p>
<ul>
<li>providing leadership by setting the vision for privacy across government,&nbsp;</li>
<li>building capability by supporting agencies to lift their capability to meet their privacy responsibilities, &nbsp;</li>
<li>providing assurance on public sector privacy performance,&nbsp;and&nbsp;</li>
<li>engaging with the Office of the Privacy Commissioner and New Zealanders about privacy. &nbsp;</li>
</ul>]]></paragraph>
<paragraph
    title="2.1.34."


><![CDATA[<p><strong>Government Procurement Lead</strong></p>
<p>The Government Procurement Lead is responsible for strengthening leadership and oversight of suppliers and agencies in key procurement sectors.&nbsp; A core part of this role is helping to ensure that agencies collaborate around sourcing and purchasing common goods and services.&nbsp; New Zealand Government Procurement and Property supports the Chief Executive of MBIE in their role as Procurement system lead.</p>]]></paragraph>
<paragraph
    title="2.1.35."


><![CDATA[<p>Procurement system leadership works towards a procurement system that delivers better value for New Zealand and helps people, communities and businesses to thrive. This includes redesigning and repositioning the government procurement system to:</p>
<ul>
<li>make it easy for government agencies and suppliers to work together.</li>
<li>lift procurement capability.</li>
<li>improve the visibility of procurement activities and system performance; and</li>
<li>facilitate and coordinate cross-agency collaboration.</li>
</ul>]]></paragraph>
</block>
<block title="Other government organisations"><paragraph
    title="2.1.36."


><![CDATA[<p><span style="text-decoration: underline;">Archives NZ&nbsp; Te Rua Mahara o te Kāwanatanga&nbsp;</span></p>
<p>Archives NZ is the regulator of information created by the public sector, and reports to Cabinet on the state of Government recordkeeping.</p>]]></paragraph>
<paragraph
    title="2.1.37."


><![CDATA[<p><span style="text-decoration: underline;">Controller and Auditor-General&nbsp; Tumuaki o te Mana Arotake</span>&nbsp;</p>
<p>The Controller and Auditor-General has two business units, the Office of the Auditor-General, and Audit NZ. Together they give Parliament and the public an independent view of how public organisations are operating.</p>]]></paragraph>
<paragraph
    title="2.1.38."


><![CDATA[<p><span style="text-decoration: underline;">Department of Internal Affairs&nbsp; Te Tari Taiwhenua</span></p>
<p>The Department of Internal Affairs has a range of relevant functions, including digital identity and digital safety, and regulatory functions including spam prevention and messaging compliance and money laundering. DIA provides guidance to support government organisations to use generative AI, cloud, enterprise architecture, government domain names, and APIs.</p>]]></paragraph>
<paragraph
    title="2.1.39."


><![CDATA[<p><span style="text-decoration: underline;">Department of the Prime Minister and Cabinet&nbsp; Te Tari o te Pirimia me te Komiti Matua</span></p>
<p>The Department of the Prime Minister and Cabinet’s purpose is to advance an ambitious, resilient, and well-governed New Zealand. The National Security Group business unit provides leadership across New Zealand’s national security community towards a secure and resilient Aotearoa New Zealand. The DPMC works on the Christchurch Call, critical infrastructure, and the National Security Intelligence Priorities.</p>]]></paragraph>
<paragraph
    title="2.1.40."


><![CDATA[<p><span style="text-decoration: underline;">Ministry of Business, Innovation &amp; Employment&nbsp; Hīkina Whakatutuki</span></p>
<p>The MBIE works to ensure that telecommunications markets operate efficiently, and the commerce and ICT infrastructure is well developed. It is responsible for maintaining a robust regulatory environment for the ICT sector, and works to improve broadband and mobile connectivity for New Zealanders.</p>]]></paragraph>
<paragraph
    title="2.1.41."


><![CDATA[<p><span style="text-decoration: underline;">Ministry of Foreign Affairs and Trade&nbsp; Manatū Aorere</span></p>
<p>MFAT ensures that New Zealander’s can live, do business, travel and communicate more safely at home and offshore.</p>]]></paragraph>
<paragraph
    title="2.1.42."


><![CDATA[<p><span style="text-decoration: underline;">New Zealand Police&nbsp; Ngā Pirihimana o Aotearoa</span> &nbsp;</p>
<p>The Police can investigate cybercrime and harmful digital communications.&nbsp;</p>]]></paragraph>
<paragraph
    title="2.1.43."


><![CDATA[<p><span style="text-decoration: underline;">New Zealand Security Intelligence Service&nbsp; Te Pā Whakamarumaru</span></p>
<p>NZSIS’ mission is to keep NZ and New Zealanders safe and secure. The Director-General is the Government Protective Security Lead, and the NZSIS manages the Protective Security Requirements framework and maintains the Information Security Classification System.</p>]]></paragraph>
<paragraph
    title="2.1.44."


><![CDATA[<p><span style="text-decoration: underline;">Office of the Privacy Commissioner&nbsp; Te Mana Mātāpono Matatapu</span></p>
<p>The Office of the Privacy Commissioner works to develop and promote a culture in which personal information is protected and respected.</p>]]></paragraph>
<paragraph
    title="2.1.45."


><![CDATA[<p><span style="text-decoration: underline;">Public Services Commission&nbsp; Te Kawa Mataaho</span></p>
<p>The Public Services Commission monitors Public Service organisations and Chief Executives’ performance.</p>
<p>&nbsp;</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="2.1.46."


><![CDATA[<p>The following websites can be used to obtain additional information about the security of government systems:</p>
<table class="table-main" style="width: 584px;">
<tbody>
<tr>
<td style="width: 349.737px;"><strong>Organisation</strong></td>
<td style="width: 227.863px;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 349.737px;"><strong>Archives New Zealand</strong></td>
<td style="width: 227.863px;"><a title="Archives NZ" rel="noopener noreferrer" href="https://archives.govt.nz" target="_blank">https://archives.govt.nz</a> &nbsp;</td>
</tr>
<tr>
<td style="width: 349.737px;"><strong>Audit New Zealand</strong></td>
<td style="width: 227.863px;"><a rel="noopener noreferrer" href="https://auditnz.parliament.nz/" target="_blank">https://auditnz.parliament.nz/</a></td>
</tr>
<tr>
<td style="width: 349.737px;"><strong>Office of the Auditor-General</strong></td>
<td style="width: 227.863px;"><a rel="noopener noreferrer" href="https://oag.parliament.nz/" target="_blank">https://oag.parliament.nz/</a></td>
</tr>
<tr>
<td style="width: 349.737px;"><strong>Department of Internal Affairs</strong></td>
<td style="width: 227.863px;">
<p><a title="Department of Internal Affairs" rel="noopener noreferrer" href="https://dia.govt.nz" target="_blank">https://dia.govt.nz</a> <br><a title="Government Chief Digital Officer (GCDO)" rel="noopener noreferrer" href="https://digital.govt.nz" target="_blank">https://digital.govt.nz</a></p>
</td>
</tr>
<tr>
<td style="width: 349.737px;"><strong>Department of Prime Minister and Cabinet</strong></td>
<td style="width: 227.863px;"><a title="Department of Prime Minister &amp; Cabinet" rel="noopener noreferrer" href="https://dpmc.govt.nz" target="_blank">https://dpmc.govt.nz</a> &nbsp;</td>
</tr>
<tr>
<td style="width: 349.737px;"><strong><strong>Government Communications Security Bureau</strong></strong></td>
<td style="width: 227.863px;"><a title="GCSB" rel="noopener noreferrer" href="https://gcsb.govt.nz" target="_blank">https://gcsb.govt.nz</a><a rel="noopener noreferrer" href="http://www.mbie.govt.nz" target="_blank"><span>&nbsp;</span></a></td>
</tr>
<tr>
<td style="width: 349.737px;"><strong>Ministry of Business, Innovation &amp; Employment</strong></td>
<td style="width: 227.863px;"><a title="Ministry of business, innovation &amp; employment" rel="noopener noreferrer" href="https://mbie.govt.nz" target="_blank">https://mbie.govt.nz</a></td>
</tr>
<tr>
<td style="width: 349.737px;"><strong>Ministry of Foreign Affairs and Trade</strong></td>
<td style="width: 227.863px;"><a title="Ministry of Foreign affairs &amp; trade" rel="noopener noreferrer" href="https://mfat.govt.nz" target="_blank">https://mfat.govt.nz</a></td>
</tr>
<tr>
<td style="width: 349.737px;"><strong>National Cyber Security Centre</strong></td>
<td style="width: 227.863px;"><a title="NCSC" rel="noopener noreferrer" href="https://ncsc.govt.nz" target="_blank">https://ncsc.govt.nz</a></td>
</tr>
<tr>
<td style="width: 349.737px;"><strong>New Zealand Security Intelligence Service</strong></td>
<td style="width: 227.863px;"><a title="NZ Security Intelligence Service" rel="noopener noreferrer" href="https://nzsis.govt.nz/" target="_blank">https://nzsis.govt.nz</a>&nbsp;</td>
</tr>
<tr>
<td style="width: 349.737px;"><strong>New Zealand Police</strong></td>
<td style="width: 227.863px;"><a title="NZ Police" rel="noopener noreferrer" href="https://police.govt.nz" target="_blank">https://police.govt.nz</a></td>
</tr>
<tr>
<td style="width: 349.737px;"><strong>Privacy Commissioner</strong></td>
<td style="width: 227.863px;"><a title="Privacy Commissioner" rel="noopener noreferrer" href="https://privacy.org.nz" target="_blank">https://privacy.org.nz</a></td>
</tr>
<tr>
<td style="width: 349.737px;"><strong>Protective Security Requirements</strong></td>
<td style="width: 227.863px;"><a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz" target="_blank">https://protectivesecurity.govt.nz</a></td>
</tr>
<tr>
<td style="width: 349.737px;"><strong>Public Service Commission</strong></td>
<td style="width: 227.863px;"><a title="Public Service Commission" rel="noopener noreferrer" href="https://publicservice.govt.nz" target="_blank">https://publicservice.govt.nz</a></td>
</tr>
<tr>
<td style="width: 349.737px;">&nbsp;</td>
<td style="width: 227.863px;">&nbsp;</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Organisations providing information security services"><paragraph
    title="2.1.47.R.01."

    tags="Governance"


><![CDATA[<p>If security personnel and senior management are not aware of the role government organisations play with regards to information security they could be missing out on valuable insight and assistance in developing an effective information security posture for their agency.</p>]]></paragraph>
<paragraph
    title="2.1.47.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="199"
><![CDATA[<p>Security personnel MUST familiarise themselves with the information security roles and services provided by New Zealand Government organisations.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="2.2. Non-Government Engagement and Outsourcing"><subsection title="Objective"><paragraph
    title="2.2.1."


><![CDATA[<p>Non-government organisations handling classified information implement the same information security and protective measures as government agencies.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="2.2.2."


><![CDATA[<p>This section covers information on outsourcing information technology services and functions to contractors and commercial entities as well as providing those partners with necessary classified information in order to undertake their contracted duties.</p>]]></paragraph>
</block>
<block title="Cloud computing"><paragraph
    title="2.2.3."


><![CDATA[<p>Cloud computing is a form of outsourcing information technology services and functions usually over the Internet.  The requirements within this section for outsourcing equally apply to providers of cloud computing services.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR References"><paragraph
    title="2.2.4."


><![CDATA[<p>Additional information on third party service providers is supplied in the PSR.</p>
<table class="table-grey">
<tbody>
<tr>
<td>Reference</td>
<td>Title</td>
<td>Source</td>
</tr>
<tr>
<td><strong>PSR Mandatory Requirements</strong></td>
<td>GOV4, GOV5, INFOSEC1, INFOSEC2, PERSEC1, PERSEC2, PERSEC3, and PERSEC4</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Outsourcing information technology services and functions"><paragraph
    title="2.2.5.R.01."

    tags="Governance"


><![CDATA[<p>In the context of this section, outsourcing is defined as contracting an outside entity to provide essential business functions and processes that could be undertaken by the Agency itself.</p><p>Outsourcing may present elevated levels of risk and additional risks. Outsourcing therefore, requires greater consideration, demonstrable governance, and higher levels of assurance before committing to such contracts.</p>]]></paragraph>
<paragraph
    title="2.2.5.R.02."

    tags="Governance"


><![CDATA[<p>A distinction is drawn between important business functions and the purchase of services such as power, water, building maintenance, stationery and telecommunications. These services are not usually provided by the agency itself.</p><p>Purchased services, as identified above, do NOT require accreditation or a third party review as defined in the NZISM. However, normal contract due diligence should be exercised before committing to these supply contracts.</p>]]></paragraph>
<paragraph
    title="2.2.5.R.03."

    tags="Governance"


><![CDATA[<p>Contractors can be provided with classified information as long as their systems are accredited to an appropriate classification in order to process, store and communicate that information. Contractors and all staff with access to the classified systems must also be cleared to the level of the information being processed. This ensures that when they are provided with classified information that it receives an appropriate level of protection.</p>]]></paragraph>
<paragraph
    title="2.2.5.R.04."

    tags="Governance"


><![CDATA[<p>New Zealand, in common with most developed countries, has agreements with other nations on information exchange on a variety of topics, including arms control, border control, biosecurity, policing and national security. The lead agency in each sector will usually be the controlling agency for each agreement. While the detail and nature of these agreements is sometimes classified, the agreements invariably require the protection of any information provided, to the level determined by the originator. Agencies that receive such information will be fully briefed by the relevant controlling agency or authority, before information is provided. It is important to note that there is no single list or source of such agreements.</p>]]></paragraph>
<paragraph
    title="2.2.5.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="216"
><![CDATA[<p>Agencies engaging industry for the provision of off-site information technology services and functions MUST accredit the systems used by the contractor to at least the same minimum standard as the agency’s systems. This may be achieved through a third party review report utilising the ISAE 3402 Assurance Reports on Controls at a Third Party Service Organisation.</p>]]></paragraph>
<paragraph
    title="2.2.5.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should Not"
    cid="217"
><![CDATA[<p>Agencies SHOULD NOT engage industry for the provision of off-site information technology services and functions in countries that New Zealand does not have a multilateral or bilateral security agreement with for the protection of classified information of the government of New Zealand. If there is any doubt, the agency’s CISO should be consulted.</p>]]></paragraph>
</block>
<block title="Independence of ITSMs from outsourced companies"><paragraph
    title="2.2.6.R.01."

    tags="Governance"


><![CDATA[<p>If an agency engages an organisation for the provision of information technology services and functions, and where that organisation also provides the services of an Information Technology Security Manager, they need to ensure that there is no actual or perceived conflict of interest (See also <a title="ITSM" href="http://nzism.gcsb.govt.nz/ism-document#Section-12348">Section 3.3 - Information Technology Security Manager</a>).</p>]]></paragraph>
<paragraph
    title="2.2.6.R.02."

    tags="Governance"


><![CDATA[<p>When an agency engages a company for the provision of information technology services and functions having a central point of contact for information security matters within the company will greatly assist with incident response and reporting procedures.</p>]]></paragraph>
<paragraph
    title="2.2.6.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="221"
><![CDATA[<p>Where an agency has outsourced information technology services and functions, any ITSMs within the agency SHOULD be independent of the company providing the information technology services and functions.</p>]]></paragraph>
<paragraph
    title="2.2.6.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="222"
><![CDATA[<p>Where an agency has outsourced information technology services and functions, they SHOULD ensure that the outsourced organisation provides a single point of contact within the organisation for all information assurance and security matters.</p>]]></paragraph>
</block>
<block title="Developing a contractor management program"><paragraph
    title="2.2.7.R.01."

    tags="Governance"


><![CDATA[<p>The development of a contractor management program will assist the agency in undertaking a coordinated approach to the engagement and use of contractors for outsourcing and provision of information technology services and functions.</p>]]></paragraph>
<paragraph
    title="2.2.7.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="225"
><![CDATA[<p class="Normal-nonumbering">Agencies SHOULD develop a program to manage contractors that have been accredited for the provision of off-site information technology services and functions.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="2.3. Using Cloud Services"><subsection title="Objective "><paragraph
    title="2.3.1."


><![CDATA[<p>Agencies understand and manage their cloud services to ensure they are secure, effective and efficient. </p>]]></paragraph>
 </subsection>
<subsection title="Context "> <block title="Scope "><paragraph
    title="2.3.2."


><![CDATA[<p>This section provides guidance on agency responsibilities when using cloud services. </p>]]></paragraph>
<paragraph
    title="2.3.3."


><![CDATA[<p>It is important that agencies understand their responsibilities with respect to the use of cloud services.&nbsp; Agency official and classified information, regardless of the system that it is held in (including cloud services), is still required to be protected in accordance with Cabinet directives, the&nbsp;<a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">Protective Security Requirements&nbsp;(PSR)</a>, the NZISM, the&nbsp;<a title="NZ government classification system" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/classification-system/" target="_blank">New Zealand Government Security Classification System</a> and with other government security requirements and guidance</p>]]></paragraph>
<paragraph
    title="2.3.4."


><![CDATA[<p>Reference should also be made to the following sections in the NZISM:</p><ul>
<li><a title="System Certification &amp; Accreditation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 – System Certification and Accreditation</a></li>
<li><a title="Information Security Documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a></li>
<li><a title="Decommissioning and Disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 – Decommissioning and Disposal</a></li>
<li><a title="Access Control" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access Control</a></li>
<li><a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a></li>
<li><a title="Gateway Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 – Gateway Security</a></li>
<li><a title="Data Management" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16835">Chapter 20 – Data Management</a></li>
<li><a title="Enterprise Systems Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-17216">Chapter 22 – Enterprise Systems Security</a></li>
</ul>]]></paragraph>
<paragraph
    title="2.3.5."


><![CDATA[<p>Detailed controls for Cloud Computing are provided in <a title="Cloud Computing" href="http://nzism.gcsb.govt.nz/ism-document#Section-17217">Section 22.1 – Cloud Computing</a>. Detailed controls for Public Cloud services are provided in <a title="Public cloud security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-17392">Chapter 23 - Public Cloud Security</a>.</p>]]></paragraph>
</block>
<block title="Mandates, Directives and Requirements "><paragraph
    title="2.3.6."


><![CDATA[<p>In 2012, Cabinet directed government agencies to adopt public cloud services in preference to traditional IT systems. Offshore-hosted office productivity services were excluded <strong>[CAB Min (12) 29/8A]</strong></p>]]></paragraph>
<paragraph
    title="2.3.7."


><![CDATA[<p>In August 2013, the Government introduced their approach to cloud computing, establishing a ‘cloud first’ policy and an All-of-Government direction to cloud services development and deployment. &nbsp;This is enabled by the Cabinet Minute <strong>[CAB Min (13) 37/6B]</strong>. &nbsp;Under the ‘cloud first’ policy state service agencies are expected to adopt approved cloud services either when faced with new procurements, or a contract extension decision. &nbsp;</p>]]></paragraph>
<paragraph
    title="2.3.8."


><![CDATA[<p>Cabinet also incorporated the cloud risk assessment process into the system-wide ICT assurance framework <strong>[CAB Min (13) 20/13]</strong>.</p>]]></paragraph>
<paragraph
    title="2.3.9."


><![CDATA[<p>The New Zealand Government ICT Strategy released in October 2015 requires agencies to outsource their IT functions using common capabilities and public cloud services where this was feasible and practical.</p>]]></paragraph>
<paragraph
    title="2.3.10."


><![CDATA[<p>In 2014 The Government Chief Information Officer published Cloud Computing Information Security and Privacy Considerations.  This guidance is designed to assist agencies systematically identify, analyse, and evaluate information security and privacy risks related to individual public cloud services.</p>]]></paragraph>
<paragraph
    title="2.3.11."


><![CDATA[<p>In July 2016, new measures were confirmed to accelerate the adoption of public cloud services by New Zealand’s government agencies.  The new measures complement existing policies and risk assessment processes and provide appropriate checks and balances.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="2.3.12."


><![CDATA[<p>The adoption of cloud technologies and services, the hosting of critical data in the cloud and the risk environment requires that agencies exercise caution.  Many cloud users are driven by the need for performance, scalability, resource sharing and cost saving so a comprehensive risk assessment is essential in identifying and managing jurisdictional, sovereignty, governance, assurance, technical and security risks.</p>]]></paragraph>
<paragraph
    title="2.3.13."


><![CDATA[<p>Security requirements and drivers in the cloud differ significantly from traditional data centre environments requiring new security models and architectures.  Key factors include:</p><ul>
<li>The dynamic nature of the cloud and its related infrastructure;</li>
<li>No customer ownership or control of infrastructure;</li>
<li>Limited visibility of architectures and transparency of operations; </li>
<li>Shared (multi-tenanted) physical and virtual environments; and</li>
<li>May require re-architecting of agency system to optimise use of cloud services.</li>
</ul>]]></paragraph>
<paragraph
    title="2.3.14."


><![CDATA[<p>While there is potential for significant benefit, flexibility and cost saving, any use of cloud services carries risk.  All cloud computing decisions should be made on a case-by-case basis after a proper risk assessment, the agency technology architecture is developed and security is properly considered and incorporated.</p>]]></paragraph>
<paragraph
    title="2.3.15."


><![CDATA[<p>There is also likely to be a significant mismatch in service-level agreements (SLAs) between existing systems and outsourcing arrangements and those of cloud-based services.</p>]]></paragraph>
<paragraph
    title="2.3.16."


><![CDATA[<p>It is important to note that although agencies can outsource operational <strong>responsibilities</strong> to a service provider for implementing, managing and maintaining security controls, they cannot outsource their <strong>accountability</strong> for ensuring their data is appropriately protected, including any system or service decommissioning or termination.</p>]]></paragraph>
<paragraph
    title="2.3.17."


><![CDATA[<p>The Government Chief Digital Officer (GCDO) has developed a risk and assurance framework for cloud computing, which agencies are required to follow when they are considering using cloud services. </p>]]></paragraph>
</block>
<block title="Information Security and Zero Trust"><paragraph
    title="2.3.18."


><![CDATA[<p>Information security relates to the protection of information regardless of its form (electronic or physical).&nbsp; Within government, information security has traditionally been construed using the concepts of confidentiality, availability and integrity of information.</p>]]></paragraph>
<paragraph
    title="2.3.19."


><![CDATA[<p class="NormS2C3">Relating these concepts to people who access, manage and use that information requires the use of methods to provide:</p><ul>
<li>Authentication;</li>
<li>Authorisation; and</li>
<li>Non-repudiation.</li>
</ul>]]></paragraph>
<paragraph
    title="2.3.20."


><![CDATA[<p>With the growth of the internet and cloud services, the proliferation of data and the growth in malicious and cyber-criminal activities, older methods of enabling information security are “fragile”, can be fragmented, and are in some cases, ineffective.</p>]]></paragraph>
<paragraph
    title="2.3.21."


><![CDATA[<p class="NormS2C3">Zero Trust is a security concept based around the idea that systems and users should not be given access to any information without verification, even when they are connected to internal networks.  Zero Trust looks to acknowledge that the previous concept and approach of using perimeter defences and providing free access within the secure perimeter is no longer practical or appropriate for securing information assets. As such, it should be replaced with robust authentication and verification steps being continuously performed.</p>]]></paragraph>
<paragraph
    title="2.3.22."


><![CDATA[<p class="NormS2C3">The concept of Zero Trust provides a more complete means of providing information security in an internet and cloud environment.  Understanding, planning for and preparing to adopt cloud services is an ideal time to incorporate Zero Trust concepts and principles into an agency’s information security policies, operations and information handling, processing storage and disposal.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="2.3.23."


><![CDATA[<p class="NormS2C3">Additional guidance on cloud services can be found at:</p>
<table class="table-main">
<tbody>
<tr style="height: 44px;">
<td style="height: 44px;">
<p><strong>Reference</strong></p>
</td>
<td style="height: 44px;">
<p><strong>Title</strong></p>
</td>
<td style="text-align: center; height: 44px;"><strong>Publisher</strong></td>
<td style="height: 44px;"><strong>Source</strong></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">
<p><strong>CAB Min (12) 29/8A&nbsp;</strong></p>
</td>
<td style="height: 91.8px;">
<p><strong>Managing The Government’s Adoption of Cloud Computing</strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p>Cabinet Office</p>
</td>
<td style="height: 91.8px;"><a title="CAB Min (12) 29/8A" rel="noopener noreferrer" href="https://snapshot.ict.govt.nz/resources/digital-ict-archive/static/localhost_8000/assets/Uploads/Documents/CabMin12-cloud-computing.pdf" target="_blank"></a><a title="Managing the Government’s adoption of cloud computing | NZ Digital government" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/about/cabinet-minutes/august-2012-managing-government-adoption/" target="_blank">Managing the Government’s adoption of cloud computing | NZ Digital government</a><a title="CAB Min (12) 29/8A" rel="noopener noreferrer" href="https://snapshot.ict.govt.nz/resources/digital-ict-archive/static/localhost_8000/assets/Uploads/Documents/CabMin12-cloud-computing.pdf" target="_blank"></a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">
<p><strong>CAB Min (13) 20/13</strong></p>
</td>
<td style="height: 91.8px;">
<p><strong>Improving Government Information and Communications Technology Assurance</strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>Cabinet Office</span></p>
</td>
<td style="height: 91.8px;"><a href="https://www.digital.govt.nz/assets/Documents/13Cabinet-Minute-Improving-Govt-ICT-Assurance.pdf">Cabinet Minute: Improving Government Information and Communications Technology (digital.govt.nz)</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Zero Trust Maturity Model&nbsp;&nbsp;</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>CISA (Cybersecurity and Infrastructure Security Agency) Cybersecurity Division</span></p>
</td>
<td style="height: 91.8px;"><a title="CISA Zero Trust Maturity model" href="https://www.cisa.gov/zero-trust-maturity-model">Zero Trust Maturity Model | CISA</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Cloud Computing – Information Security and Privacy Considerations April 2014</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>DIA</span></p>
</td>
<td style="height: 91.8px;"><a title="Cloud Computing - Information Security and Privacy Considerations April 2014" rel="noopener noreferrer" href="https://digital.govt.nz/assets/Documents/1Cloud-Computing-Information-Security-and-Privacy-Considerations-FINAL2.pdf" target="_blank">https://digital.govt.nz/assets/Documents/1Cloud-Computing-Information-Security-and-Privacy-Considerations-FINAL2.pdf [PDF, 185 KB]</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Strategy for a Digital Public Service</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>DIA</span></p>
</td>
<td style="height: 91.8px;"><a title="Government Digital Strategy" rel="noopener noreferrer" href="https://digital.govt.nz/digital-government/strategy/strategy-summary/" target="_blank">https://digital.govt.nz/digital-government/strategy/strategy-summary/</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Accelerating the Adoption of Public Cloud Services</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>DIA</span></p>
</td>
<td style="height: 91.8px;"><a title="Accelerating the Adoption of Public Cloud Services" rel="noopener noreferrer" href="https://digital.govt.nz/dmsdocument/15-accelerating-the-adoption-of-public-cloud-services/html" target="_blank">https://digital.govt.nz/dmsdocument/15-accelerating-the-adoption-of-public-cloud-services/html</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Cloud Risk Assessment Tool [Excel Spreadsheet]</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>DIA</span></p>
</td>
<td style="height: 91.8px;"><a href="https://www.digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/about/tool-for-assessing-risks/">Risk assessment tool for public cloud services | NZ Digital government</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Risk Assessment Process</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>DIA</span></p>
</td>
<td style="height: 91.8px;"><a title="Assess the risks of using a public cloud service" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/assess-the-risks/assessment-process/" target="_blank">Assess the risks of using a public cloud service | NZ Digital government</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Build Security Into Your Network’s DNA: The Zero Trust Network Architecture by John Kindervag&nbsp;</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>Forrester</span></p>
</td>
<td style="height: 91.8px;"><a title="Build zero trust into your network&#039;s DNA" rel="noopener noreferrer" href="https://virtualstarmedia.com/downloads/Forrester_zero_trust_DNA.pdf" target="_blank">https://virtualstarmedia.com/downloads/Forrester_zero_trust_DNA.pdf [PDF 1.06 MB]</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Zero Trust Architectures and Solutions</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>Gartner</span></p>
</td>
<td style="height: 91.8px;"><a title="Zero Trust Architectures and Solutions" rel="noopener noreferrer" href="https://gartner.com/teamsiteanalytics/servePDF?g=/imagesrv/media-products/pdf/Qi-An-Xin/Qi-An-Xin-1-1OKONUN2.pdf" target="_blank">https://gartner.com/teamsiteanalytics/servePDF?g=/imagesrv/media-products/pdf/Qi-An-Xin/Qi-An-Xin-1-1OKONUN2.pdf</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;"><strong>NIST SP800-207</strong></td>
<td style="height: 91.8px;">
<p><strong><span>Zero Trust Architecture</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>NIST</span></p>
</td>
<td style="height: 91.8px;"><a title="NIST SP.800-207 " rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf [PDF, 944 KB]</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Developing a Framework to improve Critical Infrastructure Cybersecurity</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>NIST</span></p>
</td>
<td style="height: 91.8px;"><a title="Developing a Framework to improve Critical Infrastructure Cybersecurity" rel="noopener noreferrer" href="https://nist.gov/system/files/documents/2017/06/05/040813_forrester_research.pdf" target="_blank">https://nist.gov/system/files/documents/2017/06/05/040813_forrester_research.pdf [PDF, 430 KB]</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Implementing a Zero Trust Architecture</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>NIST/NCCoE</span></p>
</td>
<td style="height: 91.8px;"><span><a title="Implementing a Zero Trust Architecture" rel="noopener noreferrer" href="https://nccoe.nist.gov/projects/implementing-zero-trust-architecture" target="_blank">https://nccoe.nist.gov/projects/implementing-zero-trust-architecture</a>&nbsp;</span></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Embracing a Zero Trust Security Model</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>NSA</span></p>
</td>
<td style="height: 91.8px;"><span><a title="Embracing a Zero Trust Security Model" rel="noopener noreferrer" href="https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF" target="_blank">https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF [PDF, 643 KB]</a></span></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Evolving Zero Trust – Microsoft Position Paper</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>Microsoft</span></p>
</td>
<td style="height: 91.8px;"><span><a title="Evolving Zero Trust – Microsoft Position Paper" rel="noopener noreferrer" href="https://microsoft.com/en-nz/security/business/zero-trust" target="_blank">https://microsoft.com/en-nz/security/business/zero-trust</a>&nbsp;&nbsp;</span></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR References "><paragraph
    title="2.3.24."


><![CDATA[<p>Additional information on third party providers is provided in the PSR.&nbsp;</p>
<table class="table-grey">
<tbody>
<tr>
<td>Reference</td>
<td>Title</td>
<td>Source</td>
</tr>
<tr>
<td><strong>PSR Mandatory Requirements</strong></td>
<td>
<p>GOV4, GOV5, INFOSEC1, INFOSEC2, PERSEC1, PERSEC2, PERSEC3 and PERSEC4</p>
</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls "> <block title="Cloud Adoption Strategy"><paragraph
    title="2.3.25.R.01."

    tags="Cloud Computing,Governance,Public cloud security"


><![CDATA[<p>Cloud technologies require a different mindset for the delivery of ICT services, as compared to traditional agency-owned IT servers.  Increasingly, ICT will be available only in ‘as-a-service’ delivery models, which may lead to agencies adopting cloud services in an ad-hoc manner unless an overarching strategy is developed and put in place. </p>]]></paragraph>
<paragraph
    title="2.3.25.R.02."

    tags="Cloud Computing,Governance,Public cloud security"


><![CDATA[<p>This will introduce new and different risks, including:</p><ul>
<li>where information is located;</li>
<li>where it is able to be accessed from;</li>
<li>who is able to access information; and</li>
<li>how ICT services are funded and sustained.</li>
</ul>]]></paragraph>
<paragraph
    title="2.3.25.R.03."

    tags="Cloud Computing,Governance,Technical,Public cloud security"


><![CDATA[<p>Cloud providers are more likely to adopt modern security and development approaches, including agile development techniques (e.g. DevOps), Zero Trust Networking, serverless computing and continuous integration / continuous deployment (CI/CD) pipelines for automation.  These approaches are likely to be incompatible with existing ICT processes that focus on legacy delivery models and may present significant challenges to agencies that are not adequately prepared. </p>]]></paragraph>
<paragraph
    title="2.3.25.R.04."

    tags="Cloud Computing,Governance,Public cloud security"


><![CDATA[<p>Developing a strategy that outlines how an agency will look to exploit the opportunities presented by cloud while managing the risks and change required in ICT governance and management processes is essential to the successful adoption of cloud services for agencies.</p>]]></paragraph>
<paragraph
    title="2.3.25.C.01."

    tags="Cloud Computing,Governance,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7045"
><![CDATA[<p>Agencies intending to adopt public cloud technologies or services MUST develop a plan for how they intend to use these services.  This plan can be standalone or part of an overarching ICT strategy.</p>]]></paragraph>
<paragraph
    title="2.3.25.C.02."

    tags="Cloud Computing,Governance,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7046"
><![CDATA[<p>An agency’s cloud adoption plan SHOULD cover:</p><ul>
<li>Outcomes and benefits that the adoption of cloud technologies will bring;</li>
<li>Risks introduced or mitigated through the use of cloud, and the agency’s risk tolerance;</li>
<li>Financial and cost accounting models;</li>
<li>Shared responsibility models;</li>
<li>Cloud deployment models;</li>
<li>Cloud security strategy;</li>
<li>Resilience and recovery approaches;</li>
<li>Data recovery on contract termination;</li>
<li>Cloud exit strategy and other contractual arrangements; and</li>
<li>A high level description of the foundation services that enable cloud adoption, including:
<ul>
<li>User, device and system identity;</li>
<li>Encryption and key management;</li>
<li>Information management;</li>
<li>Logging and alerting;</li>
<li>Incident management;</li>
<li>Managing privileged activities; and</li>
<li>Cost management.</li>
</ul>
</li>
</ul>]]></paragraph>
</block>
<block title="Zero Trust"><paragraph
    title="2.3.26.R.01."

    tags="Cloud Computing,Governance,Infrastructure,Technical,Public cloud security"


><![CDATA[<p>Zero Trust is becoming the de-facto approach to ICT system security and is recommended by GCSB as the approach agencies should take, particularly as part of the adoption of cloud services.</p><p>Zero Trust is a set of principles and outcomes, not an architecture or a solution.  You cannot ‘buy’ Zero Trust.</p><p>Zero Trust is compatible with other ICT outcomes, such as improved access to information, increased agility and better security.</p><p>Key aspects of Zero Trust focus on:</p><ul>
<li>Visibility (through telemetry) and analytics of how services are functioning – this comes through as focus on monitoring, event gathering and machine learning based analysis; and</li>
<li>Automation of service delivery and security actions.</li>
</ul>]]></paragraph>
<paragraph
    title="2.3.26.R.02."

    tags="Cloud Computing,Governance,Infrastructure,Technical,Public cloud security"


><![CDATA[<p>Public cloud services are often built following Zero Trust principles, and agencies will find adoption of this approach will lead to more successful security outcomes than trying to recreate legacy perimeter security controls in the cloud.</p>]]></paragraph>
<paragraph
    title="2.3.26.C.01."

    tags="Cloud Computing,Governance,Infrastructure,Technical,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7049"
><![CDATA[<p>Agencies intending to adopt public cloud technologies or services SHOULD incorporate Zero Trust philosophies and concepts.</p>]]></paragraph>
<paragraph
    title="2.3.26.C.02."

    tags="Cloud Computing,Governance,Infrastructure,Technical,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7050"
><![CDATA[<p>Agencies SHOULD leverage public cloud environment native security services as part of legacy system migrations, in preference to recreating application architectures that rely on legacy perimeter controls for security.</p>]]></paragraph>
</block>
<block title="Risk Assessment"><paragraph
    title="2.3.27.R.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


><![CDATA[<p>The adoption of cloud technologies will introduce a wide range of technology and information system risks <em>in addition</em> to the risks that already exist for agency systems. It is vital that these additional risks are identified and assessed in order to select appropriate controls and countermeasures. Trust boundaries must be defined to assist in determining effective controls and where these controls can best be applied. The geographic location of agency data should be identified as this may include offshore data centres.</p>]]></paragraph>
<paragraph
    title="2.3.27.C.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="255"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services MUST conduct a comprehensive risk assessment, in accordance with the guidance provided by the Government Chief Digital Officer (GCDO) before implementation or adoption.</p>]]></paragraph>
<paragraph
    title="2.3.27.C.02."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="256"
><![CDATA[<p>Agencies MUST ensure cloud risks for any cloud service adopted are identified, understood and formally accepted by the Agency Head or Chief Executive and the agency’s Accreditation Authority.</p>]]></paragraph>
</block>
<block title="Security Architecture"><paragraph
    title="2.3.28.R.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


><![CDATA[<p>The adoption of cloud technologies will introduce a wide range of technology and information system risks in <em>addition</em> to the risks that already exist for agency systems.&nbsp; It is vital that these additional risks are identified and assessed in order to select appropriate controls and countermeasures.</p>]]></paragraph>
<paragraph
    title="2.3.28.C.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="259"
><![CDATA[<p>Agencies intending to adopt cloud services SHOULD review and enhance existing security architectures and systems design to prudently manage the changed risk, technology and security environment in adopting cloud services.</p>]]></paragraph>
</block>
<block title="Selection of Services"><paragraph
    title="2.3.29.R.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


><![CDATA[<p>A number of cloud related service, contracts and other arrangements have been negotiated on behalf of the New Zealand Government with a number of cloud service providers. Agencies must consider these services before negotiating individual contracts or supply contract with cloud service providers.</p>]]></paragraph>
<paragraph
    title="2.3.29.C.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4935"
><![CDATA[<p>Agencies MUST consider the use of any All of Government contracts with cloud service providers before negotiating individual contracts.</p>]]></paragraph>
</block>
<block title="System Decommissioning and Contract Termination"><paragraph
    title="2.3.30.R.01."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


><![CDATA[<p>It is important that agencies understand how and where their data is processed, managed, stored, backed up and archived within the cloud service provider’s environment (systems architecture). &nbsp;This may result in multiple copies of agency data in several data centres, possibly also in several countries.</p>]]></paragraph>
<paragraph
    title="2.3.30.R.02."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


><![CDATA[<p>When an agency system or service is decommissioned or a service provider’s contract terminated, it is important that agencies ensure data is returned to the agency and no copies are retained by the service provider.</p>]]></paragraph>
<paragraph
    title="2.3.30.C.01."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="263"
><![CDATA[<p>Agency system architectures and supply arrangements and contracts SHOULD include provision for the safe return of agency data in the event of system or service termination or contract termination.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="2.4. Preparation for Post-Quantum Cryptography"><subsection title="Objective"><paragraph
    title="2.4.1."


><![CDATA[<p class="NormS2C4">Agencies are prepared for the impacts that widespread availability of quantum computing will have on information security.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="2.4.2."


><![CDATA[<p>This section provides information for agencies to assist with preparation for the impacts of quantum computing on information security, and more specifically impacts related to encryption.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="2.4.3."


><![CDATA[<p class="NormS2C4">There has been a substantial amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. The pace of this research is accelerating.</p>]]></paragraph>
<paragraph
    title="2.4.4."


><![CDATA[<p class="NormS2C4">The development of quantum computing is a rapidly advancing area with multiple innovations being announced regularly, often eclipsing previous forecasts.</p>]]></paragraph>
<paragraph
    title="2.4.5."


><![CDATA[<p class="NormS2C4">Quantum computers are not expected to fully replace classical computers as quantum effects are currently useful only on particular tasks. However quantum computers will be able to rapidly solve highly complex problems, well beyond the capabilities of today’s supercomputers.</p>]]></paragraph>
<paragraph
    title="2.4.6."


><![CDATA[<p class="NormS2C4">A prominent area of quantum computing applicability is in the field of cryptanalysis, and it is expected that they will be able to compromise or render ineffective many of the public-key cryptosystems currently in use.</p>]]></paragraph>
<paragraph
    title="2.4.7."


><![CDATA[<p class="NormS2C4">It is important that agencies are aware of the potential impact developments in quantum computing are likely to have on critical security controls such as encryption.  It is also important that they are preparing to act to minimise the disruptions that could be caused during migrations to post-quantum cryptography (cryptographic systems that remain secure after the widespread availability of quantum computing).</p>]]></paragraph>
<paragraph
    title="2.4.8."


><![CDATA[<p class="NormS2C4">Currently there are no post-quantum cryptographic systems approved for use in the NZISM, however there are actions that agencies can undertake to prepare for the time when such systems are approved.</p>]]></paragraph>
</block>
<block title="Post-Quantum Cryptographic Standards"><paragraph
    title="2.4.9."


><![CDATA[<p class="NormS2C4">International organisations are evaluating potential candidates for standardisation in post-quantum cryptography.  GCSB will review applicable standards and consider them for incorporation into the NZISM when they are published.</p>]]></paragraph>
<paragraph
    title="2.4.10."


><![CDATA[<p class="NormS2C4">When standards for quantum-resistant public key cryptography become available, GCSB may deprecate or withdraw support for existing classical cryptographic standards. Agencies should therefore be prepared to transition away from these algorithms possibly in the next 2-3 years, even though the standards to migrate to are still to be developed.</p>]]></paragraph>
<paragraph
    title="2.4.11."


><![CDATA[<p class="NormS2C4">Until new quantum-resistant algorithms are standardised, agencies should maintain or strengthen their existing cryptographic position using the algorithms, protocols and key lengths specified in <a title="Chapter 17 - Cryptography" rel="noopener noreferrer" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745" target="_blank">Chapter 17 - Cryptography</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="2.4.12."


><![CDATA[<p class="NormS2C4">Additional guidance on post-quantum cryptography can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Getting Ready for Post-Quantum Cryptography</td>
<td style="text-align: center;">
<p>NIST</p>
<p>National Institute for Standards and Technology</p>
</td>
<td><a title="Getting Ready for Post-Quantum Cryptography" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf [PDF, 401 KB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span>Post-Quantum Cryptography Project (NIST)</span></td>
<td style="text-align: center;">
<p>NIST</p>
<p>National Institute for Standards and Technology</p>
</td>
<td><a title="Post-Quantum Cryptography Project (NIST)" rel="noopener noreferrer" href="https://csrc.nist.gov/projects/post-quantum-cryptography" target="_blank">https://csrc.nist.gov/projects/post-quantum-cryptography</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Post-Quantum Cryptography</td>
<td style="text-align: center;">Department of Homeland Security (US DHS)</td>
<td><a title="Post-Quantum Cryptography" rel="noopener noreferrer" href="https://dhs.gov/quantum" target="_blank">https://dhs.gov/quantum</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p class="Default">Migration To&nbsp;Post-Quantum Cryptography</p>
</td>
<td style="text-align: center;">National Cybersecurity Center of Excellence (US NCCoE)</td>
<td><a title="Migration To&nbsp;Post-Quantum Cryptography" rel="noopener noreferrer" href="https://nccoe.nist.gov/sites/default/files/library/project-descriptions/pqc-migration-project-description-final.pdf" target="_blank">https://nccoe.nist.gov/sites/default/files/library/project-descriptions/pqc-migration-project-description-final.pdf [PDF, 386 KB]</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Post-Quantum Cryptography Preparation"><paragraph
    title="2.4.13.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


><![CDATA[<p>International organisations are in the process of developing standards for post-quantum cryptographic algorithms. The standards will be reviewed and incorporated into the NZISM as they are published.</p>]]></paragraph>
<paragraph
    title="2.4.13.R.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


><![CDATA[<p>As standards are still under development the form of post-quantum cryptography is not fully determined at this point in time. </p>]]></paragraph>
<paragraph
    title="2.4.13.R.03."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


><![CDATA[<p>It is recognised that providing guidance on the concrete and achievable steps that can be taken now to prepare for the transition to post-quantum cryptography will help ensure a smooth and efficient transition to any new standards that become available.</p>]]></paragraph>
<paragraph
    title="2.4.13.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7206"
><![CDATA[<p>Agencies SHOULD ensure they are aware of the latest developments in post-quantum cryptography.  GCSB is tracking these developments and will continue to provide advice through the NZISM.</p>]]></paragraph>
<paragraph
    title="2.4.13.C.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7207"
><![CDATA[<p>Agencies SHOULD maintain an inventory of sensitive and critical datasets that must be secured for an extended amount of time.&nbsp; This will ensure datasets that may be at risk now and decrypted once a cryptographically relevant quantum computer is available are not secured solely through the use of quantum vulnerable cryptography.</p>]]></paragraph>
<paragraph
    title="2.4.13.C.03."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7208"
><![CDATA[<p>Agencies SHOULD conduct an inventory of systems using cryptographic technologies to determine the potential size and scope of future transition work once post-quantum cryptographic systems become available.</p>]]></paragraph>
<paragraph
    title="2.4.13.C.04."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7209"
><![CDATA[<p>Agencies SHOULD identify which systems in their inventory rely on public key cryptography and note them as quantum vulnerable in agency risk assessments.</p>]]></paragraph>
<paragraph
    title="2.4.13.C.05."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7210"
><![CDATA[<p>Agencies SHOULD determine a priority order for quantum vulnerable systems to be transitioned from classical cryptography to post-quantum cryptography.</p>]]></paragraph>
<paragraph
    title="2.4.13.C.06."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7211"
><![CDATA[<p>Agencies SHOULD consider the following factors when prioritising the quantum vulnerable systems:</p>
<ul>
<li>Is the system a high value asset based on agency requirements?</li>
<li>Does the system protect sensitive information (e.g., key stores, passwords, root keys, signing keys, personal information, and classified information)?</li>
<li>Do other systems (internal or external to the agency) depend on the cryptographic protections in place on the quantum vulnerable system?</li>
<li>How long does the data need to be protected?</li>
</ul>]]></paragraph>
<paragraph
    title="2.4.13.C.07."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7212"
><![CDATA[<p>Using the inventory and prioritisation information, agencies SHOULD develop a plan for system transitions upon publication of the new post-quantum cryptographic standard.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="3. Information security governance - roles and responsibilities"><section title="3.1. The Agency Head"><subsection title="Objective"><paragraph
    title="3.1.1."


><![CDATA[<p>The agency head is accountable for information security within their agency.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="3.1.2."


><![CDATA[<p>This section covers the role of an agency head with respect to information security.</p>]]></paragraph>
</block>
<block title="Chief executive officer /or other title"><paragraph
    title="3.1.3."


><![CDATA[<p>In some agencies and bodies, the person responsible for the agency or body may also be referred to as the CEO, Director General, Director or similar title specific to that agency.  In such cases the policy for the agency head is equally applicable.</p>]]></paragraph>
</block>
<block title="Devolving authority"><paragraph
    title="3.1.4."


><![CDATA[<p>When the agency head’s authority in this area has been devolved to a board, committee or panel, the requirements of this section relate to the chair or head of that body.</p>]]></paragraph>
<paragraph
    title="3.1.5."


><![CDATA[<p>The Agency Head is also the Accreditation Authority for that agency. See&nbsp;<a title="Accreditation Framework" href="http://nzism.gcsb.govt.nz/ism-document#Section-12591">Section 4.4 – Accreditation Framework</a>.</p>]]></paragraph>
<paragraph
    title="3.1.6."


><![CDATA[<p>Smaller agencies may not be able to satisfy all segregation of duty requirements because of scalability and small personnel numbers.  In such cases, potential conflicts of interest should be clearly identified, declared and actively managed for the protection of both the individual and of the agency.</p>]]></paragraph>
<paragraph
    title="3.1.7."


><![CDATA[<p>Refer also to <a title="Compliance by smaller agencies" href="http://nzism.gcsb.govt.nz/ism-document#Block-12104"><em>Compliance By Smaller Agencies</em> in 1.2.8</a> for information on joint approaches and resource pooling.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Delegation of authority"><paragraph
    title="3.1.8.R.01."

    tags="Governance"


><![CDATA[<p>Where an agency head chooses to delegate their authority as the Agency’s Accreditation Authority they should do so with careful consideration of all the associated risks, as they remain responsible for the decisions made by their delegate.</p>]]></paragraph>
<paragraph
    title="3.1.8.R.02."

    tags="Governance"


><![CDATA[<p>The most suitable choice for delegated authority is a senior executive who has an appropriate level of understanding of the security risks they are accepting on behalf of the agency.</p>]]></paragraph>
<paragraph
    title="3.1.8.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="282"
><![CDATA[<p>Where the agency head devolves their authority the delegate MUST be at least a member of the Senior Executive Team or an equivalent management position.</p>]]></paragraph>
<paragraph
    title="3.1.8.C.02."


    classification="All Classifications"
    compliance="Should"
    cid="283"
><![CDATA[<p class="Normal-nonumbering">When the agency head delegates their authority, the delegate SHOULD be a senior executive who understands the consequences and potential impact to the business of the acceptance of residual risk.</p>]]></paragraph>
<paragraph
    title="3.1.8.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="284"
><![CDATA[<p>Where the head of a smaller agency is not able to satisfy all segregation of duty requirements because of scalability and small personnel numbers, all potential conflicts of interest SHOULD be clearly identified, declared and actively managed.</p>]]></paragraph>
</block>
<block title="Support for information security"><paragraph
    title="3.1.9.R.01."

    tags="Governance"


><![CDATA[<p>Without the full support of the agency head, security personnel are less likely to have access to sufficient resources and authority to successfully implement information security within their agency.</p>]]></paragraph>
<paragraph
    title="3.1.9.R.02."

    tags="Governance"


><![CDATA[<p>If an incident, breach or disclosure of classified information occurs in preventable circumstances, the relevant agency head will ultimately be held accountable.</p>]]></paragraph>
<paragraph
    title="3.1.9.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="288"
><![CDATA[<p>The agency head MUST provide support for the development, implementation and ongoing maintenance of information security processes within their agency.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="3.2. The Chief Information Security Officer"><subsection title="Objective"><paragraph
    title="3.2.1."


><![CDATA[<p>The Chief Information Security Officer (CISO) sets the strategic direction for information security within their agency.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="3.2.2."


><![CDATA[<p>This section covers the role of a CISO with respect to information security within an agency.</p>]]></paragraph>
</block>
<block title="Appointing a CISO"><paragraph
    title="3.2.3."


><![CDATA[<p>The requirement to appoint a member of the Senior Executive Team or an equivalent management position, to the role of CISO does not require a new dedicated position be created in each agency.</p>]]></paragraph>
<paragraph
    title="3.2.4."


><![CDATA[<p>The introduction of the CISO role and associated responsibilities is aimed at providing a more meaningful title for a subset of the security executive’s responsibilities that relate to information security within their agency.</p>]]></paragraph>
<paragraph
    title="3.2.5."


><![CDATA[<p>The CISO should bring accountability and credibility to information security management and appointees should be suitably qualified and experienced.</p>]]></paragraph>
<paragraph
    title="3.2.6."


><![CDATA[<p class="NormS3C2">Where multiple roles are held by the CISO, conflicts of interest may occur particularly where operational imperatives conflict with security requirements.  Good governance and assurance practices separates these roles.  Where multiple roles are held by an individual, potential conflicts of interest should be clearly identified and a mechanism implemented to allow independent decision making in areas where conflict can occur.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="3.2.7."


><![CDATA[<p>Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td>
<p>GOV1, GOV3, GOV4, GOV8,&nbsp;INFOSEC1, INFOSEC2, INFOSEC4,&nbsp;PERSEC1, PERSEC2,&nbsp;PERSEC3, and&nbsp;PERSEC4</p>
</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></td>
</tr>
<tr>
<td>
<p><strong>PSR requirements sections</strong></p>
</td>
<td>
<p>Self-assessment &amp; reporting</p>
<p>&nbsp;</p>
<p>Protective security roles &amp; responsibilities</p>
<p>&nbsp;</p>
</td>
<td>
<p><a href="https://www.protectivesecurity.govt.nz/about/self-assessment-and-reporting">Self-assessment and reporting | Protective Security Requirements</a></p>
<a href="https://www.protectivesecurity.govt.nz/about/roles-and-responsibilities">Roles and responsibilities | Protective Security Requirements</a><br><br></td>
</tr>
</tbody>
</table>
<p class="NormS3C2">&nbsp;</p>
<p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Requirement for a CISO"><paragraph
    title="3.2.8.R.01."

    tags="Governance"


><![CDATA[<p class="Normal-nonumbering">The role of the CISO is based on industry and governance good practice, and relevant international standards, and has been introduced to ensure that information security is managed at the senior executive level within agencies.  Without a CISO there is a risk that an agency may not be resourced to effectively manage information security.</p>]]></paragraph>
<paragraph
    title="3.2.8.R.02."

    tags="Governance"


><![CDATA[<p>The CISO within an agency is responsible predominately for facilitating communications between security personnel, ICT personnel and business personnel to ensure alignment of business and security objectives within the agency.</p>]]></paragraph>
<paragraph
    title="3.2.8.R.03."

    tags="Governance"


><![CDATA[<p>The CISO is also responsible for providing strategic level guidance for the agency security program and ensuring compliance with national policy, standards, regulations and legislation.</p>]]></paragraph>
<paragraph
    title="3.2.8.R.04."

    tags="Governance"


><![CDATA[<p class="Normal-nonumbering">Where multiple roles are held by the CISO, potential conflicts of interest should be identified and carefully managed so the agency is not disadvantaged. </p>]]></paragraph>
<paragraph
    title="3.2.8.R.05."

    tags="Governance"


><![CDATA[<p class="Normal-nonumbering">Conflicts of interest may also be apparent where the agency outsources the CISO function and that CISO deals with other vendors and organisations. In particular required availability, response times and related operational criteria should be identified and carefully managed to ensure the agency is not disadvantaged.</p>]]></paragraph>
<paragraph
    title="3.2.8.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="307"
><![CDATA[<p>The CISO MUST be:</p><ul>
<li>cleared for access to all classified information processed by the agency’s systems, and</li>
<li>able to be briefed into any compartmented information on the agency’s systems.</li>
</ul>]]></paragraph>
<paragraph
    title="3.2.8.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="308"
><![CDATA[<p>Agencies SHOULD appoint a person to the role of CISO or have the role undertaken by an existing person within the agency.</p>]]></paragraph>
<paragraph
    title="3.2.8.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="309"
><![CDATA[<p>The CISO role SHOULD be undertaken by a member of the Senior Executive Team or an equivalent management position.</p>]]></paragraph>
<paragraph
    title="3.2.8.C.04."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="310"
><![CDATA[<p>The CISO SHOULD be responsible for overseeing the management of security personnel within the agency.</p>]]></paragraph>
<paragraph
    title="3.2.8.C.05."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="311"
><![CDATA[<p class="Normal-nonumbering">Where multiple roles are held by the CISO any potential conflicts of interest SHOULD be identified and carefully managed.</p>]]></paragraph>
</block>
<block title="Responsibilities – Reporting"><paragraph
    title="3.2.9.R.01."

    tags="Governance"


><![CDATA[<p>As the CISO is responsible for the overall management of information security within an agency it is important that they report directly to the agency head on any information security issues.</p>]]></paragraph>
<paragraph
    title="3.2.9.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="314"
><![CDATA[<p>The CISO SHOULD report directly to the agency head on matters of information security within the agency.</p>]]></paragraph>
</block>
<block title="Responsibilities – Security programs"><paragraph
    title="3.2.10.R.01."

    tags="Governance"


><![CDATA[<p>Without a comprehensive strategic level information security and security risk management program an agency will lack high-level direction on information security issues and may expose the agency to unnecessary risk.</p>]]></paragraph>
<paragraph
    title="3.2.10.R.02."

    tags="Governance"


><![CDATA[<p class="Normal-nonumbering">Working with system owners, assessors and accreditors will facilitate the determination of appropriate information security policies consistent with agency strategies, the requirements of the PSR and in particular the NZISM.</p>]]></paragraph>
<paragraph
    title="3.2.10.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="317"
><![CDATA[<p>The CISO SHOULD develop and maintain a comprehensive strategic level information security and security risk management program within the agency aimed at protecting the agency’s official and classified information.</p>]]></paragraph>
<paragraph
    title="3.2.10.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="318"
><![CDATA[<p>The CISO SHOULD be responsible for the development of an information security communications plan.</p>]]></paragraph>
<paragraph
    title="3.2.10.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="319"
><![CDATA[<p>The CISO SHOULD create and facilitate the agency security risk management process.</p>]]></paragraph>
<paragraph
    title="3.2.10.C.04."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7084"
><![CDATA[<p>The CISO SHOULD work with system owners, system certifiers and system accreditors to determine appropriate information security policies for their systems and ensure consistency with the&nbsp;<a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">Protective Security Requirements (PSR)</a> and in particular the relevant NZISM components.</p>]]></paragraph>
</block>
<block title="Responsibilities – Ensuring compliance"><paragraph
    title="3.2.11.R.01."

    tags="Governance"


><![CDATA[<p>Without having a person responsible for ensuring compliance with the information security policies and standards within the agency, security measures of the agency are unlikely to meet minimum government requirements and may expose the agency to unnecessary risk.</p>]]></paragraph>
<paragraph
    title="3.2.11.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="322"
><![CDATA[<p>The CISO SHOULD be responsible for establishing mechanisms and programs to ensure compliance with the information security policies and standards within the agency.</p>]]></paragraph>
<paragraph
    title="3.2.11.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="323"
><![CDATA[<p class="Normal-nonumbering">The CISO SHOULD be responsible for ensuring agency compliance with the NZISM through facilitating a continuous program of certification and accreditation of all agency systems.</p>]]></paragraph>
<paragraph
    title="3.2.11.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="324"
><![CDATA[<p>The CISO SHOULD be responsible for the implementation of information security measurement metrics and key performance indicators within the agency.</p>]]></paragraph>
</block>
<block title="Responsibilities – Coordinating security"><paragraph
    title="3.2.12.R.01."

    tags="Governance"


><![CDATA[<p>One of the core roles of the CISO is to ensure appropriate communication between business and information security teams within their agency. This includes interpreting information security concepts and language into business concepts and language as well as ensuring that business teams consult with information security teams to determine appropriate security measures when planning new business projects for the agency.</p>]]></paragraph>
<paragraph
    title="3.2.12.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="327"
><![CDATA[<p>The CISO SHOULD facilitate information security and business alignment and communication through an information security steering committee or advisory board which meets formally and on a regular basis, and comprises key business and ICT executives.</p>]]></paragraph>
<paragraph
    title="3.2.12.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="328"
><![CDATA[<p>The CISO SHOULD be responsible for coordinating information security and security risk management projects between business and information security teams.</p>]]></paragraph>
<paragraph
    title="3.2.12.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="329"
><![CDATA[<p>The CISO SHOULD work with business teams to facilitate security risk analysis and security risk management processes, including the identification of acceptable levels of risk consistently across the agency.</p>]]></paragraph>
</block>
<block title="Responsibilities – Working with ICT projects"><paragraph
    title="3.2.13.R.01."

    tags="Governance"


><![CDATA[<p>As the CISO is responsible for the development of the strategic level information security program within an agency they are best placed to advise ICT projects on the strategic direction of information security within the agency.</p>]]></paragraph>
<paragraph
    title="3.2.13.R.02."

    tags="Governance"


><![CDATA[<p>As the CISO is responsible for the overall management of information security within an agency, they are best placed to recommend to the accreditation authority the acceptance of residual security risks associated with the operation of agency systems.</p>]]></paragraph>
<paragraph
    title="3.2.13.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="333"
><![CDATA[<p>The CISO SHOULD provide strategic level guidance for agency ICT projects and operations.</p>]]></paragraph>
<paragraph
    title="3.2.13.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="334"
><![CDATA[<p class="Normal-nonumbering">The CISO SHOULD liaise with agency technology architecture teams to ensure alignment between security and agency architectures.</p>]]></paragraph>
</block>
<block title="Responsibilities – Working with vendors"><paragraph
    title="3.2.14.R.01."

    tags="Governance"


><![CDATA[<p>Having the CISO coordinate the use of external information security resources will ensure that a consistent approach is being applied across the agency.</p>]]></paragraph>
<paragraph
    title="3.2.14.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="337"
><![CDATA[<p>The CISO SHOULD coordinate the use of external information security resources to the agency including contracting and managing the resources.</p>]]></paragraph>
</block>
<block title="Responsibilities – Budgeting"><paragraph
    title="3.2.15.R.01."

    tags="Governance"


><![CDATA[<p>Controlling the information security budget will ensure that the CISO has sufficient access to funding to support information security projects and initiatives.</p>]]></paragraph>
<paragraph
    title="3.2.15.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="341"
><![CDATA[<p>The CISO SHOULD be responsible for controlling the information security budget.</p>]]></paragraph>
</block>
<block title="Responsibilities – Information security incidents "><paragraph
    title="3.2.16.R.01."

    tags="Governance"


><![CDATA[<p>To ensure that the CISO is able to accurately report to the Agency Head on information security issues within their agency, it is important that they remain fully aware of all information security incidents within their agency.</p>]]></paragraph>
<paragraph
    title="3.2.16.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="345"
><![CDATA[<p>The CISO SHOULD be fully aware of all information security incidents within the agency.</p>]]></paragraph>
</block>
<block title="Responsibilities – Disaster recovery"><paragraph
    title="3.2.17.R.01."

    tags="Governance"


><![CDATA[<p>Restoring business-critical services to an operational state after a disaster is an important function of business continuity. As such it will need high level support from the CISO.</p>]]></paragraph>
<paragraph
    title="3.2.17.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="348"
><![CDATA[<p>The CISO SHOULD coordinate the development of disaster recovery policies and standards within the agency to ensure that business-critical services are supported appropriately and that information security is maintained in the event of a disaster.</p>]]></paragraph>
</block>
<block title="Responsibilities – Training"><paragraph
    title="3.2.18.R.01."

    tags="Governance"


><![CDATA[<p>To ensure personnel within an agency are actively contributing to the information security posture of the agency, an information security awareness and training program will need to be developed. As the CISO is responsible for information security within the agency they will need to oversee the development and operation of the program.</p>]]></paragraph>
<paragraph
    title="3.2.18.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="351"
><![CDATA[<p>The CISO SHOULD be responsible for overseeing the development and operation of information security awareness and training programs within the agency.</p>]]></paragraph>
</block>
<block title="Responsibilities – Providing security knowledge"><paragraph
    title="3.2.19.R.01."

    tags="Governance"


><![CDATA[<p>The CISO is not expected to be a technical expert on all information security matters; however, knowledge of national and international standards and good practice will assist in communicating with technical experts within their agency on information security matters</p>]]></paragraph>
<paragraph
    title="3.2.19.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="354"
><![CDATA[<p>The CISO SHOULD provide authoritative security advice and have familiarity with a range of national and international standards and good practice.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="3.3. Information Technology Security Managers"><subsection title="Objective"><paragraph
    title="3.3.1."


><![CDATA[<p>Information Technology Security Managers (ITSM) provide information security leadership and management within their agency.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="3.3.2."


><![CDATA[<p>This section covers the role of an ITSM with respect to information security within an agency.</p>]]></paragraph>
</block>
<block title="Information technology security managers"><paragraph
    title="3.3.3."


><![CDATA[<p>ITSMs are executives within an agency that act as a conduit between the strategic directions provided by the CISO and the technical efforts of systems administrators. The main area of responsibility of an ITSM is that of the administrative and process controls relating to information security within the agency.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Requirement for ITSMs"><paragraph
    title="3.3.4.R.01."

    tags="Governance"


><![CDATA[<p>When agencies outsource their ICT services, ITSMs should be independent of any company providing ICT services. This will prevent any conflict of interest for an ITSM in conducting their duties.</p>]]></paragraph>
<paragraph
    title="3.3.4.R.02."

    tags="Governance"


><![CDATA[<p>Ensure that the agency has a point of presence at sites to assist with monitoring information security for systems and responding to any information security incidents.</p>]]></paragraph>
<paragraph
    title="3.3.4.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="367"
><![CDATA[<p>Agencies MUST appoint at least one ITSM within their agency.</p>]]></paragraph>
<paragraph
    title="3.3.4.C.02."

    tags="Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="368"
><![CDATA[<p>ITSMs MUST be:</p><ul>
<li>cleared for access to all classified information processed by the agency’s systems; and</li>
<li>able to be briefed into any compartmented information on the agency’s systems.</li>
</ul>]]></paragraph>
<paragraph
    title="3.3.4.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="369"
><![CDATA[<p>Where an agency is spread across a number of geographical sites, it is recommended that the agency SHOULD appoint a local ITSM at each major site.</p>]]></paragraph>
<paragraph
    title="3.3.4.C.04."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="370"
><![CDATA[<p>The ITSM role SHOULD be undertaken by personnel with an appropriate level of authority and training based on the size of the agency or their area of responsibility within the agency.</p>]]></paragraph>
<paragraph
    title="3.3.4.C.05."

    tags="Governance"


    classification="All Classifications"
    compliance="Should Not"
    cid="371"
><![CDATA[<p>ITSMs SHOULD NOT have additional responsibilities beyond those needed to fulfil the role as outlined within this manual.</p>]]></paragraph>
</block>
<block title="Responsibilities – Security programs"><paragraph
    title="3.3.5.R.01."

    tags="Governance"


><![CDATA[<p>As ITSMs undertake operational management of information security within an agency they can provide valuable input to the development of the information security program by the CISO.</p>]]></paragraph>
<paragraph
    title="3.3.5.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="375"
><![CDATA[<p>ITSMs SHOULD work with the CISO to develop an information security program within the agency.</p>]]></paragraph>
<paragraph
    title="3.3.5.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="376"
><![CDATA[<p>ITSMs SHOULD undertake and manage projects to address identified security risks.</p>]]></paragraph>
</block>
<block title="Responsibilities – Working with ICT projects"><paragraph
    title="3.3.6.R.01."

    tags="Governance"


><![CDATA[<p>As ITSMs have knowledge of all aspects of information security they are best placed to work with ICT projects within the agency to identify and incorporate appropriate information security measures.</p>]]></paragraph>
<paragraph
    title="3.3.6.C.01."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="379"
><![CDATA[<p>ITSMs MUST be responsible for assisting system owners to obtain and maintain the accreditation of their systems.</p>]]></paragraph>
<paragraph
    title="3.3.6.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="380"
><![CDATA[<p>ITSMs SHOULD identify systems that require security measures and assist in the selection of appropriate information security measures for such systems.</p>]]></paragraph>
<paragraph
    title="3.3.6.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="381"
><![CDATA[<p>ITSMs SHOULD consult with ICT project personnel to ensure that information security is included in the evaluation, selection, installation, configuration and operation of IT equipment and software.</p>]]></paragraph>
<paragraph
    title="3.3.6.C.04."

    tags="Governance,Risk Assessment"


    classification="All Classifications"
    compliance="Should"
    cid="382"
><![CDATA[<p>ITSMs SHOULD work with agency enterprise architecture teams to ensure that security risk assessments are incorporated into system architectures and to identify, evaluate and select information security solutions to meet the agency’s security objectives.</p>]]></paragraph>
<paragraph
    title="3.3.6.C.05."

    tags="Governance,Risk Management,Change Management"


    classification="All Classifications"
    compliance="Should"
    cid="384"
><![CDATA[<p>ITSMs SHOULD be included in the agency’s change management and change control processes to ensure that risks are properly identified and controls are properly applied to manage those risks.</p>]]></paragraph>
<paragraph
    title="3.3.6.C.06."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Should"
    cid="385"
><![CDATA[<p>ITSMs SHOULD notify the Accreditation Authority of any significant change that may affect the accreditation of that system.</p>]]></paragraph>
</block>
<block title="Responsibilities – Working with vendors"><paragraph
    title="3.3.7.R.01."

    tags="Governance"


><![CDATA[<p>The CISO will coordinate the use of external information security resources to the agency, whilst ITSMs will be responsible for establishing contracts and service-level agreements on behalf of the CISO.</p>]]></paragraph>
<paragraph
    title="3.3.7.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="388"
><![CDATA[<p>ITSMs SHOULD liaise with vendors and agency purchasing and legal areas to establish mutually acceptable information security contracts and service-level agreements.</p>]]></paragraph>
</block>
<block title="Responsibilities – Implementing security"><paragraph
    title="3.3.8.R.01."

    tags="Governance"


><![CDATA[<p>The CISO will set the strategic direction for information security within the agency, whereas ITSMs are responsible for managing the implementation of information security measures within the agency.</p>]]></paragraph>
<paragraph
    title="3.3.8.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="391"
><![CDATA[<p>ITSMs MUST be responsible for ensuring the development, maintenance, updating and implementation of Security Risk Management Plans (SRMPs), Systems Security Plans (SSP) and any Standard Operating Procedures (SOPs) for all agency systems.</p>]]></paragraph>
<paragraph
    title="3.3.8.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="392"
><![CDATA[<p>ITSMs SHOULD conduct security risk assessments on the implementation of new or updated IT equipment or software in the existing environment and develop treatment strategies if necessary.</p>]]></paragraph>
<paragraph
    title="3.3.8.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="393"
><![CDATA[<p>ITSMs SHOULD select and coordinate the implementation of controls to support and enforce information security policies.</p>]]></paragraph>
<paragraph
    title="3.3.8.C.04."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="394"
><![CDATA[<p>ITSMs SHOULD provide leadership and direction for the integration of information security strategies and architecture with agency business and ICT strategies and architecture.</p>]]></paragraph>
<paragraph
    title="3.3.8.C.05."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="395"
><![CDATA[<p>ITSMs SHOULD provide technical and managerial expertise for the administration of information security management tools.</p>]]></paragraph>
</block>
<block title="Responsibilities – Budgeting"><paragraph
    title="3.3.9.R.01."

    tags="Governance"


><![CDATA[<p>As ITSMs are responsible for the operational management of information security projects and functions within their agency, they will be aware of their funding requirements and can assist the CISO to develop information security budget projections and resource allocations.</p>]]></paragraph>
<paragraph
    title="3.3.9.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="398"
><![CDATA[<p>ITSMs SHOULD work with the CISO to develop information security budget projections and resource allocations based on short-term and long-term goals and objectives.</p>]]></paragraph>
</block>
<block title="Responsibilities – Reporting"><paragraph
    title="3.3.10.R.01."

    tags="Governance"


><![CDATA[<p>To ensure the CISO remains aware of all information security issues within their agency, and can brief their agency head when necessary, ITSMs will need to provide regular reports on policy developments, proposed system changes and enhancements, information security incidents and other areas of particular concern to the CISO.</p>]]></paragraph>
<paragraph
    title="3.3.10.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="401"
><![CDATA[<p>ITSMs SHOULD coordinate, measure and report on technical aspects of information security management.</p>]]></paragraph>
<paragraph
    title="3.3.10.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="402"
><![CDATA[<p>ITSMs SHOULD monitor and report on compliance with information security policies, as well as the enforcement of information security policies within the agency.</p>]]></paragraph>
<paragraph
    title="3.3.10.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="403"
><![CDATA[<p>ITSMs SHOULD provide regular reports on information security incidents and other areas of particular concern to the CISO.</p>]]></paragraph>
<paragraph
    title="3.3.10.C.04."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="404"
><![CDATA[<p>ITSMs SHOULD assess and report on threats, vulnerabilities, and residual security risks and recommend remedial actions.</p>]]></paragraph>
</block>
<block title="Responsibilities – Auditing"><paragraph
    title="3.3.11.R.01."

    tags="Governance"


><![CDATA[<p>As system owners may not understand the results of audits against their systems ITSMs will need to assist them in understanding and responding to reported audit failures. ITSM's should also refer to 5.8 Independent Assurance Reports.  </p>]]></paragraph>
<paragraph
    title="3.3.11.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="407"
><![CDATA[<p>ITSMs SHOULD assist system owners and security personnel in understanding and responding to audit failures reported by auditors.</p>]]></paragraph>
</block>
<block title="Responsibilities – Disaster recovery"><paragraph
    title="3.3.12.R.01."

    tags="Governance"


><![CDATA[<p>Whilst the CISO will coordinate the development of disaster recovery policies and standards within the agency, ITSMs will need to guide the selection of appropriate strategies to achieve the direction set by the CISO.</p>]]></paragraph>
<paragraph
    title="3.3.12.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="410"
><![CDATA[<p>ITSMs SHOULD assist and guide the disaster recovery planning team in the selection of recovery strategies and the development, testing and maintenance of disaster recovery plans.</p>]]></paragraph>
</block>
<block title="Responsibilities – Training"><paragraph
    title="3.3.13.R.01."

    tags="Governance"


><![CDATA[<p>The CISO will oversee the development and operation of information security awareness and training programs within the agency. ITSMs will arrange delivery of that training to personnel within the agency.</p>]]></paragraph>
<paragraph
    title="3.3.13.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="413"
><![CDATA[<p>ITSMs SHOULD provide or arrange for the provision of information security awareness and training for all agency personnel.</p>]]></paragraph>
<paragraph
    title="3.3.13.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="414"
><![CDATA[<p>ITSMs SHOULD develop technical information materials and workshops on information security trends, threats, good practices and control mechanisms as appropriate.</p>]]></paragraph>
</block>
<block title="Responsibilities – Providing security knowledge"><paragraph
    title="3.3.14.R.01."

    tags="Governance"


><![CDATA[<p>ITSMs will often have an extensive knowledge of information security topics and can provide advice for the information security steering committee, change management committee and other agency and inter-agency committees.</p>]]></paragraph>
<paragraph
    title="3.3.14.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="418"
><![CDATA[<p>ITSMs SHOULD maintain a current and up-to-date security knowledge base comprising of a technical reference library, security advisories and alerts, information on information security trends and practices, and relevant laws, regulations, standards and guidelines.</p>]]></paragraph>
<paragraph
    title="3.3.14.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="419"
><![CDATA[<p>ITSMs SHOULD provide expert guidance on security matters for ICT projects.</p>]]></paragraph>
<paragraph
    title="3.3.14.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="420"
><![CDATA[<p>ITSMs SHOULD provide technical advice for the information security steering committee, change management committee and other agency and inter-agency committees as required.</p>]]></paragraph>
</block>
<block title="Responsibilities"><paragraph
    title="3.3.15.R.01."

    tags="Governance"


><![CDATA[<p>ITSMs are generally considered the information security experts within an agency and as such their contribution to improving the information security of systems, providing input to agency ICT projects, assisting other security personnel within the agency, contributing to information security training and responding to information security incidents is a core aspect of their work.</p>]]></paragraph>
<paragraph
    title="3.3.15.R.02."

    tags="Governance"


><![CDATA[<p>An ITSM is likely to have the most up to date and accurate understanding of the threat environment relating to systems. As such, it is essential that this information is passed to system owners to ensure that it is considered during accreditation activities.</p>]]></paragraph>
<paragraph
    title="3.3.15.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="424"
><![CDATA[<p>The ITSM SHOULD keep the CISO and system owners informed with up-to-date information on current threats.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="3.4. System Owners"><subsection title="Objective"><paragraph
    title="3.4.1."


><![CDATA[<p class="NormS3C4">All systems are allocated a <b>system owner</b> who has responsibility for the overall operation, including obtaining and maintaining any certification and accreditation, of the allocated system(s).</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="3.4.2."


><![CDATA[<p>This section covers the role that system owners undertake with respect to information security.</p>]]></paragraph>
<paragraph
    title="3.4.3."


><![CDATA[<p class="NormS3C4">System owners are responsible for the overall operation of the system, including any outsourced services such as support, telecommunications and cloud.</p>]]></paragraph>
<paragraph
    title="3.4.4."


><![CDATA[<p class="NormS3C4">System owners MUST ensure their systems are certified and accredited to meet their agency’s operational requirements and that this status in maintained.</p>]]></paragraph>
</block>
<block title="Assertions in Certification and Accreditation"><paragraph
    title="3.4.5."


><![CDATA[<p>Originating in financial auditing, assertions are now widely used as the basis for assurance processes covering a wide range of business activities and the related technology.</p>]]></paragraph>
<paragraph
    title="3.4.6."


><![CDATA[<p>Assertions are formal statements by management or system owners. They are claims on the completeness, accuracy and validity of events, presentations, disclosure, transactions and related assurance, risk and governance aspects of certification and accreditation.</p>]]></paragraph>
<paragraph
    title="3.4.7."


><![CDATA[<p>It is the responsibility of the management (or system owner) to prepare and validate assertions relating to the governance, assurance and security of information systems, in accordance with national policy and related standards.</p>]]></paragraph>
<paragraph
    title="3.4.8."


><![CDATA[<p>When such assertions are made it means management (or system owners) have presented and disclosed information appropriately giving a true, fair and balanced view of the activities. In preparing assertions, implicit and explicit claims are made on the validity and completeness of the assertions.</p>]]></paragraph>
<paragraph
    title="3.4.9."


><![CDATA[<p>Assertions are typically characterised as follows:</p><p><strong>Transactions and events</strong></p><ul>
<li>Occurrence — the activities recorded have actually taken place.</li>
<li>Completeness — all aspects are properly recorded.</li>
<li>Accuracy — the assets and activities are accurately allocated and recorded.</li>
<li>Cutoff — the activities have been recorded in the correct time period.</li>
<li>Classifications — are accurate and appropriate.</li>
</ul><p><strong>Position on project completion</strong></p><ul>
<li>Existence — assets, liabilities and equity balances exist.</li>
<li>Rights and Obligations — the entity legally controls rights to its assets and its liabilities and accurately records obligations.</li>
<li>Completeness — all aspects are properly recorded.</li>
<li>Valuation and Allocation — costs and assets appropriately valued and allocated.</li>
</ul><p><strong>Presentation and disclosure</strong></p><ul>
<li>Occurrence — the events and implementations have actually occurred.</li>
<li>Rights and Obligations — contracts, licences, support and supply agreements</li>
<li>Completeness — all disclosures have been included in the statements.</li>
<li>Classification — statements are clear and appropriately presented.</li>
<li>Accuracy and Valuation — information is disclosed at the appropriate amounts.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Requirement for system owners"><paragraph
    title="3.4.10.R.01."

    tags="Governance"


><![CDATA[<p>The system owner is responsible for the overall operation of the system, including any directly related support or outsourced service such as cloud. They may delegate the day-to-day management and operation of the system to a system manager or managers.</p>]]></paragraph>
<paragraph
    title="3.4.10.R.02."

    tags="Governance"


><![CDATA[<p>All systems should have a system owner in order to ensure IT governance processes are followed and that business requirements are met.</p>]]></paragraph>
<paragraph
    title="3.4.10.R.03."

    tags="Governance"


><![CDATA[<p>It is strongly recommended that a system owner be a member of the Senior Executive Team or in an equivalent management position, however this does not imply that the system manager(s) should also be at such a level.</p>]]></paragraph>
<paragraph
    title="3.4.10.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="442"
><![CDATA[<p>Each system MUST have a system owner who is responsible for the operation and maintenance of the system.</p>]]></paragraph>
<paragraph
    title="3.4.10.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="443"
><![CDATA[<p>System owners SHOULD be a member of the Senior Executive Team or an equivalent management position, for large or critical agency systems.</p>]]></paragraph>
</block>
<block title="Accreditation responsibilities"><paragraph
    title="3.4.11.R.01."

    tags="Governance,Accreditation"


><![CDATA[<p>The system owner is responsible for the operation of their system and as such they need to ensure that systems are accredited to meet the agency’s operational requirements. If modifications are undertaken to a system the system owner will need to ensure that the changes are undertaken in an appropriate manner, documented adequately and that any necessary reaccreditation activities are completed.</p>]]></paragraph>
<paragraph
    title="3.4.11.C.01."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="446"
><![CDATA[<p>System owners MUST obtain and maintain accreditation of their system(s).</p>]]></paragraph>
</block>
<block title="Documentation responsibilities"><paragraph
    title="3.4.12.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p class="Normal-nonumbering">The system owner is responsible for ensuring the development, maintenance and implementation of Systems Information Security documentation, in particular the Security Risk Management Plans (SRMPs), System Security Plans (SSPs) and Standard Operating Procedures (SOPs).</p>]]></paragraph>
<paragraph
    title="3.4.12.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The system owner should involve security personnel in the process of developing, redeveloping or updating Systems Information Security documentation, to ensure that a holistic approach to information security is mapped to the system owner’s understanding of security risks for their specific system. Information security documentation is detailed in&nbsp;<a title="Information Security Documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 - Information Security documentation</a>. Refer also to&nbsp;<a title="System Certification &amp; Accreditation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 - System Certification and Accreditation</a>.</p>]]></paragraph>
<paragraph
    title="3.4.12.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="449"
><![CDATA[<p>System owners MUST ensure the development, maintenance and implementation of complete, accurate and up to date Information Security documentation for systems under their ownership. Such actions MUST be documented.</p>]]></paragraph>
<paragraph
    title="3.4.12.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="450"
><![CDATA[<p>System Owners MUST involve the ITSM in the redevelopment and updates of the Information Security documentation.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="3.5. System Users"><subsection title="Objective"><paragraph
    title="3.5.1."


><![CDATA[<p>System users comply with information security policies and procedures within their agency.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="3.5.2."


><![CDATA[<p>This section covers the role that system users undertake with respect to information security.</p>]]></paragraph>
</block>
<block title="Types of system users"><paragraph
    title="3.5.3."


><![CDATA[<p>This section covers responsibilities for all system users i.e. users with general access (general users), and users with privileged access (privileged users).</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Responsibilities of system users"><paragraph
    title="3.5.4.R.01."

    tags="Governance"


><![CDATA[<p>If agencies fail to develop and maintain a security culture where system users are complying with relevant security policies and procedures for the systems they are using, there is an increased security risk of a system user unwittingly assisting with an attack against a system.</p>]]></paragraph>
<paragraph
    title="3.5.4.R.02."

    tags="Governance"


><![CDATA[<p>Security policies, procedures and mechanisms aim to cover all situations that may arise within an agency. However there may be legitimate reasons for a system user to bypass security policies, procedures or mechanisms. If this is the case, the system user MUST seek formal authorisations from the CISO or the ITSM (if this authority has been specifically delegated to the ITSM) before any actions are undertaken.</p>]]></paragraph>
<paragraph
    title="3.5.4.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="466"
><![CDATA[<p>All system users MUST comply with the relevant security policies and procedures for the systems they use.</p>]]></paragraph>
<paragraph
    title="3.5.4.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="467"
><![CDATA[<p>All system users MUST:</p><ul>
<li>protect account authenticators at the same classification of the system it secures;</li>
<li>not share authenticators for accounts without approval;</li>
<li>be responsible for all actions under their accounts; and</li>
<li>use their access to only perform authorised tasks and functions.</li>
</ul>]]></paragraph>
<paragraph
    title="3.5.4.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="468"
><![CDATA[<p>System users that need to bypass security policies, procedures or mechanisms for any reason MUST seek formal authorisation from the CISO or the ITSM if this authority has been specifically delegated to the ITSM.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="4. System Certification and Accreditation"><section title="4.1. The Certification and Accreditation Process"><subsection title="Objective"><paragraph
    title="4.1.1."


><![CDATA[<p>Executives and Security Practitioners understand and enforce the use of the Certification and Accreditation (C&amp;A) process and its role in information security governance and assurance.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="4.1.2."


><![CDATA[<p>This section provides a short, high-level description of the C&amp;A process.</p>]]></paragraph>
<paragraph
    title="4.1.3."


><![CDATA[<p>This section must be read in conjunction with the Roles and Responsibilities described in <a title="Roles and responsibilities" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12255">Chapter 3</a>. Subsequent sections of this chapter describe elements of the C&amp;A process in more detail.</p>]]></paragraph>
</block>
<block title="The Process"><paragraph
    title="4.1.4."


><![CDATA[<p>Certification and Accreditation is a fundamental governance and assurance process, designed to provide the Board, Chief Executive and senior executives confidence that information and its associated technology are well-managed, that risks are properly identified and mitigated and that governance responsibilities can demonstrably be met. It is essential for credible and effective information assurance governance.</p>]]></paragraph>
<paragraph
    title="4.1.5."


><![CDATA[<p>C&amp;A has two important stages where certification must be completed before accreditation can take place. It is based on an assessment of risk, the application of controls described in the NZISM and determination of any residual risk.</p>]]></paragraph>
<paragraph
    title="4.1.6."


><![CDATA[<p>Certification and Accreditation are separate and distinct elements, demonstrate segregation of duties and assist in managing any potential conflicts of interest. These are important attributes in good governance systems.</p>]]></paragraph>
<paragraph
    title="4.1.7."


><![CDATA[<p>The acceptance of residual risk lies with the Chief Executive of each agency, or lead agency where sector, multi-agency or All-of-Government (AoG) systems are implemented.</p>]]></paragraph>
<paragraph
    title="4.1.8."


><![CDATA[<p>An exception applies where High Assurance Cryptographic Equipment (HACE) is required or caveated or compartmented information is processed, stored or communicated. In this case the Director-General, GCSB is the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="4.1.9."


><![CDATA[<p>The complete C&amp;A process has several elements and stages, illustrated in the Block Diagram at the end of this section.</p>]]></paragraph>
</block>
<block title="Key Participants"><paragraph
    title="4.1.10."


><![CDATA[<p>There are four groups of participants:</p><ul>
<li><strong>System Owners</strong>, responsible for the design, development, system documentation and system maintenance, including any requests for recertification or reaccreditation.</li>
<li>The <strong>Certification Authority</strong>, responsible for the review of information and documentation provided by the system owner to ensure the ICT system complies with minimum standards and the agreed design.</li>
<li>The <strong>Assessor</strong> or Auditor, who will conduct inspections, audits and review as instructed by the Certification Authority.</li>
<li>The <strong>Accreditation Authority</strong> will consider the recommendation of the Certification Authority. If the level of residual risk is acceptable, the Accreditation Authority will issue the system accreditation (the formal authority to operate a system).</li>
</ul>]]></paragraph>
</block>
<block title="Certification"><paragraph
    title="4.1.11."


><![CDATA[<p>Certification is the assertion that an ICT system including any related or support services such as Telecommunications or cloud comply with the minimum standards and controls described in the NZISM, any relevant legislation and regulation and other relevant standards. It is based on a comprehensive evaluation or systems audit. This process is described in <a title="Conducting certifications" href="http://nzism.gcsb.govt.nz/ism-document#Section-12507">Section 4.2 – Conducting Certifications</a>.</p>]]></paragraph>
<paragraph
    title="4.1.12."


><![CDATA[<p>Certification is evidence that due consideration has been paid to risk, security, functionality, business requirements and is a fundamental part of information systems governance and assurance.</p>]]></paragraph>
</block>
<block title="Certification Authorities"><paragraph
    title="4.1.13."


><![CDATA[<p>For all agency information systems the certification authority is the CISO unless otherwise delegated by the Agency Head.</p>]]></paragraph>
<paragraph
    title="4.1.14."


><![CDATA[<p>For external organisations or service providers supporting agencies, the certification authority is the CISO of the agency.</p>]]></paragraph>
<paragraph
    title="4.1.15."


><![CDATA[<p>For multi-national, multi-agency, and AoG systems the certification authority is determined by a formal agreement between the parties involved. Within NZ this is usually the lead agency.</p>]]></paragraph>
</block>
<block title="Accreditation"><paragraph
    title="4.1.16."


><![CDATA[<p>Accreditation is the formal authority to operate a system, evidence that governance requirements have been addressed and that the Chief Executive has fulfilled the requirement to manage risk on behalf of the organisation and stakeholders. This element of the C&amp;A process is described in <a title="Accreditation framework" href="http://nzism.gcsb.govt.nz/ism-document#Section-12591">Section 4.4 – Accreditation Framework</a>.</p>]]></paragraph>
<paragraph
    title="4.1.17."


><![CDATA[<p>Accreditation ensures that either sufficient security measures have been put in place to protect information that is processed, stored or communicated by the system or that deficiencies in such measures have been identified, assessed and acknowledged, including the acceptance of any residual risk.</p>]]></paragraph>
</block>
<block title="Accreditation Authority"><paragraph
    title="4.1.18."


><![CDATA[<p>For agencies the Accreditation Authority is the agency head or their formally authorised delegate.</p>]]></paragraph>
<paragraph
    title="4.1.19."


><![CDATA[<p>For multi-national, multi-agency systems or AoG systems, the Accreditation Authority is determined by a formal agreement between the parties involved.</p>]]></paragraph>
<paragraph
    title="4.1.20."


><![CDATA[<p>In all cases the Accreditation Authority will be at least a senior executive who has an appropriate level of understanding of the security risks they are accepting on behalf of the agency.</p>]]></paragraph>
<paragraph
    title="4.1.21."


><![CDATA[<p>Depending on the circumstances and practices of an agency, the agency head could choose to delegate their authority to multiple senior executives who have the authority to accept security risks for the specific business functions within the agency.</p>]]></paragraph>
</block>
<block title="Conflicts of Interest"><paragraph
    title="4.1.22."


><![CDATA[<p>A conflict of interest is a situation in which a person has duties or responsibilities to more than one person, organisation or elements of a process, but is placed in a position where they cannot do justice to all. This includes, for example, when an individual's vested interests or concerns are inconsistent with organisational outcomes, or when an official has conflicting responsibilities. In the context of the C&amp;A process, a conflict of interest can occur when an individual has multiple roles, such as being both the system owner and the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="4.1.23."


><![CDATA[<p>A conflict of interest has the potential to undermine impartiality and integrity of a process and the people involved in a process. It will also undermine the integrity of governance and information assurance derived from the C&amp;A process.</p>]]></paragraph>
<paragraph
    title="4.1.24."


><![CDATA[<p>Conflicts of interest are normally managed though segregation of duties, the division of <strong>roles</strong> and <strong>responsibilities</strong> in order to reduce the ability or opportunity for an individual to compromise a critical process. Segregation of duties also reduces errors of interpretation or judgement and better manages risk.</p>]]></paragraph>
<paragraph
    title="4.1.25."


><![CDATA[<p>It is important to note that in the C&amp;A process in the NZISM, the Certification Authority, System Owner and Accreditation Authority are <em>independent</em> of each other. In smaller agencies, the Assessor may also be the Certification Authority. Ideally this role will also be segregated.</p>]]></paragraph>
</block>
<block title="Penetration Testing"><paragraph
    title="4.1.26."


><![CDATA[<p>Penetration tests are an effective method of identifying vulnerabilities in a system or network, and testing existing security measures and the implementation of controls. Penetration testing is also very useful in validating the effectiveness of the defensive mechanisms. This testing provides an increased level of assurance when system certification and accreditation is undertaken. It also demonstrates prudent risk management.</p>]]></paragraph>
<paragraph
    title="4.1.27."


><![CDATA[<p>A penetration test usually involves the use of intrusive methods or attacks conducted by trusted individuals, methods similar to those used by intruders or hackers. Care must be taken not to adversely affect normal operations while these tests are conducted.</p>]]></paragraph>
<paragraph
    title="4.1.28."


><![CDATA[<p>Organisations may conduct their own tests and regular simple tests are effective in maintaining the organisation’s security posture. Because of the level of expertise required to effectively conduct more complex testing, comprehensive penetration tests are often outsourced to specialist organisations.</p>]]></paragraph>
<paragraph
    title="4.1.29."


><![CDATA[<p>Penetration tests can range from simple scans of IP addresses in order to identify devices or systems offering services with known vulnerabilities, to exploiting known vulnerabilities that exist in an unpatched operating system, applications or other software. The results of these tests or attacks are recorded, analysed, documented and presented to the owner of the system. Any deficiencies should then be addressed.</p>]]></paragraph>
</block>
</subsection>
<subsection title="System Certification and Accreditation Diagram"><paragraph
    title="4.1.30."


><![CDATA[<p><img class="leftAlone" title="" src="assets/NZISM/4.1.30-System-Certification-and-Accreditation-Block-Diagram-updated-2020.png" alt="" width="572" height="782"></p>]]></paragraph>
 </subsection>
<subsection title="References"><paragraph
    title="4.1.31."


><![CDATA[<p>Additional information relating to systems governance, certification and accreditation can be found at:</p>
<table class="table-main" style="width: 100%;">
<tbody>
<tr>
<td style="width: 33%;"><strong>Reference</strong></td>
<td style="width: 33%;"><strong>Title</strong></td>
<td style="width: 33%; text-align: center;"><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;">
<p><strong>Office of the Auditor-General - Managing conflicts of interest: A Guide for the public sector</strong></p>
</td>
<td style="width: 33%; text-align: center;">&nbsp;Office of the Auditor-General</td>
<td style="width: 33%;"><a title="Managing Conflicts of Interest: A guide for the public sector" rel="noopener noreferrer" href="https://oag.parliament.nz/2020/conflicts/docs/conflicts-of-interest.pdf" target="_blank">https://oag.parliament.nz/2020/conflicts/docs/conflicts-of-interest.pdf [PDF, 445 KB]</a></td>
</tr>
<tr>
<td style="width: 33%;">
<p><strong><strong>ISO/IEC 27000:2018</strong></strong></p>
</td>
<td style="width: 33%;">
<p><strong>Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary</strong></p>
</td>
<td style="width: 33%; text-align: center;">ISO</td>
<td style="width: 33%;">
<p><a href="https://www.iso.org/standard/73906.html">ISO - ISO/IEC 27000:2018 - Information technology — Security techniques — Information security management systems — Overview and vocabulary</a><a title="ISO/IEC 27000:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/73906.html" target="_blank"></a></p>
</td>
</tr>
<tr>
<td style="width: 33%;">
<p><strong><strong>ISO/IEC 27001:2013&nbsp;</strong></strong></p>
</td>
<td style="width: 33%;">
<p><strong>Information technology -- Security techniques -- Information security management systems -- Requirements</strong></p>
</td>
<td style="width: 33%; text-align: center;">ISO</td>
<td style="width: 33%;"><a href="https://www.iso.org/standard/54534.html">ISO - ISO/IEC 27001:2013 - Information technology — Security techniques — Information security management systems — Requirements</a></td>
</tr>
<tr>
<td style="width: 33%;">
<p><strong><strong>ISO/IEC 27002:2022</strong></strong></p>
</td>
<td style="width: 33%;"><strong><strong><span>Information security, cybersecurity, and privacy protection — Information security controls</span></strong></strong></td>
<td style="width: 33%; text-align: center;">ISO</td>
<td style="width: 33%;"><a href="https://www.iso.org/standard/75652.html">ISO - ISO/IEC 27002:2022 - Information security, cybersecurity and privacy protection — Information security controls</a></td>
</tr>
<tr>
<td style="width: 33%;">
<p><strong><strong>ISO/IEC 27006:2015</strong></strong></p>
</td>
<td style="width: 33%;">
<p><strong>Information Technology – Security Techniques - Requirements for bodies providing audit and certification of information security management systems</strong></p>
</td>
<td style="width: 33%; text-align: center;">ISO</td>
<td style="width: 33%;">
<p><a href="https://www.iso.org/standard/62313.html">ISO - ISO/IEC 27006:2015 - Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems</a><a rel="noopener noreferrer" href="http://www.standards.co.nz" target="_blank"><br></a></p>
</td>
</tr>
<tr>
<td style="width: 33%;">
<p><strong><strong>ISO/IEC 27007:2020</strong></strong></p>
</td>
<td style="width: 33%;">
<p><strong>Information Technology – Security Techniques - Guidelines for information security management systems auditing</strong></p>
</td>
<td style="width: 33%; text-align: center;">ISO</td>
<td style="width: 33%;">
<p><a href="https://www.iso.org/standard/77802.html">ISO - ISO/IEC 27007:2020 - Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing</a><a rel="noopener noreferrer" href="http://www.standards.co.nz" target="_blank"><br></a></p>
</td>
</tr>
<tr>
<td style="width: 33%;">
<p><strong><strong>NIST SP 800-37 Rev. 1, Feb 2010&nbsp;</strong></strong></p>
</td>
<td style="width: 33%;">
<p><strong>Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach</strong></p>
</td>
<td style="width: 33%; text-align: center;">NIST</td>
<td style="width: 33%;"><a title="NIST SP 800-37 Rev. 1, Feb 2010" rel="noopener noreferrer" href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf" target="_blank">http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf [PDF, 1.51 MB]</a></td>
</tr>
<tr>
<td style="width: 33%;"><strong><strong>NIST SP 800-171, Feb&nbsp; 2020&nbsp;</strong></strong></td>
<td style="width: 33%;"><strong>Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations</strong></td>
<td style="width: 33%; text-align: center;">NIST</td>
<td style="width: 33%;"><a title="NIST SP 800-171, Feb 2020" rel="noopener noreferrer" href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf" target="_blank">http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r2.pdf [PDF, 880 KB]</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;">
<p><strong>Mitre Engineering Guide - Create and Assess Certification and Accreditation Strategies</strong></p>
</td>
<td style="width: 33%; text-align: center;">MITRE</td>
<td style="width: 33%;">
<p><a title="Mitre Engineering Guide - Create and Assess Certification and Accreditation Strategies" rel="noopener noreferrer" href="http://www.mitre.org/publications/systems-engineering-guide/se-lifecycle-building-blocks/test-and-evaluation/" target="_blank">http://www.mitre.org/publications/systems-engineering-guide/se-lifecycle-building-blocks/test-and-evaluation/</a></p>
</td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;"><strong>RAND National Defense Research Institute - Implications of Aggregated DoD Information Systems for Information Assurance Certification and Accreditation</strong></td>
<td style="width: 33%; text-align: center;">&nbsp;RAND Corporation</td>
<td style="width: 33%;"><a title="RAND - Implications of Aggregated DoD Information Systems for Information Assurance Certification and Accreditation" rel="noopener noreferrer" href="http://www.rand.org/content/dam/rand/pubs/monographs/2010/RAND_MG951.pdf" target="_blank">http://www.rand.org/content/dam/rand/pubs/monographs/2010/RAND_MG951.pdf [PDF, 662 KB]</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;"><strong>An Introduction to Certification and Accreditation</strong></td>
<td style="width: 33%; text-align: center;">&nbsp;SANS Institute</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.sans.org/white-papers/1259/" target="_blank">https://www.sans.org/white-papers/1259/</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;">
<p><strong>A Certification and Accreditation Plan for Information Systems Security Programs (Evaluating the Eff)</strong></p>
</td>
<td style="width: 33%; text-align: center;">&nbsp;SANS Institute</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.sans.org/white-papers/597/" target="_blank">https://www.sans.org/white-papers/597/</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;">
<p><strong>SANS Institute InfoSec Reading Room, Conducting a Penetration Test on an Organization,</strong></p>
</td>
<td style="width: 33%; text-align: center;">&nbsp;SANS Institute</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.sans.org/white-papers/67/" target="_blank">https://www.sans.org/white-papers/67/</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;">
<p><strong>Managing Conflict of Interest in the Public Service - OECD GUIDELINES AND COUNTRY EXPERIENCES</strong></p>
</td>
<td style="width: 33%; text-align: center;">&nbsp;OECD</td>
<td style="width: 33%;"><a title="Managing Conflict of Interest in the Public Service - OECD GUIDELINES AND COUNTRY EXPERIENCES" rel="noopener noreferrer" href="http://www.oecd.org/gov/ethics/48994419.pdf" target="_blank">http://www.oecd.org/gov/ethics/48994419.pdf [PDF, 2.59 MB]</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;"><strong>Data Security Standard (DSS) Information Supplement, March 2008, PCI Security Standards Council,</strong></td>
<td style="width: 33%; text-align: center;">PCI Security Standards</td>
<td style="width: 33%;"><a title="Data Security Standard (DSS) Information Supplement" rel="noopener noreferrer" href="https://www.pcisecuritystandards.org/documents/information_supplement_11.3.pdf" target="_blank">https://www.pcisecuritystandards.org/documents/information_supplement_11.3.pdf [PDF, 1.44 MB]</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;"><strong>OWASP Top Ten for 2021</strong></td>
<td style="width: 33%; text-align: center;">OWASP</td>
<td style="width: 33%;"><a href="https://owasp.org/www-project-top-ten/">OWASP Top Ten | OWASP Foundation</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;"><strong>OWASP Web security testing guide</strong></td>
<td style="width: 33%; text-align: center;">&nbsp;OWASP</td>
<td style="width: 33%;"><a href="https://owasp.org/www-project-web-security-testing-guide/">OWASP Web Security Testing Guide | OWASP Foundation</a></td>
</tr>
<tr>
<td style="width: 33%;"><strong><strong><strong>International Standard on Assurance Engagements (ISAE)</strong>&nbsp;3402</strong></strong></td>
<td style="width: 33%;"><strong>Assurance Reports on Controls at a Service Organization</strong></td>
<td style="width: 33%; text-align: center;">International Federation of Accountants (IFAC)</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.ifac.org/system/files/downloads/b014-2010-iaasb-handbook-isae-3402.pdf" target="_blank">https://www.ifac.org/system/files/downloads/b014-2010-iaasb-handbook-isae-3402.pdf [PDF, 212 KB]</a></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="4.1.32."


><![CDATA[<p>Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 102.125%;">
<tbody>
<tr>
<td style="width: 13.4876%;">
<p><strong>Reference</strong></p>
</td>
<td style="width: 33.4741%;">
<p><strong>Title</strong></p>
</td>
<td style="width: 53.0919%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 13.4876%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 33.4741%;">GOV2, GOV6, GOV7, GOV8,&nbsp;INFOSEC1, INFOSEC2,&nbsp;INFOSEC3, INFOSEC4,&nbsp;PHYSEC1&nbsp;and&nbsp;PHYSEC2</td>
<td style="width: 53.0919%;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<p><a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></p>
</td>
</tr>
<tr>
<td style="width: 13.4876%;">
<p><strong>PSR requirements sections</strong></p>
</td>
<td style="width: 33.4741%;">
<p>Self assessment and reporting</p>
<p>&nbsp;</p>
<p>Protective security measures</p>
</td>
<td style="width: 53.0919%;"><br>
<p><a href="https://www.protectivesecurity.govt.nz/about/self-assessment-and-reporting">Self-assessment and reporting | Protective Security Requirements</a></p>
<p><a href="https://www.protectivesecurity.govt.nz/about/compliance">Complying with the Protective Security Requirements | Protective Security Requirements</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
</section>
<section title="4.2. Conducting Certifications"><subsection title="Objective"><paragraph
    title="4.2.1."


><![CDATA[<p>The security posture of the organisation has been incorporated into its system security design, controls are correctly implemented, are performing as intended and that changes and modifications are reviewed for any security impact or implications.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="4.2.2."


><![CDATA[<p>This section covers information on the process of undertaking a certification as part of the accreditation process for a system.</p>]]></paragraph>
</block>
<block title="Certification"><paragraph
    title="4.2.3."


><![CDATA[<p>Certification is the assertion that a given ICT system complies with minimum standards and the agreed design. It is based on a comprehensive evaluation and may involve:</p><ul>
<li>development and review of security documentation;</li>
<li>assurance over externally provided services such as Telecommunications and Cloud;</li>
<li>a physical inspection;</li>
<li>a technical review of the system and environment; and/or</li>
<li>technical testing.</li>
</ul>]]></paragraph>
<paragraph
    title="4.2.4."


><![CDATA[<p>Certification is a <strong>prerequisite</strong> for accreditation. The Accreditation Authority for a specific system MUST NOT accredit that system until all relevant certifications have been provided.</p>]]></paragraph>
</block>
<block title="Certification outcome"><paragraph
    title="4.2.5."


><![CDATA[<p>The outcome of certification is a certificate to the system owner acknowledging that the system has been appropriately audited and that the findings have been found to be of an acceptable standard.</p>]]></paragraph>
</block>
<block title="Certification authorities"><paragraph
    title="4.2.6."


><![CDATA[<p>For all agency information systems the certification authority is the CISO unless otherwise delegated by the Agency Head.</p>]]></paragraph>
<paragraph
    title="4.2.7."


><![CDATA[<p>For external organisations or service providers supporting agencies, the certification authority is the CISO of the agency.</p>]]></paragraph>
<paragraph
    title="4.2.8."


><![CDATA[<p>For multi-national, multi-agency, and AoG systems the certification authority is determined by a formal agreement between the parties involved. Within NZ this is usually the lead agency.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="4.2.9."


><![CDATA[<p>Additional information relating to system auditing is contained in:</p><p>&nbsp;</p><table class="table-main">
<tbody>
<tr>
<td><strong><strong>Reference</strong></strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>ISO/IEC 27006:2015</strong></td>
<td>
<p><strong><strong><span>Information Technology – Security Techniques - Requirements for bodies providing audit and certification of information security management systems</span></strong></strong></p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="ISO/IEC 27006:2015" rel="noopener noreferrer" href="https://www.iso.org/standard/62313.html" target="_blank">https://www.iso.org/standard/62313.html</a></p>
<p>&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27007:2020&nbsp;</strong></p>
</td>
<td>
<p><strong><strong>Information Technology – Security Techniques - Guidelines for information security management systems auditing</strong></strong></p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="ISO/IEC 27007:2020" rel="noopener noreferrer" href="https://www.iso.org/standard/77802.html" target="_blank">https://www.iso.org/standard/77802.html</a></p>
<p>&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p><strong>ISO 19011:2018&nbsp;</strong></p>
</td>
<td>
<p><strong><strong><span>Guidelines for auditing management systems</span></strong></strong></p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="ISO 19011:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/70017.html" target="_blank">https://www.iso.org/standard/70017.html</a><a rel="noopener noreferrer" href="http://www.iso27001security.com/html/27006.html" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>
<p><strong><strong>AS/NZ ISO 19011:2019</strong></strong></p>
</td>
<td>
<p><strong><strong><span><strong><strong><span><strong><strong><span>Guidelines for auditing management systems</span></strong></strong></span></strong></strong></span></strong></strong></p>
</td>
<td style="text-align: center;">
<p>Standards NZ</p>
</td>
<td>
<p><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz/</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Certification Audit"><paragraph
    title="4.2.10.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>The purpose of a Certification Audit is to assess the actual implementation and effectiveness of controls for a system against the agency’s risk profile, security posture, design specifications, agency policies and compliance with the <a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">Protective Security Requirements (PSR)</a>&nbsp;and in particular the relevant NZISM components.</p>]]></paragraph>
<paragraph
    title="4.2.10.R.02."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p class="Normal-nonumbering">The extent and scope of the Certification Audit should consider the feasibility and cost-effectiveness of the audit against the risks and benefits of the system under review. Major or high-risk systems will require more detailed and extensive review than low-risk or minor systems.  See also Section 4.3 Conducting Audits.</p>]]></paragraph>
<paragraph
    title="4.2.10.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="535"
><![CDATA[<p>All systems MUST undergo an audit as part of the certification process.</p>]]></paragraph>
</block>
<block title="Certification decision"><paragraph
    title="4.2.11.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>To award certification for a system the certification authority will need to be satisfied that the selected controls are appropriate, are consistent with the <a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">Protective Security Requirements (PSR)</a>&nbsp;and in particular the relevant NZISM components, have been properly implemented and are operating effectively.</p>]]></paragraph>
<paragraph
    title="4.2.11.R.02."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>To cater for the different responsibilities for physical and technical Certification &amp; Accreditation, separate reports and recommendations may be required.</p>]]></paragraph>
<paragraph
    title="4.2.11.R.03."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>Certification acknowledges only that controls were appropriate, properly implemented and are operating effectively. Certification does NOT imply that the residual security risk is acceptable or an approval to operate has been granted.</p>]]></paragraph>
<paragraph
    title="4.2.11.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="540"
><![CDATA[<p>The certification authority MUST accept that the controls are appropriate, effective and comply with the <a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">Protective Security Requirements (PSR)</a>&nbsp;and in particular the relevant NZISM components, in order to award certification.</p>]]></paragraph>
</block>
<block title="Residual security risk assessment"><paragraph
    title="4.2.12.R.01."

    tags="Governance,Residual Risk,Risk Management,Accreditation,Certification"


><![CDATA[<p>The purpose of the residual security risk assessment is to assess the risks, controls and residual security risk relating to the operation of a system. In situations where the system is non-conformant, the system owner may have taken corrective actions. The residual risk may not be great enough to preclude a certification authority recommending to the Accreditation Authority that accreditation be awarded but the risk MUST be acknowledged and appropriate qualifications or limitations documented.</p>]]></paragraph>
<paragraph
    title="4.2.12.C.01."

    tags="Governance,Residual Risk,Risk Management,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="543"
><![CDATA[<p>Following the audit, the certification authority SHOULD produce an assessment for the Accreditation Authority outlining the residual security risks relating to the operation of the system and a recommendation on whether to award accreditation or not.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="4.3. Conducting Audits"><subsection title="Objective"><paragraph
    title="4.3.1."


><![CDATA[<p>The effectiveness of information security measures for systems is periodically reviewed and validated.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="4.3.2."


><![CDATA[<p>This section covers information on the process of undertaking a certification and accreditation audit.</p>]]></paragraph>
</block>
<block title="Audit objectives, scope and criteria"><paragraph
    title="4.3.3."


><![CDATA[<p>The aim of an audit is to review and assess:</p><ul>
<li>the risk identification and assessment;</li>
<li>design and complexity (including the system and security architectures);</li>
<li>any available assurance reports on support or outsourced services;</li>
<li>controls selection;</li>
<li>actual implementation and effectiveness of controls for a system; and</li>
<li>supporting information security documentation.</li>
</ul>]]></paragraph>
<paragraph
    title="4.3.4."


><![CDATA[<p class="NormS4C3">Only information that is verifiable should be accepted as audit evidence.  Audit evidence should be recorded.</p>]]></paragraph>
</block>
<block title="Audit outcome"><paragraph
    title="4.3.5."


><![CDATA[<p>The outcome of an audit is a report of compliance and control effectiveness for the certification authority outlining areas of non-compliance for a system and any suggested remediation actions.</p>]]></paragraph>
<paragraph
    title="4.3.6."


><![CDATA[<p class="NormS4C3">Part of this audit is an assessment of whether the control systems adequately identify and address risk and information security requirements.</p>]]></paragraph>
</block>
<block title="Who can assist with an audit"><paragraph
    title="4.3.7."


><![CDATA[<p>A number of other agencies and personnel within agencies are often consulted during an audit. Agencies or personnel that can be consulted on physical security aspects of information security may include:</p>
<ul>
<li>The <a title="Protective Security Requirements - Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">NZSIS for Physical Security</a>;</li>
<li>GCSB for TOP SECRET sites and Sensitive Compartmented Information Facilities (SCIFs);</li>
<li><a title="MFAT" rel="noopener noreferrer" href="https://www.mfat.govt.nz/" target="_blank">MFAT</a> for systems located at overseas posts and missions;</li>
<li>The Chief Security Officer (CSO) may be consulted on personnel and physical security aspects of information security;</li>
<li>The CISO, ITSM or communications security officer may be consulted on COMSEC aspects of information security; and</li>
<li>The ITSM and System Owner on aspects of secure system design configuration and operation.</li>
</ul>]]></paragraph>
</block>
<block title="Independent audits"><paragraph
    title="4.3.8."


><![CDATA[<p>An audit may be conducted by agency auditors or an independent security organisation.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Audit Evidence"><paragraph
    title="4.3.9"


><![CDATA[<p>Audit evidence can be obtained from documentation described in <a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a>.&nbsp;</p><p>Other sources may include:</p><table class="table-main" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td class="table-cell-blue" colspan="2" valign="top">
<p class="NormS4C3">Source</p>
</td>
</tr>
<tr>
<td width="227" valign="top">
<p>Agency Strategies and Statements of Intent.</p>
</td>
<td width="410" valign="top">
<p>Any&nbsp;additional process documentation referenced in the documentation described in&nbsp;the NZISM Chapter 5.</p>
</td>
</tr>
<tr>
<td width="227" valign="top">
<p>Third party service provider agreements.</p>
</td>
<td width="410" valign="top">
<p>Independent&nbsp;risk assessments or security evaluations, such as penetration tests by an&nbsp;internal team or an external organization.</p>
</td>
</tr>
<tr>
<td width="227" valign="top">
<p>The agency risk identification and assessment &nbsp; process.</p>
</td>
<td width="410" valign="top">
<p>Any&nbsp;internal audit reports, assessments and reviews.</p>
</td>
</tr>
<tr>
<td width="227" valign="top">
<p>Any statements of applicability.</p>
</td>
<td width="410" valign="top">
<p>Any&nbsp;relevant incident reports.</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 <block title="Audit evidence reliability"><paragraph
    title="4.3.10."


><![CDATA[<p class="NormS4C3">The reliability of audit evidence is influenced by its source, nature and the circumstances under which the evidence is gathered.  In general terms documentary evidence is more reliable than oral evidence, self-generated evidence less reliable than evidence gathered elsewhere and externally generated evidence is more reliable than internally generated evidence as internally generated evidence may be more susceptible to selective presentation. </p>]]></paragraph>
<paragraph
    title="4.3.11."


><![CDATA[<p class="NormS4C3">Confirmation should be obtained that:</p><ul>
<li>Risk owners have been identified; and</li>
<li>Each risk owner has sufficient accountability and authority to manage their identified risks.</li>
</ul>]]></paragraph>
<paragraph
    title="4.3.12."


><![CDATA[<p class="NormS4C3">Audit evidence can be gathered through the following methods in order of preference:</p><table class="table-main" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td width="102" valign="top">
<p align="center">Method</p>
</td>
<td width="514" valign="top">
<p align="center">Description</p>
</td>
</tr>
<tr>
<td width="102" valign="top">
<p>Inspection</p>
</td>
<td width="514" valign="top">
<p>Physical&nbsp;inspections can provide an independent confirmation of the physical condition&nbsp;of the site or systems, its implementation and its management.</p>
</td>
</tr>
<tr>
<td width="102" valign="top">
<p>Analytical review</p>
</td>
<td width="514" valign="top">
<p>Reviews&nbsp;of records and documents will provide evidence of varying degrees of&nbsp;reliability depending on their nature and source.&nbsp; A review of the risk identification and&nbsp;selection of risk treatments is invaluable.</p>
</td>
</tr>
<tr>
<td width="102" valign="top">
<p>Enquiry</p>
</td>
<td width="514" valign="top">
<p>Here&nbsp;audit evidence is gathered by interview.&nbsp;&nbsp;Enquiries can be formal or informal and oral or written.&nbsp; It is essential that the auditor creates a&nbsp;written record of any enquiries conducted.</p>
</td>
</tr>
<tr>
<td width="102" valign="top">
<p>Observation</p>
</td>
<td width="514" valign="top">
<p>Observation&nbsp;of operations or procedures being performed by others with the aim of&nbsp;determining the manner of its performance only at that particular time.&nbsp; This may include checks on system&nbsp;configurations, change management processes or other key elements.</p>
</td>
</tr>
<tr>
<td width="102" valign="top">
<p>Computations</p>
</td>
<td width="514" valign="top">
<p>Rarely&nbsp;used for non-financial records but may include, for example, asset registers&nbsp;and validation of holdings of accountable equipment and software.</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Audit evidence sufficiency"><paragraph
    title="4.3.13."


><![CDATA[<p class="NormS4C3">The Sufficiency is the measure of the quality (not the quantity) of audit evidence.  It is important, however, that a balance is struck between the extent of the audit, the nature of the system under review, agency risk and the cost, effort and benefit of the audit.  Sufficient evidence should be obtained to allow the auditor to be able to draw reasonable conclusions on which to base the audit opinion.  For evidence to be deemed sufficient, the following aspects should be considered:</p><ul>
<li>Materiality.  Materiality is the threshold where any distorted, missing and incorrect information is likely to have an impact on the risk and security of a system.  Where it becomes clear that there are material deficiencies in the evidence presented more substantive tests may be required or the audit suspended until corrective action has been taken by the agency.</li>
<li>Risk assessment: It is almost impossible to validate every risk identification and selection of risk treatments.  For larger systems a more practical approach may be to validate the identification and treatment of major risks and use sampling techniques for the balance.</li>
<li>Economy: Before gathering or requesting additional audit evidence, it is important to consider whether or not it is feasible or cost-effective to generate this evidence against the benefits, assessed value and time required.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="4.3.14."


><![CDATA[<p class="NormS4C3">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>&nbsp;Title</strong></td>
<td><strong>&nbsp;Publisher</strong></td>
<td><strong>&nbsp;Source</strong></td>
</tr>
<tr>
<td>
<p><strong><strong>AS/NZ ISO 19011:2019&nbsp;</strong></strong></p>
</td>
<td>
<p><strong><strong>Guidelines for auditing management systems</strong></strong></p>
</td>
<td style="text-align: center;">
<p>Standards NZ</p>
</td>
<td>&nbsp;<a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz/</a></td>
</tr>
<tr>
<td>
<p><strong><strong>ISO 19011:2018</strong></strong></p>
</td>
<td>
<p><strong>Guidelines for auditing management systems</strong></p>
</td>
<td style="text-align: center;">&nbsp;<span style="font-family: &#039;Open Sans&#039;,&#039;sans-serif&#039;; font-size: 10pt; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO</span></td>
<td>&nbsp;<a title="ISO 19011:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/70017.html" target="_blank">https://www.iso.org/standard/70017.html</a></td>
</tr>
<tr>
<td>
<p><strong><strong>ISO/IEC 27000:2018&nbsp;</strong></strong></p>
</td>
<td>
<p><strong>Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary</strong></p>
</td>
<td style="text-align: center;">&nbsp;<span style="font-family: &#039;Open Sans&#039;,&#039;sans-serif&#039;; font-size: 10pt; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO</span></td>
<td>
<p>&nbsp;<a title="ISO/IEC 27000:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/73906.html" target="_blank">https://www.iso.org/standard/73906.html</a></p>
</td>
</tr>
<tr>
<td>
<p><strong><strong>ISO/IEC 27001:2013&nbsp;</strong></strong></p>
</td>
<td>
<p><strong>Information technology -- Security techniques -- Information security management systems -- Requirements</strong></p>
</td>
<td style="text-align: center;">&nbsp;<span style="font-family: &#039;Open Sans&#039;,&#039;sans-serif&#039;; font-size: 10pt; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO</span></td>
<td>&nbsp;<a title="ISO/IEC 27001:2013" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></td>
</tr>
<tr>
<td><strong><strong>ISO/IEC 27002:2022</strong></strong></td>
<td>
<p class="no-uppercase"><strong>Information security, cybersecurity and privacy protection — Information security controls</strong></p>
</td>
<td style="text-align: center;">&nbsp;<span style="font-family: &#039;Open Sans&#039;,&#039;sans-serif&#039;; font-size: 10pt; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO</span></td>
<td>
<p>&nbsp;<a title="ISO/IEC 27002:2022" rel="noopener noreferrer" href="https://www.iso.org/standard/75652.html" target="_blank">https://www.iso.org/standard/75652.html</a></p>
</td>
</tr>
<tr>
<td><strong><strong>ISO/IEC 27006:2015</strong></strong></td>
<td><strong>Information Technology – Security Techniques- Requirements for bodies providing audit and certification of information security management systems</strong></td>
<td style="text-align: center;">&nbsp;<span style="font-family: &#039;Open Sans&#039;,&#039;sans-serif&#039;; font-size: 10pt; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO</span></td>
<td>&nbsp;<a title="ISO/IEC 27006:2015" rel="noopener noreferrer" href="https://www.iso.org/standard/62313.html" target="_blank">https://www.iso.org/standard/62313.html</a></td>
</tr>
<tr>
<td><strong><strong>ISO/IEC 27007:2020&nbsp;</strong></strong></td>
<td><strong>Information Technology – Security Techniques - Guidelines for information security management systems auditing</strong></td>
<td style="text-align: center;">&nbsp;<span style="font-family: &#039;Open Sans&#039;,&#039;sans-serif&#039;; font-size: 10pt; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO</span></td>
<td>&nbsp;<a title="ISO/IEC 27007:2020" rel="noopener noreferrer" href="https://www.iso.org/standard/77802.html" target="_blank">https://www.iso.org/standard/77802.html</a></td>
</tr>
<tr>
<td><strong><strong>International Standard On Auditing (New Zealand) 500&nbsp;</strong></strong></td>
<td><strong>Audit Evidence</strong></td>
<td style="text-align: center;">
<p>&nbsp;<span style="font-family: &#039;Open Sans&#039;,&#039;sans-serif&#039;; font-size: 10pt; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">External Reporting Board, NZ Audit and Assurance&nbsp;Standards Board</span></p>
</td>
<td><a title="International Standard On Auditing (New Zealand) 500&nbsp;" rel="noopener noreferrer" href="https://www.xrb.govt.nz/standards/assurance-standards/auditing-standards/isa-nz-500/" target="_blank">https://xrb.govt.nz/standards-for-assurance-practitioners/auditing-standards/isa-nz-500/</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="4.3.15."


><![CDATA[<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td>
<p>GOV3, GOV8, INFOSEC1, INFOSEC2, INFOSEC3 and INFOSEC4</p>
</td>
<td>
<p><a title="PSR requirements" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank"></a></p>
<p><a rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>PSR content protocols</strong></p>
</td>
<td>
<p>Management protocol for information security</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/guidance/information-security/management-protocol" target="_blank">Management protocol for information security | Protective Security Requirements</a><a rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/management-protocol-2/" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>
<p><strong>PSR requirements sections</strong></p>
</td>
<td>
<p>Self assessment &amp; reporting</p>
</td>
<td>
<p><a href="https://www.protectivesecurity.govt.nz/about/self-assessment-and-reporting">Self-assessment and reporting | Protective Security Requirements</a><a title="Self assessment and reporting" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/self-assessment-and-reporting/" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>
<p><strong>Managing specific scenarios</strong></p>
</td>
<td><a href="https://www.protectivesecurity.govt.nz/guidance/information-security/managing-specific-scenarios">Managing specific scenarios | Protective Security Requirements</a></td>
<td><a rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/guidance/information-security/managing-specific-scenarios" target="_blank">Transacting online with the public</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Independence of auditors"><paragraph
    title="4.3.16.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>As there can be a perceived conflict of interest in the system owner assessing the security of their own system it is important that the auditor is demonstrably independent. This does not preclude an appropriately qualified system owner from assessing the security of a system that they are not responsible for.</p>]]></paragraph>
<paragraph
    title="4.3.16.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="562"
><![CDATA[<p>Agencies SHOULD ensure that auditors conducting audits are able to demonstrate independence and are not also the system owner or certification authority.</p>]]></paragraph>
</block>
<block title="Audit preparation"><paragraph
    title="4.3.17.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>Ensuring that the system owner has approved the system architecture and associated information security documentation will assist auditors in determining the scope of work for the first stage of the audit.</p>]]></paragraph>
<paragraph
    title="4.3.17.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="565"
><![CDATA[<p>Prior to undertaking the audit the system owner MUST approve the system architecture and associated information security documentation.</p>]]></paragraph>
</block>
<block title="Audit (first stage)"><paragraph
    title="4.3.18.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p class="Normal-nonumbering"><span>Auditing against the risk assessment and subsequent controls selection is preferable to a ‘checklist’ approach where all controls in the NZISM are checked for selection and implementation irrespective of applicability.</span></p>]]></paragraph>
<paragraph
    title="4.3.18.R.02."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>The purpose of the first stage of the audit is to determine that the system and security architecture (including information security documentation) is based on sound information security principles and has addressed all <span style="text-decoration: underline;"><strong>applicable</strong></span> controls from this manual. During this stage the statement of applicability for the system will also be assessed along with any justification for non-compliance with applicable controls from this manual.</p>]]></paragraph>
<paragraph
    title="4.3.18.R.03."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>Without implementing the controls for a system their effectiveness cannot be assessed during the second stage of the audit.</p>]]></paragraph>
<paragraph
    title="4.3.18.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="569"
><![CDATA[<p>The SecPol, SRMP, SSP, SOPs and IRP documentation MUST be reviewed by the auditor to ensure that it is comprehensive and appropriate for the environment the system is to operate within.</p>]]></paragraph>
<paragraph
    title="4.3.18.C.02."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="570"
><![CDATA[<p>The Information Security Policy (SecPol) MUST be reviewed by the auditor to ensure that all applicable controls specified in this manual are addressed.</p>]]></paragraph>
<paragraph
    title="4.3.18.C.03."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="571"
><![CDATA[<p>The system and security architecture (including information security documentation) SHOULD be reviewed by the auditor to ensure that it is based on sound information security principles and meets information security requirements, including the NZISM.</p>]]></paragraph>
<paragraph
    title="4.3.18.C.04."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="572"
><![CDATA[<p>The Information Security Policy (SecPol) SHOULD be reviewed by the auditor to ensure that policies have been developed or identified by the agency to protect classified information that is processed, stored or communicated by its systems.</p>]]></paragraph>
<paragraph
    title="4.3.18.C.05."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="573"
><![CDATA[<p>The system owner SHOULD provide a statement of applicability for the system which includes the following topics:</p><ul>
<li>the baseline of this manual used for determining controls;</li>
<li>controls that are, and are not, applicable to the system;</li>
<li>controls that are applicable but are not being complied with; and</li>
<li>any additional controls implemented as a result of the SRMP.</li>
</ul>]]></paragraph>
</block>
<block title="Implementing controls"><paragraph
    title="4.3.19.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>System testing is most effective on working systems. Desk checks have limited effectiveness in these situations.</p>]]></paragraph>
<paragraph
    title="4.3.19.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="576"
><![CDATA[<p>Prior to undertaking any system testing in support of the certification process, the system owner MUST implement the controls for the system.</p>]]></paragraph>
</block>
<block title="Audit (second stage)"><paragraph
    title="4.3.20.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>The purpose of the second stage of the audit is to determine whether the controls, as approved by the system owner and reviewed during the first stage of the audit, have been implemented correctly and are operating effectively.</p>]]></paragraph>
<paragraph
    title="4.3.20.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="579"
><![CDATA[<p>The implementation of controls MUST be assessed to determine whether they have been implemented correctly and are operating effectively.</p>]]></paragraph>
<paragraph
    title="4.3.20.C.02."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="580"
><![CDATA[<p>The auditor MUST ensure that, where applicable, a physical security certification has been awarded by an appropriate physical security certification authority.</p>]]></paragraph>
<paragraph
    title="4.3.20.C.03."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="581"
><![CDATA[<p>The physical security certification SHOULD be less than three (3) years old at the time of the audit.</p>]]></paragraph>
</block>
<block title="Report of compliance "><paragraph
    title="4.3.21.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>The report of compliance assists the certification authority in conducting a residual security risk assessment to assess the residual security risk relating to the operation of a system following the audit and any remediation activities the system owner may have undertaken.</p>]]></paragraph>
<paragraph
    title="4.3.21.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="584"
><![CDATA[<p>The auditor MUST produce a report of compliance for the certification authority outlining areas of non-compliance for a system and any suggested remediation actions.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="4.4. Accreditation Framework"><subsection title="Objective"><paragraph
    title="4.4.1."


><![CDATA[<p>Accreditation is the formal authority for a system to operate, and an important element in fundamental information system governance. Accreditation requires risk identification and assessment, selection and implementation of baseline and other appropriate controls and the recognition and acceptance of residual risks relating to the operation of a system including any outsourced services such as Telecommunications or Cloud. Accreditation relies on the completion of system certification procedures.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="4.4.2."


><![CDATA[<p>This section covers information on the accreditation framework for systems.</p>]]></paragraph>
<paragraph
    title="4.4.3."


><![CDATA[<p>All types of government held information are covered, including Official Information and information subject to privacy requirements.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Accreditation framework"><paragraph
    title="4.4.4.R.01."

    tags="Governance,Accreditation"


><![CDATA[<p>The development of an accreditation framework within the agency will ensure that accreditation activities are conducted in a repeatable and consistent manner across the agency and that consistency across government systems is maintained. This requirement is a fundamental part of a robust governance model and provides a sound process to demonstrate good governance of information systems.</p>]]></paragraph>
<paragraph
    title="4.4.4.C.01."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="595"
><![CDATA[<p>Agencies MUST develop an accreditation framework for their agency.</p>]]></paragraph>
</block>
<block title="Accreditation"><paragraph
    title="4.4.5.R.01."

    tags="Governance,Accreditation"


><![CDATA[<p>Accreditation ensures that either sufficient security measures have been put in place to protect information that is processed, stored or communicated by the system or that deficiencies in such measures have been identified, assessed and acknowledged by an appropriate authority. As such, when systems are awarded accreditation the Accreditation Authority accepts that the residual security risks relating to the system are appropriate for the information that it processes, stores or communicates.</p>]]></paragraph>
<paragraph
    title="4.4.5.R.02."

    tags="Governance,Accreditation"


><![CDATA[<p>Once systems have been accredited, conducting on-going monitoring activities will assist in assessing changes to its environment and operation and to determine the implications for the security risk profile and accreditation status of the system.</p>]]></paragraph>
<paragraph
    title="4.4.5.C.01."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="599"
><![CDATA[<p>Agencies MUST ensure that each of their systems is awarded accreditation.</p>]]></paragraph>
<paragraph
    title="4.4.5.C.02."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="600"
><![CDATA[<p>Agencies MUST ensure that all systems are awarded accreditation before they are used operationally.</p>]]></paragraph>
<paragraph
    title="4.4.5.C.03."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="601"
><![CDATA[<p>Agencies MUST ensure that all systems are awarded accreditation prior to connecting them to any other internal or external system.</p>]]></paragraph>
<paragraph
    title="4.4.5.C.04."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Should"
    cid="602"
><![CDATA[<p>Agencies SHOULD ensure information security monitoring, logging and auditing is conducted on all accredited systems.</p>]]></paragraph>
</block>
<block title="Determining authorities"><paragraph
    title="4.4.6.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>Determining the certification and accreditation authorities for multi-national and multi-agency systems via a formal agreement between the parties will ensure that the system owner has identified appropriate points of contact and that risk is appropriately managed. See Section 4.5 – Conducting Accreditations.</p>]]></paragraph>
<paragraph
    title="4.4.6.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="605"
><![CDATA[<p>For multi-national and multi-agency systems, the Certification and Accreditation Authorities SHOULD be determined by a formal agreement between the parties involved.</p>]]></paragraph>
</block>
<block title="Notifying authorities"><paragraph
    title="4.4.7.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>In advising the certification and accreditation authorities of their intent to seek certification and accreditation for a system, the system owner can request information on the latest processes and requirements for their system.</p>]]></paragraph>
<paragraph
    title="4.4.7.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="608"
><![CDATA[<p>Prior to beginning the accreditation process the system owner SHOULD advise the certification and accreditation authorities of their intent to seek certification and accreditation for their system.</p>]]></paragraph>
<paragraph
    title="4.4.7.C.02."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="609"
><![CDATA[<p>Agencies SHOULD confirm governance arrangements with the certification authorities, and with the accreditation authorities.</p>]]></paragraph>
</block>
<block title="Due diligence"><paragraph
    title="4.4.8.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>When an agency is connecting a system to another party they need to be aware of the security measures the other party has implemented to protect their information. More importantly, the agency needs to know where the other party may have varied from controls in this manual. This is vital where different classification systems are applied, such as in the use of multiple national classification systems.</p>]]></paragraph>
<paragraph
    title="4.4.8.R.02."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>Methods that an agency may use to ensure that other agencies and third parties comply with the agency’s information security expectations include:</p><ul>
<li>assurance and confirmation that the certification and accreditation process described in the NZISM is adhered to;</li>
<li>conducting or utilising any third party reviewed assurance reports;</li>
<li>conducting an accreditation of the system being connected to; and/or</li>
<li>seeking a copy of existing accreditation deliverables in order to make their own accreditation determination.</li>
</ul>]]></paragraph>
<paragraph
    title="4.4.8.R.03."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>Ultimately, the agency MUST accept any security risks associated with connecting their system to the other party’s system. This includes the risks of other party’s system potentially being used as a platform to attack their system or “spilling” information requiring subsequent clean up processes.</p>]]></paragraph>
<paragraph
    title="4.4.8.R.04."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>Special care MUST be taken for multi- national, multi-agency and All-of-Government systems.</p>]]></paragraph>
<paragraph
    title="4.4.8.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="615"
><![CDATA[<p>Where an agency’s system exchanges information with a third-party system, the agency MUST ensure that the receiving party has appropriate measures in place to provide a level of protection commensurate with the classification or privacy requirements of their information and that the third party is authorised to receive that information.</p>]]></paragraph>
<paragraph
    title="4.4.8.C.02."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="616"
><![CDATA[<p>An agency MUST ensure that a third party is aware of the agency’s information security expectations and national security requirements by defining expectations in documentation that includes, but is not limited to:</p><ul>
<li>contract provisions; </li>
<li>a memorandum of understanding;</li>
<li>non-disclosure agreements.</li>
</ul>]]></paragraph>
<paragraph
    title="4.4.8.C.03."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="617"
><![CDATA[<p>An agency MUST ensure that a third party complies with the agency’s information security expectations through a formal process providing assurance to agency management that the operation of information security within the third party meets, and continues to meet, these expectations.</p>]]></paragraph>
<paragraph
    title="4.4.8.C.04."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="618"
><![CDATA[<p>Agencies SHOULD review accreditation deliverables when determining whether the receiving party has appropriate measures in place to provide a level of protection commensurate with the classification of their information.</p>]]></paragraph>
</block>
<block title="Processing restrictions"><paragraph
    title="4.4.9.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>When security is applied to systems, protective measures are put in place based on the highest classification that will be processed, stored or communicated by the system. As such, any classified information placed on the system above the level for which it has been accredited will receive an inappropriate level of protection and could be exposed to a greater risk of compromise.</p>]]></paragraph>
<paragraph
    title="4.4.9.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must Not"
    cid="621"
><![CDATA[<p>Agencies MUST NOT allow a system to process, store or communicate classified information above the classification for which the system has received accreditation.</p>]]></paragraph>
</block>
<block title="Accrediting systems bearing a compartment marking"><paragraph
    title="4.4.10.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>When processing compartmented information on a system, agencies need to ensure that the system has received accreditation.</p>]]></paragraph>
<paragraph
    title="4.4.10.R.02."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>Compartments are invariably established for the additional protection of information of National security significance, over and above the protection provided by the primary classification.  It is extremely unlikely that such compartments would be established at a classification below CONFIDENTIAL.</p>]]></paragraph>
<paragraph
    title="4.4.10.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="624"
><![CDATA[<p>A system that processes, stores or communicates compartmented information MUST be accredited by the GCSB.</p>]]></paragraph>
</block>
<block title="Requirement for New Zealand control"><paragraph
    title="4.4.11.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>NZEO systems process, store and communicate information that is particularly sensitive to the government of New Zealand. When agencies are dealing with New Zealand Eyes Only (NZEO) information they need to be aware of the requirement for a New Zealand national to remain in control of the system and information at all times. It is, therefore, essential that control of such systems is maintained by New Zealand citizens working for the government of New Zealand.</p>]]></paragraph>
<paragraph
    title="4.4.11.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="627"
><![CDATA[<p>Agencies MUST ensure that systems processing, storing or communicating NZEO information remain under the control of a New Zealand national working for the New Zealand government, at all times.</p>]]></paragraph>
</block>
<block title="Reaccreditation"><paragraph
    title="4.4.12.R.01."

    tags="Governance,Accreditation"


><![CDATA[<p>Agencies should reaccredit their systems at least every two years; however, they can exercise an additional one year’s grace if they follow the procedures in this manual for non-compliance with a ‘SHOULD’ requirement, namely conducting a comprehensive security risk assessment, obtaining sign-off by senior management and formal acceptance of residual risk.</p>]]></paragraph>
<paragraph
    title="4.4.12.R.02."

    tags="Governance,Accreditation"


><![CDATA[<p>Accreditations should be commenced at least six months before due date to allow sufficient time for the certification and accreditations processes to be completed. Once three years has elapsed between accreditations, the authority to operate the system (the accreditation) will lapse and the agency will need to either reaccredit the system or request a dispensation to operate without accreditation. It should be noted that operating a system without accreditation is considered extremely risky. This will be exacerbated when multiple agency or All-of-Government systems are involved.</p>]]></paragraph>
<paragraph
    title="4.4.12.R.03."

    tags="Governance,Accreditation"


><![CDATA[<p>Additional reasons for conducting reaccreditation activities could include:</p><ul>
<li>changes in the agency’s information security policies or security posture;</li>
<li>detection of new or emerging threats to agency systems;</li>
<li>the discovery that controls are not operating as effectively as planned; </li>
<li>a major information security incident; and</li>
<li>a significant change to systems, configuration or concept of operation for the accredited system.</li>
</ul>]]></paragraph>
<paragraph
    title="4.4.12.C.01."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="632"
><![CDATA[<p>Agencies MUST ensure that the period between accreditations of each of their systems does not exceed three years.</p>]]></paragraph>
<paragraph
    title="4.4.12.C.02."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="633"
><![CDATA[<p>Agencies MUST notify associated agencies where multiple agencies are connected to agency systems operating with expired accreditations.</p>]]></paragraph>
<paragraph
    title="4.4.12.C.03."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="634"
><![CDATA[<p>Agencies MUST notify the Government Chief Digital Officer (GCDO) where All-of-Government systems are connected to agency systems operating with expired accreditations.</p>]]></paragraph>
<paragraph
    title="4.4.12.C.04."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must Not"
    cid="635"
><![CDATA[<p>Agencies MUST NOT operate a system without accreditation or with a lapsed accreditation unless the accreditation authority has granted a dispensation.</p>]]></paragraph>
<paragraph
    title="4.4.12.C.05."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Should"
    cid="636"
><![CDATA[<p>Agencies SHOULD ensure that the period between accreditations of each of their systems does not exceed two years.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="4.5. Conducting Accreditations"><subsection title="Objective"><paragraph
    title="4.5.1."


><![CDATA[<p>As a governance good practice, systems are accredited before they are used operationally.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="4.5.2."


><![CDATA[<p>This section covers information accreditation processes.</p>]]></paragraph>
</block>
<block title="Accreditation aim"><paragraph
    title="4.5.3."


><![CDATA[<p>The aim of accreditation is to give formal recognition and acceptance of the residual security risk to a system and the information it processes, stores or communicates as part of the agency’s governance arrangements.</p>]]></paragraph>
</block>
<block title="Accreditation outcome"><paragraph
    title="4.5.4."


><![CDATA[<p>The outcome of accreditation is an approval to operate issued by the Accreditation Authority to the system owner.</p>]]></paragraph>
</block>
<block title="Accreditation Authorities"><paragraph
    title="4.5.5."


><![CDATA[<p>For agencies the Accreditation Authority is the agency head or their formally authorised delegate.</p>]]></paragraph>
<paragraph
    title="4.5.6."


><![CDATA[<p>For organisations supporting agencies the Accreditation Authority is the head of the supported agency or their authorised delegate.</p>]]></paragraph>
<paragraph
    title="4.5.7."


><![CDATA[<p>For multi-national and multi-agency systems the Accreditation Authority is determined by a formal agreement between the parties involved.</p>]]></paragraph>
<paragraph
    title="4.5.8."


><![CDATA[<p>For agencies with systems that process, store or communicate endorsed or compartmented information, or the use of High Assurance Cryptographic Equipment (HACE), the Director-General GCSB is the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="4.5.9."


><![CDATA[<p>In all cases the Accreditation Authority will be at least a senior executive who has an appropriate level of understanding of the security risks they are accepting on behalf of the agency.</p>]]></paragraph>
<paragraph
    title="4.5.10."


><![CDATA[<p>Depending on the circumstances and practices of an agency, the agency head could choose to delegate their authority to multiple senior executives who have the authority to accept security risks for the specific business functions within the agency, for example the CISO and the system owner.</p>]]></paragraph>
<paragraph
    title="4.5.11."


><![CDATA[<p>More information on the delegation of the agency head’s authority can be found in <a title="Agency Head" href="http://nzism.gcsb.govt.nz/ism-document#Section-12256">Section 3.1 - Agency Head</a>.</p>]]></paragraph>
</block>
<block title="Accreditation outcomes"><paragraph
    title="4.5.12."


><![CDATA[<p>Accreditation is awarded when the systems comply with the NZISM, the Accreditation Authority understands and accepts the residual security risk relating to the operation of the system and the Accreditation Authority gives formal approval for the system to operate.</p>]]></paragraph>
<paragraph
    title="4.5.13."


><![CDATA[<p>In some cases the Accreditation Authority may not accept the residual security risk relating to the operation of the system. This outcome is predominately caused by security risks being insufficiently considered and documented within the SRMP resulting in an inaccurate scoping of security measures within the SSP. In such cases the Accreditation Authority may request that the SRMP and SSP be amended and security measures reassessed before accreditation is awarded.</p>]]></paragraph>
<paragraph
    title="4.5.14."


><![CDATA[<p>In awarding accreditation for a system the Accreditation Authority may choose to define a reduced timeframe before reaccreditation, less than that specified in this manual, or place restrictions on the use of the system which are enforced until reaccreditation or until changes are made to the system within a specified timeframe.</p>]]></paragraph>
</block>
<block title="Exception for undertaking certification"><paragraph
    title="4.5.15."


><![CDATA[<p>In exceptional circumstances the Accreditation Authority may elect not to have a certification conducted on a system before making an accreditation decision. The test to be satisfied in such circumstances is that if the system is not operated immediately it would have a devastating and potentially long lasting effect on the operations of the agency. This exception MUST be formally recorded and accepted.</p>]]></paragraph>
<paragraph
    title="4.5.16."


><![CDATA[<p>Certification MUST occur as soon as possible as this is an essential part of the governance and assurance mechanism.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Certification"><paragraph
    title="4.5.17.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>Certification is an essential component of the governance and assurance process and assists and supports risk management.</p>]]></paragraph>
<paragraph
    title="4.5.17.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="666"
><![CDATA[<p>All systems MUST be certified as part of the accreditation process.</p>]]></paragraph>
</block>
<block title="Accreditation decision"><paragraph
    title="4.5.18.R.01."

    tags="Governance,Accreditation"


><![CDATA[<p>In order to determine the agency’s security posture, a system accreditation:</p><ul>
<li>examines the risks to systems identified in the certification process;</li>
<li>reviews the controls applied to manage those risks; and then</li>
<li>determines the acceptability of any residual risk.</li>
</ul>]]></paragraph>
<paragraph
    title="4.5.18.R.02."

    tags="Governance,Accreditation"


><![CDATA[<p>The accreditation process should also examine compliance with national policy, relevant international standards and good practice so that residual risk is managed prudently and pragmatically.</p>]]></paragraph>
<paragraph
    title="4.5.18.R.03."

    tags="Governance,Accreditation"


><![CDATA[<p>It is especially important that All-of-Government systems and effects on systems of other agencies are also considered in the examination of risk and determination of residual risk.</p>]]></paragraph>
<paragraph
    title="4.5.18.R.04."

    tags="Governance,Accreditation"


><![CDATA[<p>To assist in making an accreditation decision the Accreditation Authority may choose to review:</p><ul>
<li>Information Security Documentation as described in Chapter 5;</li>
<li>any interaction with systems of other agencies or All-of-Government systems;</li>
<li>compliance audit reports;</li>
<li>the accreditation recommendation from the certification authority;</li>
<li>supporting documentation for any decisions to be non-compliant with any controls specified in this manual; </li>
<li>any additional security risk reduction strategies that have been implemented; and</li>
<li>any third party reviews or assurance reports available.</li>
</ul>]]></paragraph>
<paragraph
    title="4.5.18.R.05."

    tags="Governance,Accreditation"


><![CDATA[<p>The Accreditation Authority may also choose to seek the assistance of one or more technical experts in understanding the technical components of information presented to them during the accreditation process to assist in making an informed accreditation decision.</p>]]></paragraph>
<paragraph
    title="4.5.18.C.01."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="673"
><![CDATA[<p>The Accreditation Authority MUST accept the residual security risk relating to the operation of a system in order to award accreditation.</p>]]></paragraph>
<paragraph
    title="4.5.18.C.02."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="674"
><![CDATA[<p>The Accreditation Authority MUST advise other agencies where the accreditation decision may affect those agencies.</p>]]></paragraph>
<paragraph
    title="4.5.18.C.03."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="675"
><![CDATA[<p>The Accreditation Authority MUST advise the GCDO where the accreditation decision may affect any All-of-Government systems.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="5. Information security documentation"><section title="5.1. Documentation Fundamentals"><subsection title="Objective"><paragraph
    title="5.1.1."


><![CDATA[<p>Information security documentation is produced for systems, to support and demonstrate good governance.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="5.1.2."


><![CDATA[<p>This section is an overview of the information security documentation that each agency will need to develop. More specific information on each document can be found in subsequent sections of this chapter.</p>]]></paragraph>
<paragraph
    title="5.1.3."


><![CDATA[<p>While this section describes a number of different but essential documents, it may be more advantageous and efficient to provide agency wide documentation for some elements (for example Physical Security) which can then be re-used for all agency systems.</p>]]></paragraph>
<paragraph
    title="5.1.4."


><![CDATA[<p>Similarly some consolidation may be appropriate, for example, SOPs IRPs and EPs can easily be combined into a single document.</p><p class="NormS5C1">Note: For smaller agencies and smaller systems it is acceptable that all documentation elements are combined into a single document provided each documentation element is clearly identifiable.</p><p class="NormS5C1">Note: Agencies may choose to name the documentation in different terms. This is acceptable provided the required level of detail is captured.&nbsp; Naming conventions presented in the NZISM are not mandatory.</p>]]></paragraph>
</block>
<block title="Information Security Documentation"><paragraph
    title="5.1.5."


><![CDATA[<p>Information Security Documentation requirements are summarised in the table below.</p><table class="table-main">
<tbody>
<tr>
<td><strong>Title</strong></td>
<td><strong>Abbreviation</strong></td>
<td><strong>Reference</strong></td>
</tr>
<tr>
<td>
<p><strong>Information Security Policy (incorporates the vulnerability disclosure policy)</strong></p>
</td>
<td>
<p>SecPol</p>
<p>VDP</p>
</td>
<td>
<p><a title="Information security policy" href="http://nzism.gcsb.govt.nz/ism-document#Block-12696">5.1.7</a></p>
<p><a title="Vulnerability disclosure policy" href="http://nzism.gcsb.govt.nz/ism-document#Section-12947">5.9</a></p>
</td>
</tr>
<tr>
<td><strong>Systems Architecture</strong></td>
<td>-</td>
<td><a title="Systems architecture" href="http://nzism.gcsb.govt.nz/ism-document#Block-12699">5.1.8</a></td>
</tr>
<tr>
<td>
<p><strong>Security Risk Management Plan</strong></p>
</td>
<td>SRMP</td>
<td>
<p><a title="Security risk management plan" href="http://nzism.gcsb.govt.nz/ism-document#Block-12703">5.1.9</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>System Security Plan</strong></p>
</td>
<td>SSP</td>
<td><a title="System security plan" href="http://nzism.gcsb.govt.nz/ism-document#Block-12706">5.1.10</a></td>
</tr>
<tr>
<td><strong>Site Security Plan</strong></td>
<td>SitePlan</td>
<td><a title="Site security plan" href="http://nzism.gcsb.govt.nz/ism-document#Block-13278">8.2.7</a></td>
</tr>
<tr>
<td><strong>Standard Operating Procedures</strong></td>
<td>
<p>SOPs</p>
</td>
<td>
<p><a title="SOPs" href="http://nzism.gcsb.govt.nz/ism-document#Block-12709">5.1.11</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>Incident Response Plan</strong></p>
</td>
<td>IRP</td>
<td>
<p><a title="Incident response plan" href="http://nzism.gcsb.govt.nz/ism-document#Block-12712">5.1.12</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>Emergency Procedures</strong></p>
</td>
<td>EP</td>
<td>
<p><a title="Emergency Procedures" href="http://nzism.gcsb.govt.nz/ism-document#Block-12716">5.1.13</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>Independent Assurance reports for externally provided services</strong></p>
</td>
<td>-</td>
<td>
<p><a title="Independent assurance reports" href="http://nzism.gcsb.govt.nz/ism-document#Section-12847">5.8</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="5.1.6."


><![CDATA[<p>Additional information on third party providers is provided in the PSR.&nbsp;</p>
<table class="table-grey mceItemTable">
<tbody>
<tr>
<td>Reference</td>
<td>Title</td>
<td>Source</td>
</tr>
<tr>
<td><strong>PSR Mandatory Requirements</strong></td>
<td>
<p>GOV4, GOV5, INFOSEC1, INFOSEC2, PERSEC1, PERSEC2, PERSEC3 and PERSEC4</p>
</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Information Security Policy (SecPol)"><paragraph
    title="5.1.7.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The SecPol is an essential part of information security documentation as it outlines the high-level policy objectives. The SecPol can form part of the overall agency security policy.</p>]]></paragraph>
<paragraph
    title="5.1.7.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="692"
><![CDATA[<p>Agencies MUST have a SecPol for their agency. The SecPol is usually sponsored by the Chief Executive and managed by the CISO or Chief Information Officer (CIO). The ITSM should be the custodian of the SecPol. The SecPol should include an acceptable use policy for any agency technology equipment, systems, resources and data.</p>]]></paragraph>
</block>
<block title="Systems Architecture"><paragraph
    title="5.1.8.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The systems architecture illustrates the design of the system (including any outsourced services), consistency with the SecPol and provides the basis for the Security Risk Management Plan (SRMP).</p>]]></paragraph>
<paragraph
    title="5.1.8.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>In this context Systems Architecture includes Security Architecture.</p>]]></paragraph>
<paragraph
    title="5.1.8.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="696"
><![CDATA[<p>All systems MUST have a documented Systems Architecture.</p>]]></paragraph>
</block>
<block title="Security Risk Management Plan (SRMP)"><paragraph
    title="5.1.9.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The SRMP is considered to be a good practice approach to identifying and reducing identified security risks. Depending on the documentation framework chosen, multiple systems can refer to, or build upon, a single SRMP.</p>]]></paragraph>
<paragraph
    title="5.1.9.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="699"
><![CDATA[<p>Agencies MUST ensure that every system is covered by a Security Risk Management Plan, which includes identification of <span style="text-decoration: underline;">risk owners</span>.</p>]]></paragraph>
</block>
<block title="System Security Plan (SSP)"><paragraph
    title="5.1.10.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The SSP describes the implementation and operation of controls within the system derived from the NZISM and the SRMP. Depending on the documentation framework chosen, some details common to multiple systems can be consolidated in a higher level SSP.</p>]]></paragraph>
<paragraph
    title="5.1.10.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="702"
><![CDATA[<p>Agencies MUST ensure that every system is covered by a SSP.</p>]]></paragraph>
</block>
<block title="Standard Operating Procedures (SOPs)"><paragraph
    title="5.1.11.R.01."

    tags="Governance,Information Security Documentation,SOPs"


><![CDATA[<p>SOPs provide step-by-step guides to undertaking information security related tasks and processes. They provide assurance that tasks can be undertaken in a secure and repeatable manner, even by system users without strong technical knowledge of the system’s mechanics. Depending on the documentation framework chosen, some procedures common to multiple systems could be consolidated into a higher level SOP.</p>]]></paragraph>
<paragraph
    title="5.1.11.C.01."

    tags="Governance,Information Security Documentation,SOPs"


    classification="All Classifications"
    compliance="Must"
    cid="705"
><![CDATA[<p>Agencies MUST ensure that Standard Operating Procedures (SOPs) are developed for systems.</p>]]></paragraph>
</block>
<block title="Incident Response Plan (IRP)"><paragraph
    title="5.1.12.R.01."

    tags="Governance,Information Security Documentation,Incident Management,IRP"


><![CDATA[<p>The purpose of developing an IRP is to ensure that information security incidents are appropriately managed. In most situations the aim of the response will be to contain the incident and prevent the information security incident from escalating. The preservation of any evidence relating to the information security incident for criminal, forensic and process improvement purposes is also an important consideration.</p>]]></paragraph>
<paragraph
    title="5.1.12.C.01."

    tags="Governance,Information Security Documentation,Incident Management,IRP"


    classification="All Classifications"
    compliance="Must"
    cid="708"
><![CDATA[<p>Agencies MUST develop an Incident Response Plan and supporting procedures.</p>]]></paragraph>
<paragraph
    title="5.1.12.C.02."

    tags="Governance,Information Security Documentation,Incident Management,IRP"


    classification="All Classifications"
    compliance="Must"
    cid="709"
><![CDATA[<p>Agency personnel MUST be trained in and periodically exercise the Incident Response Plan.</p>]]></paragraph>
</block>
<block title="Emergency Procedures (EP)"><paragraph
    title="5.1.13.R.01."

    tags="Governance,Information Security Documentation,Emergency Procedures"


><![CDATA[<p>Classified information and systems are secured if a building emergency or evacuation is required.</p>]]></paragraph>
<paragraph
    title="5.1.13.C.01."

    tags="Governance,Information Security Documentation,Emergency Procedures"


    classification="All Classifications"
    compliance="Should"
    cid="712"
><![CDATA[<p>Agencies SHOULD document procedures relating to securing classified information and systems when required to evacuate a facility in the event of an emergency.</p>]]></paragraph>
</block>
<block title="Developing content"><paragraph
    title="5.1.14.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Ensuring personnel developing information security documentation are sufficiently knowledgeable of information security issues and business requirements will assist in achieving the most useful and accurate set of documentation.</p>]]></paragraph>
<paragraph
    title="5.1.14.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="715"
><![CDATA[<p>Agencies SHOULD ensure that information security documentation is developed by personnel with a good understanding of policy requirements, the subject matter, essential processes and the agency’s business and operations</p>]]></paragraph>
</block>
<block title="Documentation content"><paragraph
    title="5.1.15.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>As the SRMP, Systems Architecture, SSP, SOPs and IRP are developed as a documentation suite for a system it is essential that they are logically connected and consistent within themselves and with other agency systems. Furthermore, each documentation suite developed for a system will need to be consistent with the agency’s overarching SecPol.</p>]]></paragraph>
<paragraph
    title="5.1.15.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="718"
><![CDATA[<p>Agencies SHOULD ensure that their SRMP, Systems Architecture, SSP, SOPs and IRP are logically connected and consistent for each system, other agency systems and with the agency’s SecPol.</p>]]></paragraph>
</block>
<block title="Documentation framework"><paragraph
    title="5.1.16.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The implementation of an overarching information security document framework ensures that all documentation is accounted for, complete and maintained appropriately. Furthermore, it can be used to describe linkages between documents, especially when higher level documents are used to avoid repetition of information in lower level documents.</p>]]></paragraph>
<paragraph
    title="5.1.16.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="721"
><![CDATA[<p>Agencies SHOULD create and maintain an overarching document describing the agency’s documentation framework, including a complete listing of all information security documentation that shows a document hierarchy and defines how each document is related to the other.</p>]]></paragraph>
<paragraph
    title="5.1.16.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="722"
><![CDATA[<p>Where an agency lacks an existing, well-defined documentation framework, they SHOULD use the document names defined in this manual.</p>]]></paragraph>
</block>
<block title="Documentation Consistency"><paragraph
    title="5.1.17.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Consistency in approach, terminology and documentation simplifies the use and interpretation of documentation for different systems and agencies.</p>]]></paragraph>
<paragraph
    title="5.1.17.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Factors which should be taken into account when determining the classification of systems documentation include:</p><ul>
<li>Highest classification of information stored, processed or communicated over that system;</li>
<li>Sensitivity including existence of the facility;</li>
<li>Inclusion of vulnerability information, security mechanisms or special processing capability in the systems documentation;</li>
<li>Potential data aggregation;</li>
<li>Risk and threat levels; and</li>
<li>Scope and use of the system.</li>
</ul>]]></paragraph>
<paragraph
    title="5.1.17.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="726"
><![CDATA[<p>Where an agency uses alternative documentation names to those defined within this manual for their information security documentation they SHOULD convert the documentation names to those used in this manual.</p>]]></paragraph>
</block>
<block title="Documentation Classification"><paragraph
    title="5.1.18.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Systems documentation will usually reflect the importance or sensitivity of particular systems.</p>]]></paragraph>
<paragraph
    title="5.1.18.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="729"
><![CDATA[<p>Agencies MUST ensure that their SecPol, SRMP, SSP, SOPs and IRP are appropriately classified.</p>]]></paragraph>
</block>
<block title="Outsourcing development of content"><paragraph
    title="5.1.19.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Agencies outsourcing the development of information security documentation need to be aware of the contents of the documentation produced. As such, they will still need to review and control the documentation contents to make sure it is appropriate and meets their requirements.</p>]]></paragraph>
<paragraph
    title="5.1.19.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="732"
><![CDATA[<p>When information security documentation development is outsourced, agencies SHOULD:</p><ul>
<li>review the documents for suitability;</li>
<li>retain control over the content; and</li>
<li>ensure that all policy requirements are met.</li>
</ul>]]></paragraph>
</block>
<block title="Obtaining formal sign-off"><paragraph
    title="5.1.20.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Without appropriate sign-off of information security documentation within an agency, the security personnel will have a reduced ability to ensure appropriate security procedures are selected and implemented. Having sign-off at an appropriate level assists in reducing this security risk as well as ensuring that senior management is aware of information security issues and security risks to the agency’s business.</p>]]></paragraph>
<paragraph
    title="5.1.20.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="735"
><![CDATA[<p>All information security documentation SHOULD be formally approved and signed off by a person with an appropriate level of seniority and authority.</p>]]></paragraph>
<paragraph
    title="5.1.20.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="736"
><![CDATA[<p>Agencies SHOULD ensure that:</p><ul>
<li>all high-level information security documentation is approved by the CISO and the agency head or their delegate; and</li>
<li>all system-specific documents are reviewed by the ITSM and approved by the system owner.</li>
</ul>]]></paragraph>
</block>
<block title="Documentation Maintenance"><paragraph
    title="5.1.21.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The threat environment and agencies’ businesses are dynamic. If an agency fails to keep their information security documentation up to date to reflect the changing environment, they do not have a means of ascertaining that their security measures and processes continue to be effective.</p>]]></paragraph>
<paragraph
    title="5.1.21.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Changes to risk and technology may dictate a reprioritisation of resources in order to maximise the effectiveness of security measures and processes.</p>]]></paragraph>
<paragraph
    title="5.1.21.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="767"
><![CDATA[<p>Agencies SHOULD develop a regular schedule for reviewing all information security documentation.</p>]]></paragraph>
<paragraph
    title="5.1.21.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="768"
><![CDATA[<p>Agencies SHOULD ensure that information security documentation is reviewed:</p><ul>
<li>at least annually; or</li>
<li>in response to significant changes in the environment, business or system; and</li>
<li>with the date of the most recent review being recorded on each document.</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
<section title="5.2. Information Security Policies"><subsection title="Objective"><paragraph
    title="5.2.1."


><![CDATA[<p>Information security policies (SecPol) set the strategic direction for information security.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="5.2.2."


><![CDATA[<p>This section relates to the development of Information Security Policies and any supporting plans. Information relating to other mandatory documentation can be found in <a title="Documentation fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-12683">Section 5.1 - Documentation Fundamentals</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="The Information Security Policy (SecPol)"><paragraph
    title="5.2.3.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>To provide consistency in approach and documentation, agencies should consider the following when developing their SecPol:</p><ul>
<li>policy objectives;</li>
<li>how the policy objectives will be achieved;</li>
<li>the guidelines and legal framework under which the policy will operate;</li>
<li>stakeholders;</li>
<li>education and training;</li>
<li>what resourcing will be available to support the implementation of the policy; </li>
<li>what performance measures will be established to ensure that the policy is being implemented effectively; and</li>
<li>a review cycle.</li>
</ul>]]></paragraph>
<paragraph
    title="5.2.3.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>In developing the contents of the SecPol, agencies may also consult any agency-specific directives that are applicable to information security within their agency.</p>]]></paragraph>
<paragraph
    title="5.2.3.R.03."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Agencies should also avoid outlining controls for systems within their SecPol. The controls for a system will be determined by this manual and based on the scope of the system, along with any additional controls as determined by the SRMP, and documented within the SSP.</p>]]></paragraph>
<paragraph
    title="5.2.3.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="780"
><![CDATA[<p>The Information Security Policy (SecPol) SHOULD document the information security guidelines, standards and responsibilities of an agency.</p>]]></paragraph>
<paragraph
    title="5.2.3.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="781"
><![CDATA[<p>The Information Security Policy (SecPol) SHOULD include topics such as:</p><ul>
<li>accreditation processes;</li>
<li>personnel responsibilities;</li>
<li>configuration control;</li>
<li>access control;</li>
<li>networking and connections with other systems;</li>
<li>physical security and media control;</li>
<li>emergency procedures and information security incident management;</li>
<li>vulnerability disclosure;</li>
<li>change management; and</li>
<li>information security awareness and training.</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
<section title="5.3. Security Risk Management Plans"><subsection title="Objective"><paragraph
    title="5.3.1."


><![CDATA[<p>Security Risk Management Plans (SRMP) identify security risks and appropriate treatment measures for systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="5.3.2."


><![CDATA[<p>This section relates to the development of SRMPs, focusing on risks associated with the security of systems. Information relating to other mandatory documentation can be found in <a title="Documentation Fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-12683">Section 5.1 - Documentation Fundamentals</a>.</p>]]></paragraph>
<paragraph
    title="5.3.3."


><![CDATA[<p>SRMPs may be developed on a functional basis, systems basis or project basis. For example, where physical elements will apply to all systems is use within that agency, a single SRMP covering all physical elements is acceptable. Generally each system will require a separate SRMP.</p>]]></paragraph>
<paragraph
    title="5.3.4."


><![CDATA[<p class="NormS5C3">The agency’s risk identification and assessment process should include:</p><ul>
<li>How risks are found, recognised and described; and</li>
<li>How sources of possible risks are to be considered.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="5.3.5."


><![CDATA[<p>Information on the development of SRMPs can be found in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong><strong><strong><strong>HB 436:2013</strong></strong></strong></strong></td>
<td>
<p><strong>Risk management guidelines - Companion to AS/NZS ISO 31000:2009</strong></p>
</td>
<td style="text-align: center;">Standards NZ</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz/</a><br><a rel="noopener noreferrer" href="http://www.standards.co.nz" target="_blank"></a></td>
</tr>
<tr>
<td><strong><strong><strong>ISO</strong>&nbsp;22301:2019</strong></strong></td>
<td><strong>Business Continuity</strong></td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td><a title="ISO 22301:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/75106.html" target="_blank">https://www.iso.org/standard/75106.html</a></td>
</tr>
<tr>
<td><strong><strong><strong>ISO</strong>&nbsp;31000:2018</strong></strong></td>
<td><strong>Risk Management - Guidelines</strong></td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="ISO 31000:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/65694.html" target="_blank">https://www.iso.org/standard/65694.html</a></p>
</td>
</tr>
<tr>
<td><strong><strong><strong>IEC</strong>&nbsp;31010:2019</strong></strong></td>
<td><strong>Risk Management – Risk Assessment Techniques</strong></td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="IEC 31010:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/72140.html" target="_blank">https://www.iso.org/standard/72140.html</a></p>
</td>
</tr>
<tr>
<td><strong><strong><strong>ISO</strong>&nbsp;Guide 73:2009</strong></strong></td>
<td><strong>Risk Management &nbsp;- Vocabulary</strong></td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="ISO Guide 73:2009" rel="noopener noreferrer" href="https://www.iso.org/standard/44651.html" target="_blank">https://www.iso.org/standard/44651.html</a></p>
</td>
</tr>
<tr>
<td><strong><strong>ISO</strong>&nbsp;19011:2018</strong></td>
<td><strong>Guidelines for auditing management systems</strong></td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO 19011:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/70017.html" target="_blank">https://www.iso.org/standard/70017.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 27000:2018</strong></td>
<td><strong>Information technology - Security techniques - Information security management systems - Overview and vocabulary</strong></td>
<td style="text-align: center;">ISO</td>
<td>
<p><a title="ISO/IEC 27000:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/73906.html" target="_blank">https://www.iso.org/standard/73906.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27001:2013</strong></td>
<td><strong>Information technology - Security techniques -&nbsp;<strong>Information security management systems - Requirements</strong></strong></td>
<td style="text-align: center;">ISO</td>
<td>
<p><a title="ISO/IEC 27001:2013" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></p>
</td>
</tr>
<tr>
<td><strong><strong><strong>ISO/IEC</strong>&nbsp;27005:2018</strong></strong></td>
<td><strong>Information Security Risk Management&nbsp;</strong></td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27005:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/75281.html" target="_blank">https://www.iso.org/standard/75281.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 27006:2015</strong></td>
<td><strong>Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems</strong></td>
<td style="text-align: center;">ISO</td>
<td>
<p><a title="ISO/IEC 27006:2015" rel="noopener noreferrer" href="https://www.iso.org/standard/62313.html" target="_blank">https://www.iso.org/standard/62313.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27007:2020</strong></td>
<td><strong>Information technology - Security techniques - Guidelines for information security management systems auditing</strong></td>
<td style="text-align: center;">ISO</td>
<td>
<p><a title="ISO/IEC 27007:2020" rel="noopener noreferrer" href="https://www.iso.org/standard/77802.html" target="_blank">https://www.iso.org/standard/77802.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC TS 27008:2019</strong></td>
<td>
<p class="no-uppercase"><strong>Information technology - Security techniques - Guidelines for the assessment of information security controls</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC TS 27008:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/67397.html" target="_blank">https://www.iso.org/standard/67397.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 27017:2015</strong></td>
<td>
<p class="no-uppercase"><strong>Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27017:2015" rel="noopener noreferrer" href="https://www.iso.org/standard/43757.html" target="_blank">https://www.iso.org/standard/43757.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 27018:2019</strong></td>
<td><strong><strong>Information technology - Security techniques - Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors</strong></strong></td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27018:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/76559.html" target="_blank">https://www.iso.org/standard/76559.html</a><br><a rel="noopener noreferrer" href="http://www.iso.org" target="_blank"></a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Agency and system specific security risks"><paragraph
    title="5.3.6.R.01."

    tags="Governance,Information Security Documentation,SRMP"


><![CDATA[<p>While a baseline of security risks with associated levels of security risk and corresponding risk treatments are provided in this manual, agencies will almost certainly have variations to those considered during the security risk assessment. Such variations could be in the form of differing risk sources and threats, assets and vulnerabilities, or exposure and severity. In such cases an agency will need to follow its own risk management procedures to determine its risk appetite and associated risk acceptance, risk avoidance and risk tolerance thresholds. Risk owners must be identified.</p>]]></paragraph>
<paragraph
    title="5.3.6.C.01."

    tags="Governance,Information Security Documentation,SRMP"


    classification="All Classifications"
    compliance="Should"
    cid="802"
><![CDATA[<p>Agencies SHOULD determine agency and system specific security risks that could warrant additional controls to those specified in this manual.</p>]]></paragraph>
</block>
<block title="Contents of SRMPs"><paragraph
    title="5.3.7.R.01."

    tags="Governance,Information Security Documentation,SRMP"


><![CDATA[<p>Risks within an agency cannot be managed if they are not known, and if they are known, failing to treat or accept them is also a failure of risk management. For this reason SRMPs consist of two components, a security risk assessment and a corresponding treatment strategy.</p>]]></paragraph>
<paragraph
    title="5.3.7.C.01."

    tags="Governance,Information Security Documentation,SRMP"


    classification="All Classifications"
    compliance="Should"
    cid="805"
><![CDATA[<p>The Security Risk Management Plan SHOULD contain a security risk assessment and a corresponding treatment strategy.</p>]]></paragraph>
</block>
<block title="Agency risk management"><paragraph
    title="5.3.8.R.01."

    tags="Governance,Information Security Documentation,SRMP"


><![CDATA[<p>If an agency fails to incorporate SRMPs for systems into their wider agency risk management plan then the agency will be unable to manage risks in a coordinated and consistent manner across the agency.</p>]]></paragraph>
<paragraph
    title="5.3.8.C.01."

    tags="Governance,Information Security Documentation,SRMP"


    classification="All Classifications"
    compliance="Should"
    cid="808"
><![CDATA[<p>Agencies SHOULD incorporate their SRMP into their wider agency risk management plan.</p>]]></paragraph>
</block>
<block title="Risk Management standards"><paragraph
    title="5.3.9.R.01."

    tags="Governance,Information Security Documentation,Risk Management,SRMP"


><![CDATA[<p>For security risk management to be of true value to an agency there must be direct relevance to the specific circumstances of an agency and its systems, as well as being based on an industry recognised approach or risk management guidelines. For example, guidelines and standards produced by Standards New Zealand and the International Organization for Standardization.</p>
<p>The <a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">Protective Security Requirements&nbsp;</a>requires that agencies adopt risk management approaches in accordance with <a title="ISO 31000:2018 - Risk Management Principles and Guidance" rel="noopener noreferrer" href="https://www.iso.org/standard/65694.html" target="_blank">ISO 31000:2018</a>. Refer to <a title="PSR Governance Mandatory Requirements" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">PSR governance requirement GOV2</a>.</p>]]></paragraph>
<paragraph
    title="5.3.9.R.02."

    tags="Governance,Information Security Documentation,Risk Management,SRMP"


><![CDATA[<p>The <a title="ISO - International Organization for Standardisation" rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">International Organization for Standardization </a>has developed an international risk management standard, including principles and guidelines on implementation, outlined in <a title="ISO 31000:2018 Risk Management - Guidelines" rel="noopener noreferrer" href="https://www.iso.org/standard/65694.html" target="_blank">ISO&nbsp;31000:2018, Risk Management – Guidelines</a>. The terms and definitions for this standard can be found in <a title="ISO 31073:2022 Risk Management - Vocabulary" rel="noopener noreferrer" href="https://www.iso.org/standard/79637.html" target="_blank">ISO/IEC 31073:2022, Risk Management – Vocabulary</a>. The <a title="ISO/IEC 27000 family - Information security management systems" rel="noopener noreferrer" href="https://www.iso.org/isoiec-27001-information-security.html" target="_blank">ISO/IEC 2700x series of standards</a> also provides guidance.</p>]]></paragraph>
<paragraph
    title="5.3.9.C.01."

    tags="Governance,Information Security Documentation,Risk Management,SRMP"


    classification="All Classifications"
    compliance="Should"
    cid="812"
><![CDATA[<p>Agencies SHOULD develop their SRMP in accordance with international standards for risk management.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="5.4. System Security Plans"><subsection title="Objective"><paragraph
    title="5.4.1."


><![CDATA[<p>System Security Plans (SSPs) specify the information security measures for systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="5.4.2."


><![CDATA[<p>This section relates to the development of SSPs. Information relating to other mandatory documentation can be found in <a title="Documentation fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-12683">Section 5.1 - Documentation Fundamentals</a>.</p>]]></paragraph>
<paragraph
    title="5.4.3."


><![CDATA[<p>Further information to be included in SSPs relating to specific functionality or technologies that could be implemented for a system can be found in the applicable areas of this manual.</p>]]></paragraph>
</block>
<block title="Stakeholders"><paragraph
    title="5.4.4."


><![CDATA[<p>There can be many stakeholders involved in defining a SSP including representatives from the:</p><ul>
<li>project, who MUST deliver the capability (including contractors);</li>
<li>owners of the information to be handled;</li>
<li>system users for whom the capability is being developed;</li>
<li>management audit authority;</li>
<li>CISO, ITSM and system owners;</li>
<li>system certifiers and accreditors;</li>
<li>information management planning areas; and</li>
<li>infrastructure management.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Contents of System Security Plans (SSPs)"><paragraph
    title="5.4.5.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The NZISM provides a list of controls that are potentially applicable to a system based on its classification, its functionality and the technology it is implementing. Agencies will need to determine which controls are in scope of the system and translate those controls to the SSP. These controls will then be assessed on their implementation and effectiveness during an information security assessment as part of the accreditation process.</p>]]></paragraph>
<paragraph
    title="5.4.5.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>In performing accreditations against the latest baseline of this manual, agencies are ensuring that they are taking the most recent threat environment into consideration. GCSB continually monitors the threat environment and conducts research into the security impact of emerging trends. With each release of this manual, controls can be added, rescinded or modified depending on changes in the threat environment.</p>]]></paragraph>
<paragraph
    title="5.4.5.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="828"
><![CDATA[<p>Agencies MUST select controls from this manual to be included in the SSP based on the scope of the system with additional system specific controls being included as a result of the associated SRMP. Encryption Key Management requires specific consideration; refer to <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a>.</p>]]></paragraph>
<paragraph
    title="5.4.5.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="829"
><![CDATA[<p>Agencies SHOULD use the latest baseline of this manual when developing, and updating, their SSPs as part of the certification, accreditation and reaccreditation of their systems.</p>]]></paragraph>
<paragraph
    title="5.4.5.C.03."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="831"
><![CDATA[<p>Agencies SHOULD include a Key Management Plan in the SSP.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="5.5. Standard Operating Procedures"><subsection title="Objective"><paragraph
    title="5.5.1."


><![CDATA[<p>Standard Operating Procedures (SOPs) ensure security procedures are followed in an appropriate and repeatable manner.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="5.5.2."


><![CDATA[<p>This section relates to the development of security related SOPs. Information relating to other mandatory documentation can be found in <a title="Document Fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-12683">Section 5.1 - Documentation Fundamentals</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Development of SOPs"><paragraph
    title="5.5.3.R.01."

    tags="Governance,Information Security Documentation,SOPs"


><![CDATA[<p>In order to ensure that personnel undertake their duties in an appropriate manner, with a minimum of confusion, it is important that the roles of ITSMs, system administrators and system users are covered by SOPs. Furthermore, taking steps to ensure that SOPs are consistent with SSPs will reduce the potential for confusion resulting from conflicts in policy and procedures.</p>]]></paragraph>
<paragraph
    title="5.5.3.C.01."

    tags="Governance,Information Security Documentation,SOPs"


    classification="All Classifications"
    compliance="Should"
    cid="844"
><![CDATA[<p>Agencies SHOULD develop SOPs for each of the following roles:</p><ul>
<li>ITSM;</li>
<li>system administrator; and</li>
<li>system user.</li>
</ul>]]></paragraph>
</block>
<block title="ITSM SOPs"><paragraph
    title="5.5.4.R.01."

    tags="Governance,Information Security Documentation,SOPs"


><![CDATA[<p>The ITSM SOPs are intended to cover the management and leadership of information security functions within the agency.</p>]]></paragraph>
<paragraph
    title="5.5.4.C.01."

    tags="Governance,Information Security Documentation,SOPs"


    classification="All Classifications"
    compliance="Should"
    cid="849"
><![CDATA[<p>The following procedures SHOULD be documented in the ITSMs SOPs.</p><table class="table-control">
<tbody>
<tr>
<td style="width: 20%;">Topic</td>
<td>Procedures to be included</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Access control</strong></td>
<td>Authorising access rights to applications and data.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Asset Musters</strong></td>
<td>Labelling, registering and mustering assets, including media.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Audit logs</strong></td>
<td>Reviewing system audit trails and manual logs, particularly for privileged users.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Configuration control</strong></td>
<td>Approving and releasing changes to the system software or configurations.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Information security incidents</strong></td>
<td>Detecting, reporting and managing potential information security incidents.</td>
</tr>
<tr>
<td style="width: 20%;"><strong> </strong></td>
<td>Establishing the cause of any information security incident, whether accidental or deliberate.</td>
</tr>
<tr>
<td style="width: 20%;"><strong> </strong></td>
<td>Actions to be taken to recover and minimise the exposure from an information security incident.</td>
</tr>
<tr>
<td style="width: 20%;"><strong> </strong></td>
<td>Additional actions to prevent reoccurrence.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Data transfers</strong></td>
<td>Managing the review of media containing classified information that is to be transferred off-site.</td>
</tr>
<tr>
<td style="width: 20%;"><strong> </strong></td>
<td>Managing the review of incoming media for malware or unapproved software.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>IT equipment</strong></td>
<td>Managing the disposal &amp; destruction of unserviceable IT equipment and media.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>System Patching</strong></td>
<td>Advising and recommending system patches, updates and version changes based on security notices and related advisories.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>System integrity audit</strong></td>
<td>Reviewing system user accounts, system parameters and access controls to ensure that the system is secure.</td>
</tr>
<tr>
<td style="width: 20%;"><strong> </strong></td>
<td>Checking the integrity of system software.</td>
</tr>
<tr>
<td style="width: 20%;"><strong> </strong></td>
<td>Testing access controls.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>System maintenance</strong></td>
<td>
<p>Managing the ongoing security and functionality of system software, including: maintaining awareness of current software vulnerabilities, testing and applying software patches/updates/signatures, and applying appropriate hardening techniques.</p>
</td>
</tr>
<tr>
<td style="width: 20%;"><strong>User account management</strong></td>
<td>Authorising new system users.</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="System Administrator SOPs"><paragraph
    title="5.5.5.R.01."

    tags="Governance,Information Security Documentation,SOPs"


><![CDATA[<p>The system administrator SOPs focus on the administrative activities related to system operations.</p>]]></paragraph>
<paragraph
    title="5.5.5.C.01."

    tags="Governance,Information Security Documentation,SOPs"


    classification="All Classifications"
    compliance="Should"
    cid="865"
><![CDATA[<p>The following procedures SHOULD be documented in the system administrator’s SOPs.</p><p> </p><table class="table-control">
<tbody>
<tr>
<td><strong>Topic</strong></td>
<td><strong>Procedures to be included</strong></td>
</tr>
<tr>
<td><strong>Access control</strong></td>
<td>Implementing access rights to applications and data.</td>
</tr>
<tr>
<td><strong>Configuration control</strong></td>
<td>Implementing changes to the system software or configurations.</td>
</tr>
<tr>
<td><strong>System backup and recovery</strong></td>
<td>Backing up data, including audit logs.</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Securing backup tapes.</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Recovering from system failures.</td>
</tr>
<tr>
<td><strong>User account management</strong></td>
<td>Adding and removing system users.</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Setting system user privileges.</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Cleaning up directories and files when a system user departs or changes roles.</td>
</tr>
<tr>
<td><strong>Incident response</strong></td>
<td>Detecting, reporting and managing potential information security incidents.</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Establishing the cause of any information security incident, whether accidental or deliberate.</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Actions to be taken to recover and minimise the exposure from information security incident.</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Additional actions to prevent reoccurrence.</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="System User SOPs"><paragraph
    title="5.5.6.R.01."

    tags="Governance,Information Security Documentation,Software Security"


><![CDATA[<p>The system user SOPs focus on day to day activities that system users need to be made aware of, and comply with, when using systems.</p>]]></paragraph>
<paragraph
    title="5.5.6.C.01."

    tags="Governance,Information Security Documentation,SOPs"


    classification="All Classifications"
    compliance="Should"
    cid="884"
><![CDATA[<p>The following procedures SHOULD be documented in the system user’s SOPs.</p><table class="table-control">
<tbody>
<tr>
<td><strong>Topic</strong></td>
<td>
<p><strong>Procedures to be included</strong></p>
</td>
</tr>
<tr>
<td><strong>Acceptable Use </strong></td>
<td>Acceptable uses of the system(s).</td>
</tr>
<tr>
<td><strong>End of day</strong></td>
<td>How to secure systems at the end of the day.</td>
</tr>
<tr>
<td>
<p><strong>Information security incidents</strong></p>
</td>
<td>What to do in the case of a suspected or actual information security incident.</td>
</tr>
<tr>
<td><strong>Media control</strong></td>
<td>Procedures for handling and using media.</td>
</tr>
<tr>
<td><strong>Passwords</strong></td>
<td>
<p>Choosing and protecting passwords.</p>
</td>
</tr>
<tr>
<td><strong>Temporary absence</strong></td>
<td>How to secure systems when temporarily absent.</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Agreement to abide by SOPs"><paragraph
    title="5.5.7.R.01."

    tags="Governance,Information Security Documentation,SOPs"


><![CDATA[<p>When SOPs are produced the intended audience should be made aware of their existence and acknowledge that they have read, understood and agree to abide by their contents.</p>]]></paragraph>
<paragraph
    title="5.5.7.C.01."

    tags="Governance,Information Security Documentation,SOPs"


    classification="All Classifications"
    compliance="Should"
    cid="889"
><![CDATA[<p>ITSMs, system administrators and system users SHOULD sign a statement that they have read and agree to abide by their respective SOPs.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="5.6. Incident Response Plans"><subsection title="Objective"><paragraph
    title="5.6.1."


><![CDATA[<p>Incident Response Plans (IRP) outline actions to take in response to an information security incident.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="5.6.2."


><![CDATA[<p>This section relates to the development of IRPs to address information security, and not physical incidents within agencies. Information relating to other mandatory documentation can be found in <a title="Document Fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-12683">Section 5.1 - Documentation Fundamentals</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Contents of IRPs"><paragraph
    title="5.6.3.R.01."

    tags="Governance,Information Security Documentation,IRP"


><![CDATA[<p>The guidance provided on the content of IRPs will ensure that agencies have a baseline to develop an IRP with sufficient flexibility, scope and level of detail to address the majority of information security incidents that could arise.</p>]]></paragraph>
<paragraph
    title="5.6.3.C.01."

    tags="Governance,Information Security Documentation,IRP"


    classification="All Classifications"
    compliance="Must"
    cid="902"
><![CDATA[<p>Agencies MUST include, as a minimum, the following content within their IRP:</p><ul>
<li>broad guidelines on what constitutes an information security incident;</li>
<li>the minimum level of information security incident response and investigation training for system users and system administrators;</li>
<li>the authority responsible for initiating investigations of an information security incident;</li>
<li>the steps necessary to ensure the integrity of evidence supporting an information security incident;</li>
<li>the steps necessary to ensure that critical systems remain operational;&nbsp;</li>
<li>when and how to formally report information security incidents; and</li>
<li>national policy requirements for incident reporting (<a title="Information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">see Chapter 7 – Information Security Incidents</a>).</li>
</ul>]]></paragraph>
<paragraph
    title="5.6.3.C.02."

    tags="Governance,Information Security Documentation,IRP"


    classification="All Classifications"
    compliance="Should"
    cid="904"
><![CDATA[<p>Agencies SHOULD include the following content within their IRP:</p><ul>
<li>clear definitions of the types of information security incidents that are likely to be encountered;</li>
<li>the expected response to each information security incident type;</li>
<li>the authority within the agency that is responsible for responding to information security incidents;</li>
<li>the criteria by which the responsible authority would initiate or request formal, police investigations of an information security incident;</li>
<li>which other agencies or authorities need to be informed in the event of an investigation being undertaken; and</li>
<li>the details of the system contingency measures or a reference to these details if they are located in a separate document.</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
<section title="5.7. Emergency Procedures"><subsection title="Objective"><paragraph
    title="5.7.1."


><![CDATA[<p>Classified information and systems are secured before personnel evacuate a facility in the event of an emergency.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="5.7.2."


><![CDATA[<p>This section covers information relating to the securing of classified information and systems as part of the procedures for evacuating a facility in the event of an emergency.</p>]]></paragraph>
<paragraph
    title="5.7.3."


><![CDATA[<p>The safety of personnel is of paramount importance.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Evacuating facilities"><paragraph
    title="5.7.4.R.01."

    tags="Governance,Information Security Documentation,Emergency Procedures"


><![CDATA[<p class="NormS5C7b">When evacuating a facility, it is important that personnel secure classified information and systems as they would at the end of operational hours.  This includes, but is not limited to, securing media, logging off of workstations and securing safes and cabinets.  This is important as an attacker could use such an opportunity to gain access to documents, applications or databases that a system user had already authenticated to or use another system user’s credentials for a malicious purpose.</p>]]></paragraph>
<paragraph
    title="5.7.4.R.02."

    tags="Governance,Information Security Documentation,Emergency Procedures"


><![CDATA[<p class="Normal-nonumbering">During an evacuation, the safety of staff is of primary importance.  Where it is immediately obvious to wardens and/or staff that the securing of classified information and systems prior to the evacuation of a facility would lead to, or exacerbate, serious injury or loss of life to personnel, the facility may be evacuated without personnel following the necessary procedures to secure classified information and systems.</p>]]></paragraph>
<paragraph
    title="5.7.4.R.03."

    tags="Governance,Information Security Documentation,Emergency Procedures"


><![CDATA[<p class="Normal-nonumbering">Where facilities are evacuated and classified information and systems have <span style="text-decoration: underline;">NOT</span> been secured, the Chief Warden or Floor Warden MUST be notified as soon as possible.  Steps should be taken to secure the site as soon as it is safe to do so.</p>]]></paragraph>
<paragraph
    title="5.7.4.C.01."

    tags="Governance,Information Security Documentation,Emergency Procedures"


    classification="All Classifications"
    compliance="Must"
    cid="922"
><![CDATA[<p>Agencies MUST include in procedures for personnel evacuating a facility the requirement to secure classified information and systems prior to the evacuation.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="5.8. Independent Assurance Reports"><subsection title="Objective"><paragraph
    title="5.8.1."

    tags="Governance"


><![CDATA[<p>To provide assurance to System Owners, Certifiers, Practitioners and Accreditors and to assist system designers, enterprise and security architects where assurance reviews cannot be directly undertaken on service providers.</p>]]></paragraph>
 </subsection>
<subsection title="Context "> <block title="Scope"><paragraph
    title="5.8.2."


><![CDATA[<p>Independent assurance reports are also variously referred to as third party assurance reporting, third party reviews, attestation reports and SAS 70 reports. It is important to note that SAS 70 has been superseded by the ISAE 3402 and SSAE 16 standards encompassing Type I and 2 and SOC 1, 2 and 3 reports. For reviews conducted in New Zealand the ISAE (NZ) 3402 or ISAE (NZ) 3000 standards are used. These various standards and report types are discussed later in this section. Agencies are likely to encounter a variety of report types, depending on the country of residence or country of jurisdiction of the service provider, or the geographic location of the data centre.</p>]]></paragraph>
</block>
<block title="Purpose"><paragraph
    title="5.8.3."


><![CDATA[<p>Many organisations are outsourcing key components of their business such as telecommunications, data storage and cloud based services. Managing third-party relationships is particularly challenging with services provided from outside New Zealand. The global nature of these services and the global nature of associated risks must be recognised by organisations. As outsourced services are becoming more integrated with organisation’s operations, they will have a larger impact on organisation’s governance, assurance and control frameworks. It is important to note that risk ownership and accountability remains with agencies and respective risk owners, even when responsibility for specific functions have been outsourced.</p>]]></paragraph>
<paragraph
    title="5.8.4."


><![CDATA[<p>Independent assurance reports provide customers and other interested parties with information on policies, procedures and controls related to the service provider’s internal frameworks, control objectives and controls in cases where physical inspections and reviews by customers are impractical or not feasible. Service providers may also use the findings of such reports for their own purposes. These reports are used to understand the adequacy and effectiveness of the service provider’s frameworks, control objectives, controls and implementation of controls. They allow:</p><ul>
<li>Business owners to identify and understand the risks associated with the service delivery;</li>
<li>System owners to more fully assess system risks;</li>
<li>System designers and security architects to make informed judgements on system structures, controls, defensive measures, and enterprise integration; and</li>
<li>Regulators, certifiers and accreditors to obtain assurance over the service providers internal control structures and assess the suitability of system structures, controls and defensive measures.</li>
</ul>]]></paragraph>
<paragraph
    title="5.8.5."


><![CDATA[<p>An independent assurance review or third-party audit is invariably undertaken by independent auditors who are not employees of the service provider or their customers. There are two common types of independent third-party reviews: attestation reviews and direct non-attestation reviews.</p>]]></paragraph>
<paragraph
    title="5.8.6."


><![CDATA[<p>Attestation reviews, such as an ISAE 3402 review (see below), are generally conducted by accounting or consulting organisations and are based upon recognised attestation standards issued by professional bodies such as the American Institute of Certified Public Accountants (AICPA) or the New Zealand External Reporting Board (XRB).</p>]]></paragraph>
<paragraph
    title="5.8.7."


><![CDATA[<p>Direct or non-attestation reviews include those performed by IT consultants or others and may not follow standards referred to previously. They may be based upon other external standards or industry developed criteria such as ISO 2700x, ISACA’s COBIT, the IIA, NIST, or the Cloud Security Alliance (CSA).</p>]]></paragraph>
</block>
<block title="Assurance"><paragraph
    title="5.8.8."


><![CDATA[<p>Assurance is derived from an assessment of:</p><ul>
<li>A description of the service provider’s business and control environment;</li>
<li>Terms and conditions of the service contract or other legally binding agreement;</li>
<li>Assertions supplied by the service provider (self-assessments);</li>
<li>An independent validation of service provider assertions;</li>
<li>Independent testing of controls implementation and effectiveness;</li>
<li>Assurance in the service design and security architecture; and</li>
<li>Assurance in the service components.</li>
</ul>]]></paragraph>
<paragraph
    title="5.8.9."


><![CDATA[<p>In general terms, the more ICT services that are outsourced in an agency, the less direct control and visibility the CE and management have over enterprise operations. Therefore, there is an increased reliance on assurance reporting from suppliers.  Unless this is recognised in service contracts or legal agreements, agencies may find they are unable to obtain sufficient levels of assurance over the business services and enterprise operations.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Assurance Standards and schemes"> <block title="ISAE (NZ) 3000"><paragraph
    title="5.8.10."


><![CDATA[<p>ISAE (NZ) 3000 (Revised) is issued by the External Reporting Board (XRB) of the New Zealand Audit and Assurance Standards Board and is the umbrella standard for other (non-financial) assurance engagements conducted in New Zealand. The standard covers a wide variety of engagements, ranging from assurance on statements about the effectiveness of internal control, for example, to assurance on sustainability reports and possible future engagements addressing integrated reporting. It is a principle-based standard that underpins current and future subject-specific ISAEs (NZ).</p>]]></paragraph>
</block>
<block title="ISAE (NZ) 3402"><paragraph
    title="5.8.11."


><![CDATA[<p>In New Zealand the XRB issued the ISAE (NZ) 3402 in 2014, revised in 2016.  This standard has essentially the same requirements as the international standard ISAE 3402 (see below), with some New Zealand specific adaptations.  Australia, Singapore and many other jurisdictions have adopted this approach in the issue of this standard with some jurisdiction specific adaptations.</p>]]></paragraph>
</block>
<block title="ISAE 3402"><paragraph
    title="5.8.12."


><![CDATA[<p>The most commonly used international standard for independent assurance reports is the International Standard on Assurance Engagements (ISAE) No. 3402, Assurance Reports on Controls at a Service Organization, issued in December 2009 by the International Auditing and Assurance Standards Board (IAASB), part of the International Federation of Accountants (IFAC).</p>]]></paragraph>
<paragraph
    title="5.8.13."


><![CDATA[<p>Based on its predecessor standard SAS 70 (1992), ISAE 3402 was developed to provide an international assurance standard for allowing public accountants to issue a report for use by user organisations and their auditors (user auditors) on the controls at a service organisation that are likely to impact or be a part of the user organisation’s system of internal control over financial reporting.</p>]]></paragraph>
<paragraph
    title="5.8.14."


><![CDATA[<p>Auditing and associated consulting firms were required to use ISAE 3402 for all related work after June 2011.</p>]]></paragraph>
</block>
<block title="ISAE 3402 Report Types"><paragraph
    title="5.8.15."


><![CDATA[<p>The ISAE 3402 provides for a report on controls at a point in time (Type 1 Report) or covering a specified period of time, usually between six and twelve months (Type 2 Report).</p>]]></paragraph>
<paragraph
    title="5.8.16."


><![CDATA[<p>A Type 1 report is of limited use as it cannot cover the operating effectiveness of controls and is generally used for new operations where there is no evidence or documented history.</p>]]></paragraph>
<paragraph
    title="5.8.17."


><![CDATA[<p>A Type 2 report not only includes the service organisation's description of controls, but also includes detailed testing of the service organisation's controls over a minimum six month period.</p>]]></paragraph>
<paragraph
    title="5.8.18."


><![CDATA[<p>It is important to note that the descriptions Type 1 and Type 2 represent an audit approach and should not be confused with SOC 1, 2 and 3 reports under SSAE 16 (see below).</p>]]></paragraph>
</block>
<block title="ISAE 3402 Report Uses and Limitations"><paragraph
    title="5.8.19."


><![CDATA[<p>This standard is used to obtain reasonable assurance about whether:</p><ul>
<li>The service organisation’s description of its system fairly presents the system as designed and implemented throughout a specified period or a specific date;</li>
<li>The controls related to the control objectives stated in the service organisation’s description of its system were suitably designed throughout the specified period or at the specified date;</li>
<li>Where included in the scope of the engagement, the controls were implemented and operated effectively to provide reasonable assurance that the control objectives stated in the service organisation’s description of its system were achieved throughout the specified period.</li>
</ul>]]></paragraph>
<paragraph
    title="5.8.20."


><![CDATA[<p>This ISAE applies only when the service organisation is responsible for, or otherwise able to make an assertion about, the suitable design of controls. It does not cover situations where:</p><ul>
<li>reporting only whether controls at a service organisation operated as described; or</li>
<li>reporting on controls at a service organisation other than those related to a service relevant to user entities.</li>
</ul>]]></paragraph>
</block>
<block title="ISAE 3402 Report Content"><paragraph
    title="5.8.21."


><![CDATA[<p>The ISAE 3402 report usually comprises:</p><ul>
<li>The service auditor’s report;</li>
<li>Assertions by the service provider;</li>
<li>A description of control objectives and controls provided by the service organisation;</li>
<li>Results of any tests and other information provided by the independent auditor; and</li>
<li>Any other information provided by the service provider.</li>
</ul>]]></paragraph>
</block>
<block title="US Standard SSAE 16"><paragraph
    title="5.8.22."


><![CDATA[<p>The Statement on Standards for Attestation Engagements No. 16 (SSAE 16) is issued by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (AICPA). It includes additional requirements to the superseded SAS 70 standard by requiring management to provide a written assertion (see below) regarding the design and operating effectiveness of the controls being reviewed. It is possible that agencies may encounter an SSAE16 based report for a US-based entity.</p>]]></paragraph>
<paragraph
    title="5.8.23."


><![CDATA[<p>SSAE 16 is the US equivalent of the international ISAE 3402 and came into effect on<br>15 June 2011. While the SSAE 16 and ISAE 3402 standards have a common purpose and intent, , there are nine very specific requirements in SSAE 16, not covered in ISAE 3402:</p><ul>
<li>Intentional acts by the service providers staff;</li>
<li>Anomalies;</li>
<li>Direct assistance;</li>
<li>Subsequent events;</li>
<li>Statement restricting use of the service auditor’s report;</li>
<li>Disclaimer of Opinion;</li>
<li>Documentation completion;</li>
<li>Engagement acceptance and continuance; and</li>
<li>Elements of the SSAE 16 report that are not required in the ISAE 3402 report.</li>
</ul>]]></paragraph>
<paragraph
    title="5.8.24."


><![CDATA[<p>These differences are summarised in the table below:</p><table class="table-main">
<tbody>
<tr>
<td style="width: 20%;"> </td>
<td><strong>SSAE 16</strong></td>
<td><strong>ISAE 3402</strong></td>
</tr>
<tr>
<td style="width: 20%;"><strong>Use of report</strong></td>
<td>Report specifically states it is restricted to intended users.</td>
<td>Report intended for user entities and their auditors but may include other restrictive use conditions.</td>
</tr>
<tr>
<td style="width: 20%;">
<p><strong>Intentional Acts</strong></p>
</td>
<td>Consideration of the impact of intention acts.</td>
<td>No requirement stated.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Subsequent Events</strong></td>
<td>Auditors must consider Type 2 events after the report date.</td>
<td>Events after the report date are not considered.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Reporting</strong></td>
<td>Sample deviations may not be discarded even when considered non-representative.</td>
<td>Sample deviations are assessed and may be discarded as not representative of the sample population.</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="5.8.25."


><![CDATA[<p>The SSAE 16 standard specifies Type 1 and 2 audits (as does ISAE 3402).</p>]]></paragraph>
<paragraph
    title="5.8.26."


><![CDATA[<p>A Type 1 is a report on a description of a service organisation’s system and the suitability of the design of controls. A Type 1 report will test the design effectiveness of defined controls by examining a sample of one item per control. This provides a basic level of assurance that the organisation has some controls in place. It does not measure the completeness or effectiveness of these controls and represents a point in time.</p>]]></paragraph>
<paragraph
    title="5.8.27."


><![CDATA[<p>A Type2 report is a report on policies and procedures placed in operation and tests of operating effectiveness for a specified period of time. A Type 2 report undertakes the tests in a Type 1 report together with an evaluation of the operating effectiveness of the controls for a period of at least six consecutive calendar months.</p>]]></paragraph>
</block>
<block title="AICPA Service Organisation Control Reporting (SOC Reports)"><paragraph
    title="5.8.28."


><![CDATA[<p>Service Organization Control (SOC) Reports, often known as SOC 1, SOC 2, and SOC 3 Reports, are derived from a framework published by the American Institute of Certified Public Accountants (AICPA) for reporting on controls at service organisations.</p>]]></paragraph>
<paragraph
    title="5.8.29."


><![CDATA[<p>In New Zealand, SOC 1 reports follow the ISAE (NZ) 3402 standard and SOC 2 reports are follow the ISAE (NZ) 3000 standard, in conjunction with the NZ Standard for Assurance Engagements SAE 3150, for assurance engagements on controls.</p>]]></paragraph>
<paragraph
    title="5.8.30."


><![CDATA[<p>Each of the three SOC reports are designed to meet specific needs and reporting requirements for service organisations themselves, rather than being designed to provide assurance to third parties (customers). It is important to note that these reports follow the US (SSAE 16) and Canadian accounting standards, rather than the international ISAE 3402.</p><p><strong>SOC 1 Report – Report on Controls at a Service Organization Relevant to User Entities’ Internal Control over Financial Reporting.</strong> Reporting on controls relevant to internal control over financial reporting and usually conducted in accordance with Statement on Standards for Attestation Engagements (SSAE) No. 16 and AT 801 – Reporting on Controls at a Service Organization. A SOC 1 report can be based on a Type 1 or a Type 2 audit.</p><p><strong>SOC 2 Report— Report on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy.</strong> SOC 2 Reporting follows the AICPA AT Section 101 (not SSAE 16) and encompasses controls at service organisations on security, availability, processing Integrity, confidentiality and privacy. SOC 2 reports assist in comparing two or more data centres or service providers.</p><p><strong>SOC 3 Report— Trust Services Report for Service Organizations.</strong> As well as reporting on controls relevant to security, availability, processing integrity, confidentiality and privacy a SOC 3 report provides the same level of assurance about controls over security, availability, processing integrity, confidentiality and/or privacy as a SOC 2 report. The key difference is that a SOC 3 report is intended for general release and does not include the detailed description of the testing performed by the auditor. In place of the detailed description a summary opinion regarding the effectiveness of the controls in place at the data centre or service organisation is provided.</p><p><strong>SOC Reports Summary</strong></p><table class="table-main">
<tbody>
<tr>
<td style="width: 15%;"><strong>Report</strong></td>
<td style="width: 18%;"><strong>Standards</strong></td>
<td><strong>Content</strong></td>
<td><strong>Audience</strong></td>
</tr>
<tr>
<td style="width: 15%;"><strong>SOC1 – Type 1</strong></td>
<td style="width: 18%;">
<p>ISAE (NZ) 3402/<br>SAE 3150<br>or<br>SSAE 16/AT 801</p>
</td>
<td>Internal controls over financial reporting at a point in time.</td>
<td>User auditors, organisation finance team, management.</td>
</tr>
<tr>
<td style="width: 15%;"><strong>SOC1 – Type 2</strong></td>
<td style="width: 18%;">
<p>ISAE (NZ) 3402/<br>SAE 3150<br>or<br>SSAE 16/AT 801</p>
</td>
<td>Internal controls over financial reporting over a specified time period, minimum 6 months.</td>
<td>User auditors, organisation finance team, management.</td>
</tr>
<tr>
<td style="width: 15%;"><strong> SOC2 – Type 1</strong></td>
<td style="width: 18%;"> ISAE (NZ) 3000/
<p>SAE 3150<br>or<br>AT 101</p>
</td>
<td>Security, availability, processing integrity, confidentiality and privacy controls at a point in time.</td>
<td>Management, regulators, third parties under Non-Disclosure Agreement.</td>
</tr>
<tr>
<td style="width: 15%;"><strong> SOC2 – Type 2</strong></td>
<td style="width: 18%;"> ISAE (NZ) 3000/
<p>SAE 3150<br>or<br>AT 101</p>
</td>
<td>Security, availability, processing integrity, confidentiality, privacy controls and operating effectiveness over a specified time period, minimum 6 months.</td>
<td>Management, regulators, third parties under Non-Disclosure Agreement.</td>
</tr>
<tr>
<td style="width: 15%;"><strong> SOC3</strong></td>
<td style="width: 18%;"> ISAE (NZ) 3000/
<p>SAE 3150<br>or<br>AT 101</p>
</td>
<td>Security, availability, processing integrity, confidentiality, privacy controls and operating effectiveness.</td>
<td>Public/general use version of SOC 2, excludes details of testing.  Is less detailed and has less technical content than a SOC 2 report.</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Management Assertions"><paragraph
    title="5.8.31."


><![CDATA[<p>See Assertions in Certification and Accreditation (<a title="Assertions in Certification and Accreditation" href="http://nzism.gcsb.govt.nz/ism-document#Block-12423">NZISM 3.4.3 to 3.4.7</a>) for a short discussion on the nature and purpose of assertions.</p>]]></paragraph>
<paragraph
    title="5.8.32."


><![CDATA[<p>The SSAE 16 requires a written assertion by management. Also known as a management’s assertion or service organisation assertion it is essentially an assertion made by the service organisation representing and asserting to a number of elements, including:</p><ul>
<li>The description fairly presents the service organisation's system;</li>
<li>That the control objectives were suitably designed (SSAE 16 Type 1) and operating effectively (SSAE 16 Type 2) during the dates and/or periods covered by the report; and</li>
<li>The criteria used for making these assertions, (which are additional statements with supporting matter regarding risk factors relating to control objectives and underlying controls) were in place (Type 1) and were consistently applied (Type 2).</li>
</ul>]]></paragraph>
</block>
<block title="ISO/IEC 27001 Certification"><paragraph
    title="5.8.33."


><![CDATA[<p>ISO/IEC 27001 is an international standard that provides a framework for Information Security Management Systems. The standard is designed to help organisations of all sizes and types to select suitable and proportionate security controls for information. It provides a structured approach to assist in managing risk by identifying information security vulnerabilities and selecting appropriate controls.</p>]]></paragraph>
<paragraph
    title="5.8.34."


><![CDATA[<p>This standard enables independent, external certification bodies to audit the ISMS and certify that the requirements of the standard have been met. Such certification is another means of deriving assurance over the operations of service providers. The requirements for certification are described in the ISO/IEC 27006:2015 standard. Certification is based on two reviews:</p><ul>
<li>Stage 1 audit (also called Documentation review) checking the systems documentation is compliant with ISO 27001;</li>
<li>Stage 2 audit (also called Main audit) checking that all the organisation’s activities are compliant with both ISO 27001 and the systems documentation.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="Other Guidance"> <block title="Cloud Security Alliance’s Security, Trust and Assurance Registry (STAR) Attestation"><paragraph
    title="5.8.35."


><![CDATA[<p>STAR Certification is a rigorous third party independent assessment of the security of a cloud service provider. It is based on the ISAE 3402 and SSAE 16 standards, supplemented by the criteria in the Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM).</p>]]></paragraph>
<paragraph
    title="5.8.36."


><![CDATA[<p>STAR is a free, publicly accessible registry that documents the security controls provided by various cloud computing service providers. The registry lists three levels of assurance:</p><ol>
<li>Self-assessment;</li>
<li>Third party assessment based attestation or certification; and</li>
<li>Continuous monitoring based certification.</li>
</ol><p><b>Note: </b>Agencies should note that a self-assessment does not necessarily provide substantive assurance.</p>]]></paragraph>
<paragraph
    title="5.8.37."


><![CDATA[<p>As at March 2017, the STAR scheme is still to be fully implemented although there are a number of cloud service providers listed in the registry.</p>]]></paragraph>
<paragraph
    title="5.8.38."


><![CDATA[<p>Agencies can use this registry to further inform their judgement on the robustness of assurance over cloud service provider’s internal operations and implementation of security controls.</p>]]></paragraph>
</block>
<block title="Cloud Security Alliance’s Cloud Controls Matric (CCM)"><paragraph
    title="5.8.39."


><![CDATA[<p>The CCM covers 16 control domains and provides fundamental security principles to guide cloud service providers and to assist prospective cloud customers in assessing the overall security risk of a cloud service provider.</p>]]></paragraph>
<paragraph
    title="5.8.40."


><![CDATA[<p>The CCM references and maps its controls to internationally accepted industry standards, regulations, and control frameworks, such as ISO 27001/2/17/18, PCI: DSS v3, and AICPA 2014 Trust Service Principles and Criteria, Germany’s BIS, Canada’s PIPEDA, ISACA’s COBIT, the US FedRAMP, HIPAA, Jericho Forum, NIST and the NZISM.</p>]]></paragraph>
</block>
<block title="Cloud Security Alliance’s Consensus Assessments Initiative Questionnaire (CAIQ)"><paragraph
    title="5.8.41."


><![CDATA[<p>The CAIQ is an extension to the CCM that provides exemplar control assertion questions that can be asked of service providers in the context of each CCM control, and can be tailored to suit each unique cloud customer’s evidentiary requirements. The Government Chief Digital Officer (GCDO) maintain a mapping of the CAIQ questions to the <em>GCIO Cloud Security and Privacy Considerations</em> question set to further aid agencies in use of the CAIQ as an alternative to equivalent GCDO questions.</p>]]></paragraph>
</block>
<block title="ISACA IT Audit and Assurance Program for Cloud Computing "><paragraph
    title="5.8.42."


><![CDATA[<p>Based on ISACA’s IT Assurance Framework (ITAF), the Cloud Computing Assurance Program was developed as a comprehensive and good-practice model, aligned with the ISACA COBIT 5 framework. Building on the generic assurance program, the cloud computing guidance identifies a number of cloud specific risk areas encompassing:</p><ul>
<li>Greater dependency on third parties;</li>
<li>Increased complexity of compliance with national and international laws and regulations;</li>
<li>Reliance on the Internet as the primary conduit to the enterprise’s data; and</li>
<li>Risk due to the dynamic nature of cloud computing.</li>
</ul>]]></paragraph>
<paragraph
    title="5.8.43."


><![CDATA[<p>The ITAF assurance focus is on:</p><ul>
<li>The governance affecting cloud computing;</li>
<li>The contractual compliance between the service provider and customer;</li>
<li>Privacy and regulation issues concerning cloud computing; and</li>
<li>Cloud computing specific attention points.</li>
</ul>]]></paragraph>
<paragraph
    title="5.8.44."


><![CDATA[<p>It is important to note that this cloud computing assurance review is not designed to provide assurance on the design and operational effectiveness of the cloud computing service provider’s internal controls, as this assurance is often provided through ISAE 3604 or similar reviews.</p>]]></paragraph>
<paragraph
    title="5.8.45."


><![CDATA[<p>The cloud computing assurance review focusses on the agency’s or organisation’s systems design and operational effectiveness in relation to cloud services. It is also important to note that this is dependent on the effectiveness of the underlying system design and controls and how well these are implemented and managed.</p>]]></paragraph>
</block>
<block title="ASD Certified Cloud Services"><paragraph
    title="5.8.46."


><![CDATA[<p>The Australian Signals Directorate (ASD) conducts certification of cloud services based in Australia for Australian government use. ASD Certifications are based on the Australian Government Information Security Manual (ISM). It is important to note that there are detail differences between the Australian ISM and the NZISM and these documents have a different legislative and regulatory basis.</p>]]></paragraph>
<paragraph
    title="5.8.47."


><![CDATA[<p>The ASD Cloud Computing Security documents describe security risk mitigations associated with cloud computing. Australian Government agencies are also required to perform due diligence reviews of the legal, financial and privacy risks associated with procuring cloud services, aspects which are not covered by the ASD certification.</p>]]></paragraph>
</block>
<block title="NIST 800-53"><paragraph
    title="5.8.48."


><![CDATA[<p>The NIST Special Publication 800-53 Revision 4 - Security and Privacy Controls for Federal Information Systems and Organizations is the US unified information security framework for US federal government agencies. The New Zealand equivalent is the NZISM.</p>]]></paragraph>
<paragraph
    title="5.8.49."


><![CDATA[<p>The underlying mandates are in FIPS Publication 200, Minimum Security Requirements for Federal Information and Information Systems and FIPS Publication 199, Standards for Security Categorization of Federal Information and Information Systems. US federal government agencies are required to categorise and analyse their system in terms of FIPS 199 and 200 then apply appropriate controls from NIST 800-53.</p>]]></paragraph>
</block>
<block title="FedRAMP"><paragraph
    title="5.8.50."


><![CDATA[<p>The US Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program intended to provide a standardised approach to security assessment, authorisation, and continuous monitoring for cloud products and services. This approach is designed to provide reusable cloud security assessments in order to reduce cost, resource and time. In addition it was intended to minimise cybersecurity risk for Federal Agencies as they move operations to the cloud, provide consistent baseline security policies and streamline the procurement process.</p>]]></paragraph>
<paragraph
    title="5.8.51."


><![CDATA[<p>FedRAMP is a collaboration of cybersecurity and cloud experts from the General Services Administration (GSA), National Institute of Standards and Technology (NIST), Department of Homeland Security (DHS), Department of Defense (DOD), National Security Agency (NSA), Office of Management and Budget (OMB), the Federal Chief Information Officer (CIO) Council and its working groups, as well as private industry.</p><p>The FedRAMP programme is run by the FedRAMP Program Management Office as part of the GSA.</p>]]></paragraph>
<paragraph
    title="5.8.52."


><![CDATA[<p>FedRAMP is mandatory for Federal Agency cloud deployments at all risk impact levels.  Private cloud deployments from single agencies and fully implemented within federal facilities are an exception to this mandate.  Quarterly reporting by each agency on their cloud portfolio is required.</p>]]></paragraph>
<paragraph
    title="5.8.53."


><![CDATA[<p>FedRAMP authorises cloud systems in a three step process:</p><ol>
<li><strong>Security Assessment:</strong> The security assessment process uses a standardised set of requirements in accordance with FISMA using a baseline set of NIST 800-53 controls with additional controls specific to cloud deployments, in order to grant security authorisations. Cryptographic elements are governed by the FIPS 140-2 standards.<br><br></li>
<li><strong>Leveraging and Authorisation:</strong> Federal agencies view security authorisation packages in the FedRAMP repository and leverage the security authorisation packages to grant a security authorisation at their own agency.<br><br></li>
<li><strong>Ongoing Assessment &amp; Authorisation:</strong> Once an authorisation is granted, ongoing assessment and authorisation activities are required to maintain the security authorisation.</li>
</ol>]]></paragraph>
<paragraph
    title="5.8.54."


><![CDATA[<p>Again it is important to note that the FedRAMP assessments are conducted on a different legislative and regulatory basis to assessments conducted in New Zealand. A variety of guidance, controls, templates and other documentation is available online from the GSA (see References - Assurance Guidance )</p>]]></paragraph>
</block>
<block title="PCI DSS"><paragraph
    title="5.8.55."


><![CDATA[<p>The Payment Card Industry Security Standards Council was formed by major credit card organisations and is a global open body formed to develop and promote understanding of essential security standards for payment account security. It develops, maintains and promotes the Payment Card Industry Data Security Standards (PCI DSS). It also provides tools to assist the implementation of the standards such as assessment and scanning qualifications, self-assessment questionnaires, training and education, and product certification programs.</p>]]></paragraph>
<paragraph
    title="5.8.56."


><![CDATA[<p>This standard is designed to protect cardholder data (credit and debit cards) held by merchants, banks and other financial organisations. It applies to all organisations that accept, store, process and transmit credit cardholder data.</p>]]></paragraph>
<paragraph
    title="5.8.57."


><![CDATA[<p>This standard is narrowly focussed and has specific applicability to New Zealand Government agencies that operate financial transaction services (e.g. AoG Banking services and citizen fee-paying services; such as vehicle registration, passport renewal, etc.). The PCI has published an information supplement on Third-Party Security Assurance (updated March 2016).</p>]]></paragraph>
</block>
<block title="COSO"><paragraph
    title="5.8.58."


><![CDATA[<p>The Committee of Sponsoring Organizations of the Treadway Commission (COSO) initially developed the COSO Internal Control-Integrated Framework in 1992. A revised framework was published in 2013 which included guidance on “outsourced service providers” and how they impact risk assessment, controls, monitoring, information flows and assurance. The 2013 Framework incorporates how organisations should manage IT innovation in light of globalisation, complex business processes, regulatory demands and security risk assessments. It is frequently used as the basis for SSAE16 assignments and the production of SOC reports.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References – Assurance Standards"><paragraph
    title="5.8.59."


><![CDATA[<p class="NormS5C8">Further information on Assurance Standards can be found in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;<strong>SSAE No. 16</strong></td>
<td>
<p><strong><span>Statement on Standards for Attestation Engagements -&nbsp;</span>Reporting on Controls at a Service Organization</strong></p>
</td>
<td style="text-align: center;">AICPA</td>
<td><a title="SSAE No.16" rel="noopener noreferrer" href="https://competency.aicpa.org/media_resources/208710-statement-on-standards-for-attestation-engagements" target="_blank">https://competency.aicpa.org/media_resources/208710-statement-on-standards-for-attestation-engagements</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Service Organization Controls (SOC) Reports for Service Organizations&nbsp;</strong></p>
</td>
<td style="text-align: center;">AICPA</td>
<td><a title="SOC - Reports for Service Organizations" rel="noopener noreferrer" href="http://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/pages/serviceorganization&#039;smanagement.aspx" target="_blank"></a><a href="https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/serviceorganization-smanagement">SOC for Service Organizations: Information for Service Organizations (aicpa.org)</a><a title="SOC - Reports for Service Organizations" rel="noopener noreferrer" href="http://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/pages/serviceorganization&#039;smanagement.aspx" target="_blank"></a></td>
</tr>
<tr>
<td>&nbsp;<strong>AT Section 101&nbsp;</strong></td>
<td>
<p><strong>Attest Engagements</strong></p>
</td>
<td style="text-align: center;">AICPA</td>
<td>
<p><a title="AT Section 101 - Attest Engagements" rel="noopener noreferrer" href="http://www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-00101.pdf" target="_blank">https://aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-00101.pdf</a><a title="AT Section 101 - Attest Engagements" rel="noopener noreferrer" href="http://www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-00101.pdf" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>&nbsp;<strong>AT Section 801</strong></td>
<td>
<p><strong>Reporting on Controls at a Service Organization</strong></p>
</td>
<td style="text-align: center;">AICPA</td>
<td>
<p><a title="AT Section 801 - Reporting on Controls at a Service Organization" rel="noopener noreferrer" href="http://www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-00801.pdf" target="_blank"></a><a href="https://us.aicpa.org/content/dam/aicpa/research/standards/auditattest/downloadabledocuments/at-00801.pdf"></a><a title="AT Section 801 - Reporting on controls at Service Organisation" rel="noopener noreferrer" href="http://www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-00801.pdf" target="_blank">https://aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-at-00801.pdf</a><a title="AT Section 801 - Reporting on Controls at a Service Organization" rel="noopener noreferrer" href="http://www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-00801.pdf" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>COBIT 5 Framework</strong></p>
</td>
<td style="text-align: center;">ISACA</td>
<td><a rel="noopener noreferrer" href="https://www.isaca.org/resources/cobit/cobit-5" target="_blank">https://www.isaca.org/resources/cobit/cobit-5</a></td>
</tr>
<tr>
<td>
<p><strong>ISAE (NZ) 3000 (Revised)</strong></p>
</td>
<td>
<p><strong><strong>International Standard on Assurance Engagements&nbsp; -&nbsp;</strong>Assurance Engagements Other than Audits or Reviews of Historical Financial Information&nbsp;</strong></p>
</td>
<td style="text-align: center;">XRB</td>
<td><a rel="noopener noreferrer" href="https://xrb.govt.nz/standards/assurance-standards/other-assurance-engagement-standards/" target="_blank">https://xrb.govt.nz/standards/assurance-standards/other-assurance-engagement-standards/</a></td>
</tr>
<tr>
<td>
<p><strong>ISAE (NZ) 3402</strong></p>
</td>
<td>
<p><strong><strong>International Standard on Assurance Engagements&nbsp; -&nbsp;</strong>Assurance Reports on Controls at a Service Organisation</strong></p>
</td>
<td style="text-align: center;">XRB</td>
<td><a rel="noopener noreferrer" href="https://xrb.govt.nz/standards/assurance-standards/other-assurance-engagement-standards/" target="_blank">https://xrb.govt.nz/standards/assurance-standards/other-assurance-engagement-standards/</a><a title="ISAE (NZ) 3402" rel="noopener noreferrer" href="https://xrb.govt.nz/Site/Auditing_Assurance_Standards/Current_Standards/Other_Assurance_Engagements_Standards.aspx" target="_blank"></a></td>
</tr>
<tr>
<td>
<p><strong>SAE 3150</strong></p>
</td>
<td>
<p><strong>Standard on Assurance Engagements - Assurance Engagement on Controls</strong></p>
</td>
<td style="text-align: center;">XRB</td>
<td><a rel="noopener noreferrer" href="https://xrb.govt.nz/standards/assurance-standards/other-assurance-engagement-standards/" target="_blank">https://xrb.govt.nz/standards/assurance-standards/other-assurance-engagement-standards/</a></td>
</tr>
<tr>
<td>
<p><strong>NIST Special Publication 800-53 Revision 4&nbsp;</strong></p>
</td>
<td>
<p><strong>Security and Privacy Controls for Federal Information Systems and Organizations</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td><a title="NIST SP 800-53" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf [PDF, 5.05 MB]</a></td>
</tr>
<tr>
<td>
<p><strong>NIST Special Publication&nbsp;500-291, Revision 2, July 2013</strong></p>
</td>
<td>
<p><strong>NIST Cloud Computing Standards Roadmap</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td><a title="NIST SP 500-291" rel="noopener noreferrer" href="https://www.nist.gov/system/files/documents/itl/cloud/NIST_SP-500-291_Version-2_2013_June18_FINAL.pdf" target="_blank">https://www.nist.gov/system/files/documents/itl/cloud/NIST_SP-500-291_Version-2_2013_June18_FINAL.pdf [PDF, 2.2 MB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong><strong>PCI DSS&nbsp;</strong>Information Supplement: Third-Party Security Assurance</strong></p>
</td>
<td style="text-align: center;">
<p>PCI Security Standards Council</p>
</td>
<td><a title="Information Supplement: Third-Party Security Assurance" rel="noopener noreferrer" href="https://www.pcisecuritystandards.org/documents/ThirdPartySecurityAssurance_March2016_FINAL.pdf" target="_blank">https://www.pcisecuritystandards.org/documents/ThirdPartySecurityAssurance_March2016_FINAL.pdf [PDF, 1.16 MB]</a></td>
</tr>
<tr>
<td>
<p><strong>ISO 19011:2018</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Guidelines for auditing management systems</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a href="https://www.iso.org/standard/70017.html">ISO - ISO 19011:2018 - Guidelines for auditing management systems</a> <a rel="noopener noreferrer" href="http://www.iso.org/" target="_blank"></a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27000:2018</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Information security management systems — Overview and vocabulary</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27000:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/73906.html" target="_blank">https://www.iso.org/standard/73906.html</a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27001:2013</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Information security management systems — Requirements</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27001:2013" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27006:2015</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27006:2015" rel="noopener noreferrer" href="https://www.iso.org/standard/62313.html" target="_blank">https://www.iso.org/standard/62313.html</a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27007:2020</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27007:2020" rel="noopener noreferrer" href="https://www.iso.org/standard/77802.html" target="_blank">https://www.iso.org/standard/77802.html</a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC TS 27008:2019</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Guidelines for the assessment of information security controls</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC TS 27008:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/67397.html" target="_blank">https://www.iso.org/standard/67397.html</a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27014:2020</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information security, cybersecurity and privacy protection — Governance of information security</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27014:2020" rel="noopener noreferrer" href="https://www.iso.org/standard/74046.html" target="_blank">https://www.iso.org/standard/74046.html</a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27017:2015</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27017:2015" rel="noopener noreferrer" href="https://www.iso.org/standard/43757.html" target="_blank">https://www.iso.org/standard/43757.html</a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27018:2019&nbsp;</strong></p>
</td>
<td>
<p><strong>Information technology -- Security techniques -- Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27018:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/76559.html" target="_blank">https://www.iso.org/standard/76559.html</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="References – Assurance Guidance"><paragraph
    title="5.8.60."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td style="width: 20%;"><strong>Reference</strong></td>
<td style="width: 20%;"><strong>Title</strong></td>
<td style="width: 15%; text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;"><strong>All-Of-Government Portfolio, Programme and Project Assurance Framework</strong></td>
<td style="width: 15%; text-align: center;">DIA</td>
<td><a title="AoG Portfolio, Programme and Project Assurance Framework" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/governance/system-assurance/all-of-government-portfolio-programme-and-project-assurance-framework/" target="_blank">https://digital.govt.nz/standards-and-guidance/governance/system-assurance/all-of-government-portfolio-programme-and-project-assurance-framework/</a>&nbsp;</td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;"><strong>All-Of-Government ICT Operations Assurance Framework</strong></td>
<td style="width: 15%; text-align: center;">DIA</td>
<td><a title="AoG ICT Operations Assurance Framework" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/governance/system-assurance/all-of-government-ict-operations-assurance-framework/" target="_blank">https://digital.govt.nz/standards-and-guidance/governance/system-assurance/all-of-government-ict-operations-assurance-framework/</a></td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;">
<p><strong>All-Of-Government Enterprise Risk Maturity Assessment Framework (gERMAF)</strong></p>
</td>
<td style="width: 15%; text-align: center;">DIA</td>
<td><a title="AoG Risk Maturity Assessment Framework" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/governance/system-assurance/enterprise-risk-maturity/" target="_blank">https://digital.govt.nz/standards-and-guidance/governance/system-assurance/enterprise-risk-maturity/</a><a rel="noopener noreferrer" href="http://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/faqs_service_orgs.pdf" target="_blank"></a></td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;">
<p><strong>FAQs — New Service Organization Standards and Implementation Guidance</strong></p>
</td>
<td style="width: 15%; text-align: center;">American Institute of Certified Public Accountants (AICPA)</td>
<td><a title="FAQs - New Service Organization Standards and Implementation Guidance" rel="noopener noreferrer" href="https://docplayer.net/13378742-Faqs-new-service-organization-standards-and-implementation-guidance.html" target="_blank">https://docplayer.net/13378742-Faqs-new-service-organization-standards-and-implementation-guidance.html</a></td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;">
<p><strong>The Federal Risk and Authorization Management Program (FedRAMP)</strong></p>
</td>
<td style="width: 15%; text-align: center;">General Services Administration, US Federal Government</td>
<td><a title="FedRAMP" rel="noopener noreferrer" href="https://www.fedramp.gov/" target="_blank">https://www.fedramp.gov/</a></td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;">
<p><strong>FedRAMP Documents &amp; Templates</strong></p>
</td>
<td style="width: 15%; text-align: center;">General Services Administration, US Federal Government</td>
<td><a title="FedRAMP Documents and Templates" rel="noopener noreferrer" href="https://www.fedramp.gov/documents-templates/" target="_blank">https://www.fedramp.gov/documents-templates/</a></td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;">
<p><strong>Controls and Assurance in the Cloud Using COBIT 5</strong></p>
</td>
<td style="width: 15%; text-align: center;">ISACA</td>
<td><a href="https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004Ko9UEAS">Store - Controls &amp; Assurance in the Cloud: Using COBIT 5 | Digital | English - ISACA Portal</a></td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;">
<p><strong>IIA Position Paper:<br>THE THREE LINES OF DEFENSE <br>IN EFFECTIVE RISK MANAGEMENT <br>AND CONTROL<br>JANUARY 2013<br></strong></p>
</td>
<td style="width: 15%; text-align: center;">IIA</td>
<td><a href="https://theiia.fi/wp-content/uploads/2017/01/pp-the-three-lines-of-defense-in-effective-risk-management-and-control.pdf">121691 PROF-Position Paper 3 Lines of Defense_Digital Version_CX.indd (theiia.fi)</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Risk Assessment "><paragraph
    title="5.8.61.R.01."

    tags="Governance,Information Security Documentation,Risk Assessment,Assurance"


><![CDATA[<p>The Security Risk Management Plan (<a title="SRMP" href="http://nzism.gcsb.govt.nz/ism-document#Section-12761">SRMP – Section 5.3</a>) encompasses all risks associated with the security of agency systems. The growth in outsourced services, particularly cloud services, has created situations where risk, controls and assurance cannot be directly examined and assessed. In such cases independent assurance reports are an effective means, possibly the only means, of obtaining some assurance on the service provider’s operations.</p>]]></paragraph>
<paragraph
    title="5.8.61.R.02."

    tags="Governance,Information Security Documentation,Risk Assessment,Assurance"


><![CDATA[<p>No single independent assurance scheme/standard covers the full range of considerations and control requirements of the NZISM. Agencies may find duplication of aspects analysed if multiple schemes are applied. It is also important to note that none of the common mature assurance schemes cover specific government requirements and handling of Official Information; such as the personnel aspects (PERSEC) of user and administration vetting and security clearances, or sovereignty aspects of the information/data. Careful selection and consideration is required when placing reliance on reports available for a particular outsourced or cloud service.</p>]]></paragraph>
<paragraph
    title="5.8.61.R.03."

    tags="Governance,Information Security Documentation,Risk Assessment,Assurance"


><![CDATA[<p>Reports from different assurance scheme have varying levels of detail as well as risk area coverage. Selection and usage of reports should be considered in the context of the intended service/system business and information value.</p><p>Understanding the business and technical risk context will drive the size and depth of a risk assessment, and the associated assurance process. Though even a lighter-weight risk assurance process will follow the C&amp;A process model, such that the CE or authorised delegate is still formally accountable and responsible.</p><p>Re-use of assessments completed by other agencies is encouraged, noting the business or information value context may differ. To assist agencies and promote efficiency, the Government Chief Digital Officer (GCDO) facilitates the sharing and re-use of existing cloud assessment materials among agencies.</p>]]></paragraph>
<paragraph
    title="5.8.61.C.01."

    tags="Governance,Information Security Documentation,Risk Assessment,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="1019"
><![CDATA[<p>Agencies MUST conduct a risk assessment in order to determine the type and level of independent assurance required to satisfy certification and accreditation requirements.</p>]]></paragraph>
<paragraph
    title="5.8.61.C.02."

    tags="Governance,Information Security Documentation,Risk Assessment,Assurance"


    classification="All Classifications"
    compliance="Should"
    cid="1020"
><![CDATA[<p>In all cases where assurance on service provider operations cannot be obtained directly, agencies SHOULD obtain independent assurance reports.</p>]]></paragraph>
<paragraph
    title="5.8.61.C.03."

    tags="Governance,Information Security Documentation,Risk Assessment,Assurance"


    classification="All Classifications"
    compliance="Should"
    cid="1021"
><![CDATA[<p>In order to address identified risk areas, agencies SHOULD obtain relevant assurance reports and service provider certifications to inform a risk assessment and Certification activities as well as other aspects of the certification processes such as evidence of controls effectiveness and remediation plans.</p>]]></paragraph>
</block>
<block title="Independent Assurance"><paragraph
    title="5.8.62.R.01."

    tags="Governance,Information Security Documentation,Assurance"


><![CDATA[<p>Independent assurance can be obtained directly from the service provider through Service Organisation Control (SOC) reports, as well as other internationally recognised assurance frameworks. It will be important to corroborate individual reports by comparison with other reporting mechanisms and independent certifications.</p>]]></paragraph>
<paragraph
    title="5.8.62.C.01."

    tags="Governance,Information Security Documentation,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="1024"
><![CDATA[<p>Agencies MUST incorporate the results of any independent assurance reports into the agency Certification process, to understand the residual risk position and controls required to manage risk appropriately.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="5.9. Vulnerability Disclosure Policy (VDP)"><subsection title="Objective"><paragraph
    title="5.9.1."


><![CDATA[<p class="NormS5C9">Agencies implement a Vulnerability Disclosure Policy (VDP) to enable members of the public to report vulnerabilities in the agency’s public-facing systems and applications and receive feedback on such reports.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="5.9.2."


><![CDATA[<p class="NormS5C9">This section provides information on vulnerability disclosure for all externally-facing agency systems, including public-facing systems.&nbsp; Vulnerability disclosure relating to internal systems is covered in <a title="Product security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>.&nbsp;</p>]]></paragraph>
<paragraph
    title="5.9.3."


><![CDATA[<p class="NormS5C9">When selecting which systems, applications and data are within scope of a VDP, agencies may consider:</p>
<ol style="list-style-type: lower-alpha;">
<li>The sensitivity of information on the agency’s systems, including financial data, medical information, proprietary information, customer data or other personal information.</li>
<li>Security safeguards that are already in place on the system, such as encryption of data at rest.</li>
<li>The agency’s ability to segment its network or otherwise segregate sensitive information stored on its systems.</li>
<li>Regulatory, contractual, privacy or other restrictions placed on disclosure of protected classes of information (such as within the New Zealand Classification System).</li>
</ol>]]></paragraph>
<paragraph
    title="5.9.4."


><![CDATA[<p class="NormS5C9">Reference to other chapters and sections in this document is essential.&nbsp; In particular:</p><ul>
<li><a title="System certification and accreditation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 - System Certification and Accreditation</a>;</li>
<li><a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a>;</li>
<li><a title="Vulnerability analysis" href="http://nzism.gcsb.govt.nz/ism-document#Section-13027">Section 6.2 - Vulnerability Analysis</a>;</li>
<li><a title="Change management" href="http://nzism.gcsb.govt.nz/ism-document#Section-13048">Section 6.3 - Change Management;</a></li>
<li><a title="Information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information Security Incidents;</a></li>
<li><a title="Product patching and updating" href="http://nzism.gcsb.govt.nz/ism-document#Section-14530">Section 12.4 – Product Patching and Updating</a>;</li>
<li><a title="Software security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15005">Chapter 14 - Software Security</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Agencies must expect vulnerabilities"><paragraph
    title="5.9.5."


><![CDATA[<p class="NormS5C9">Invariably all software, operating systems and applications have the potential to house exploitable vulnerabilities.  Many vulnerabilities are identified by users and other third parties. Some vulnerabilities may be undiscovered or inherent in the application or software.  Others may be introduced during upgrades, patches, configuration or other changes. </p>]]></paragraph>
<paragraph
    title="5.9.6."


><![CDATA[<p class="NormS5C9">It is essential that agencies establish a policy and processes to identify and remediate such vulnerabilities.</p>]]></paragraph>
</block>
<block title="Agencies must establish a vulnerability reporting mechanism"><paragraph
    title="5.9.7."


><![CDATA[<p class="NormS5C9">Published VDPs demonstrate that an agency has a mature and constructive approach when they receive a vulnerability report and also demonstrates openness and transparency in the management of agency systems.</p>]]></paragraph>
<paragraph
    title="5.9.8."


><![CDATA[<p class="NormS5C9">Agencies should establish a process to allow any user (whether a member of the public, business partners, other agencies or agency staff), to report potential vulnerabilities.&nbsp; Any such reporting is on a “no blame” basis, without fear of repercussion or penalty, provided the agency’s disclosure policy is followed and no illegal activity is undertaken.</p>]]></paragraph>
<paragraph
    title="5.9.9."


><![CDATA[<p class="NormS5C9">The VDP must clearly state the conditions under which reports are received.  In general terms this also includes a “no bug bounty” clause as well as limits on web site, system or application probing.</p>]]></paragraph>
<paragraph
    title="5.9.10."


><![CDATA[<p class="NormS5C9">An agency’s VDP will necessarily reflect that they may not control or own all of the software they use or the maintenance and development of underlying software (such as compilers, programming or scripting languages and so on).  The VDP should clearly state that while the agency can receive reports about software, systems or services run on their behalf by third parties, providers or vendors, they may have to work with the reporting party to report the vulnerability to the relevant vendor.</p>]]></paragraph>
<paragraph
    title="5.9.11."


><![CDATA[<p class="NormS5C9">Where specific legislation applies, for example a reported vulnerability may breach the Privacy Act, agencies must adhere to the legislation.  This may change how reports are managed and action communicated to the finder or reporter.  This does not change the requirement to maintain communication with the reporter/finder.</p>]]></paragraph>
</block>
<block title="Agencies are expected to find and remediate vulnerabilities"><paragraph
    title="5.9.12."


><![CDATA[<p class="NormS5C9">The Protective Security Requirements places clear expectations on agencies to maintain awareness of vulnerabilities (see <a title="PSR Mandatory requirements" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security#infosec4" target="_blank">mandatory requirement INFOSEC4</a>).</p>]]></paragraph>
<paragraph
    title="5.9.13."


><![CDATA[<p>The NZISM <a title="Product patching and updating" rel="noopener noreferrer" href="http://nzism.gcsb.govt.nz/ism-document#Section-14530" target="_blank">section 12.4 - Patching &amp; updating</a>&nbsp;sets out expectations and controls to ensure security patches are applied in a timely manner.</p>]]></paragraph>
<paragraph
    title="5.9.14."


><![CDATA[<p class="NormS5C9">The disclosure period commonly used by many vendors, manufacturers and government agencies is 90 days.  Vulnerabilities will be either patched, mitigated or managed within this period.  In some cases earlier notification is provided to allow users to take mitigating actions until a patch or other solution is available.</p>]]></paragraph>
<paragraph
    title="5.9.15."


><![CDATA[<p>VDPs are expected to include a timeframe within which patches will be applied or remedial action taken when a vulnerability is reported to the agency.</p>]]></paragraph>
</block>
<block title="Agencies to create a vulnerability reporting point"><paragraph
    title="5.9.16."


><![CDATA[<p class="NormS5C9">When security risks in agency services are discovered and reported to the agency, it is vital that a robust communication channel is available to receive the report.</p>]]></paragraph>
<paragraph
    title="5.9.17."


><![CDATA[<p>This is commonly described as a “security.txt”.  A draft standard has been published (see References below) to help agencies (and other organisations) outline a process for security researchers to securely report security vulnerabilities.</p>]]></paragraph>
</block>
<block title="Vulnerability disclosure policies are a normal part of learning about and patching vulnerabilities"><paragraph
    title="5.9.18."


><![CDATA[<p class="NormS5C9">Vulnerability disclosure (sometimes also referred to as responsible disclosure or coordinated vulnerability disclosure) is now an internationally accepted practice for technology organisations.  The practice of vulnerability disclosure in modern computing dates to the late 1980s.  There are related examples (non-computing) which appeared in the mid-1800s when locksmiths exchanged vulnerability information.</p>]]></paragraph>
</block>
<block title="Bug Bounties"><paragraph
    title="5.9.19."


><![CDATA[<p class="NormS5C9">“Bug bounties” are a monetary reward to security researchers for the discovery and reporting of software and other information system vulnerabilities to the agency.  Bug Bounties are separate to VDPs and should only be covered if the agency has a bug bounty programme in place.</p>]]></paragraph>
</block>
<block title="Vulnerability disclosure policy (VDP) Content"><paragraph
    title="5.9.20."


><![CDATA[<p class="NormS5C9">A VDP will typically include:</p><ul>
<li>A scoping statement setting out which systems the policy applies to (e.g. the agency’s website and other public-facing systems);</li>
<li>Details of how finders can contact the agency’s security team (including any public keys for encrypting reports);</li>
<li>Permitted activities;</li>
<li>Acknowledgement of reports and a response time (typically 60 or 90 days) for corrections, adjustments, or other “fixes”;</li>
<li>Reporters/finders agreeing to not share information about the vulnerability until the end of the disclosure period, to let the organisation fix the issues before it becomes public;</li>
<li>Illegal activities are not permitted (specifying any relevant legislation, such as the Crimes Act, the Privacy Act etc.); and</li>
<li>Either a statement that bug bounties will not be paid for any discoveries, or information about the agency’s bug bounty programme.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="5.9.21."


><![CDATA[<p class="NormS5C9">Additional information relating to system auditing is contained in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>&nbsp;ISO 29147</strong></td>
<td>Information technology — Security techniques — Vulnerability disclosure</td>
<td style="text-align: center;">ISO</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/standard/72311.html" target="_blank">https://www.iso.org/standard/72311.html</a></td>
</tr>
<tr>
<td><strong>ISO 30111</strong></td>
<td>Information technology — Security techniques — Vulnerability handling processes</td>
<td style="text-align: center;">ISO</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/standard/69725.html" target="_blank">https://www.iso.org/standard/69725.html</a></td>
</tr>
<tr>
<td><strong>IEFT draft protocol for Security.txt</strong></td>
<td>A File Format to Aid in Security Vulnerability Disclosure</td>
<td style="text-align: center;">ITEF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/draft-foudil-securitytxt" target="_blank">https://datatracker.ietf.org/doc/draft-foudil-securitytxt</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>A proposed standard which allows websites to define security policies</td>
<td>
<p align="center">security.txt</p>
</td>
<td><a rel="noopener noreferrer" href="https://securitytxt.org/" target="_blank">https://securitytxt.org/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>CERT NZ coordinated vulnerability disclosure policy</td>
<td style="text-align: center;">CERT NZ</td>
<td><a rel="noopener noreferrer" href="https://www.cert.govt.nz/it-specialists/guides/reporting-a-vulnerability/cert-nz-coordinated-vulnerability-disclosure-policy/" target="_blank">https://www.cert.govt.nz/it-specialists/guides/reporting-a-vulnerability/cert-nz-coordinated-vulnerability-disclosure-policy/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>NZITF Coordinated Disclosure guidelines</td>
<td style="text-align: center;">NZITF</td>
<td><a rel="noopener noreferrer" href="https://nzitf.org.nz/coordinated-disclosure" target="_blank">https://nzitf.org.nz/coordinated-disclosure</a></td>
</tr>
<tr>
<td>&nbsp;<strong>BOD 20-01</strong></td>
<td>Binding Operational Directive 20-01: Develop and Publish a Vulnerability Disclosure Policy</td>
<td style="text-align: center;">US Department of Homeland Security</td>
<td><a rel="noopener noreferrer" href="https://cyber.dhs.gov/bod/20-01/" target="_blank">https://cyber.dhs.gov/bod/20-01/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span>Vulnerability Disclosure Policy Template</span></td>
<td style="text-align: center;"><span>US Department of Homeland Security</span></td>
<td><a rel="noopener noreferrer" href="https://cyber.dhs.gov/bod/20-01/vdp-template/" target="_blank">https://cyber.dhs.gov/bod/20-01/vdp-template/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>CISA announces new vulnerability disclosure policy (VDP) platform, July 2021</td>
<td style="text-align: center;">US Cybersecurity &amp; Infrastructure Security Agency</td>
<td><a rel="noopener noreferrer" href="https://www.cisa.gov/blog/2021/07/29/cisa-announces-new-vulnerability-disclosure-policy-vdp-platform" target="_blank">https://www.cisa.gov/blog/2021/07/29/cisa-announces-new-vulnerability-disclosure-policy-vdp-platform</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>CISA Coordinated Vulnerability Disclosure (CVD) Process</td>
<td style="text-align: center;">US Cybersecurity &amp; Infrastructure Security Agency</td>
<td><a rel="noopener noreferrer" href="https://www.cisa.gov/coordinated-vulnerability-disclosure-process" target="_blank">https://www.cisa.gov/coordinated-vulnerability-disclosure-process</a></td>
</tr>
<tr>
<td><strong>List of US Federal agencies VDPs</strong></td>
<td>VDPs in the US Government's executive branch</td>
<td style="text-align: center;">CISA</td>
<td><a rel="noopener noreferrer" href="https://github.com/cisagov/vdp-in-fceb" target="_blank">https://github.com/cisagov/vdp-in-fceb</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>A Framework for a Vulnerability Disclosure Program for Online Systems1 Version 1.0 (July 2017)</td>
<td style="text-align: center;">Cybersecurity Unit Computer Crime &amp; Intellectual Property Section Criminal Division U.S. Department of Justice</td>
<td><a rel="noopener noreferrer" href="https://www.justice.gov/criminal-ccips/page/file/983996/download" target="_blank">https://www.justice.gov/criminal-ccips/page/file/983996/download</a><a href="https://github.com/cisagov/vdp-in-fceb"></a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Vulnerability Disclosure Toolkit</td>
<td style="text-align: center;">&nbsp;NCSC UK</td>
<td><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/information/vulnerability-disclosure-toolkit" target="_blank">https://www.ncsc.gov.uk/information/vulnerability-disclosure-toolkit</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>See Something, Say Something - Coordinating the Disclosure of Security Vulnerabilities in Canada</td>
<td style="text-align: center;">Canada – Cybersecure policy exchange</td>
<td><a rel="noopener noreferrer" href="https://www.cybersecurepolicy.ca/vulnerability-disclosure" target="_blank">https://www.cybersecurepolicy.ca/vulnerability-disclosure</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Vulnerability Disclosure Cheat Sheet</td>
<td style="text-align: center;">&nbsp;OWASP</td>
<td><a rel="noopener noreferrer" href="https://cheatsheetseries.owasp.org/cheatsheets/Vulnerability_Disclosure_Cheat_Sheet.html" target="_blank">https://cheatsheetseries.owasp.org/cheatsheets/Vulnerability_Disclosure_Cheat_Sheet.html</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Responsible Disclosure Policy Example</td>
<td style="text-align: center;">Dutch National Cyber Security Centre (NCSC)</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://responsibledisclosure.nl/en/" target="_blank">https://responsibledisclosure.nl/en/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Vulnerability disclosure policy&nbsp;</td>
<td style="text-align: center;">Incibe Cert (Spain)</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://www.incibe-cert.es/en/what-is-incibe-cert/vulnerability-disclosure-policy" target="_blank">https://www.incibe-cert.es/en/what-is-incibe-cert/vulnerability-disclosure-policy</a> &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Vulnerability disclosure policy</td>
<td style="text-align: center;">Office of the Privacy Commissioner New Zealand</td>
<td>https://www.privacy.org.nz/assets/New-order/About-us/Transparency-and-accountability-/Vulnerability-Disclosure-Policy-December-2015.pdf</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Responsible disclosure guidelines</td>
<td style="text-align: center;">NZ – The Ministry of Social Development</td>
<td><a rel="noopener noreferrer" href="https://www.msd.govt.nz/about-msd-and-our-work/tools/responsible-disclosure-guidelines.html" target="_blank">https://www.msd.govt.nz/about-msd-and-our-work/tools/responsible-disclosure-guidelines.html</a><a href="https://www.privacy.org.nz/assets/New-order/About-us/Transparency-and-accountability-/Vulnerability-Disclosure-Policy-December-2015.pdf"></a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Ministry of Health Responsible disclosure guidelines</td>
<td style="text-align: center;">NZ – Ministry of Health</td>
<td><a rel="noopener noreferrer" href="https://www.health.govt.nz/our-work/digital-health/digital-health-sector-architecture-standards-and-governance/responsible-disclosure-guidelines" target="_blank">https://www.health.govt.nz/our-work/digital-health/digital-health-sector-architecture-standards-and-governance/responsible-disclosure-guidelines</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Vulnerability disclosure policy</td>
<td style="text-align: center;">Bank of England</td>
<td><a rel="noopener noreferrer" href="https://www.bankofengland.co.uk/vulnerability-disclosure-policy&nbsp;&nbsp;" target="_blank">https://www.bankofengland.co.uk/vulnerability-disclosure-policy&nbsp;&nbsp;</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Vulnerability disclosure policy</td>
<td style="text-align: center;">Crown Commercial Service (UK)</td>
<td><a rel="noopener noreferrer" href="https://www.crowncommercial.gov.uk/about-ccs/vulnerability-disclosure-policy/" target="_blank">https://www.crowncommercial.gov.uk/about-ccs/vulnerability-disclosure-policy/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Vulnerability Disclosure Policy</td>
<td style="text-align: center;">Met Office (UK)</td>
<td><a rel="noopener noreferrer" href="https://www.metoffice.gov.uk/about-us/legal/vulnerability-disclosure-policy" target="_blank">https://www.metoffice.gov.uk/about-us/legal/vulnerability-disclosure-policy</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>History of Vulnerability Disclosure, 3 August 2015</td>
<td style="text-align: center;">Duo</td>
<td><a rel="noopener noreferrer" href="https://duo.com/labs/research/history-of-vulnerability-disclosure" target="_blank">https://duo.com/labs/research/history-of-vulnerability-disclosure</a></td>
</tr>
</tbody>
</table><p class="NormS5C9">&nbsp;</p><p class="NormS5C9">&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="PSR References"><paragraph
    title="5.9.22."


><![CDATA[<p class="NormS5C9">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR Mandatory Requirements</strong></td>
<td>GOV3, INFOSEC1, INFOSEC2, INFOSEC3 and INFOSEC4</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title=" Vulnerability disclosure policy (VDP) Risk Assessment"><paragraph
    title="5.9.23.R.01."

    tags="Governance,Information Security Documentation,Risk Assessment"


><![CDATA[<p class="NormS5C7b">Selection of public-facing systems and services included in any VDP will be based on a risk assessment undertaken by the agency. Considerations for such selection are discussed in the Context section above.</p>]]></paragraph>
<paragraph
    title="5.9.23.C.01."

    tags="Governance,Information Security Documentation,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="7130"
><![CDATA[<p class="Normal-nonumbering">An agency MUST undertake a risk assessment to determine which systems and services to include in the agency’s VDP.</p>]]></paragraph>
</block>
<block title=" Vulnerability disclosure policy (VDP) Essential Content"><paragraph
    title="5.9.24.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>In order to demonstrate a mature and constructive approach to vulnerability discovery, management and remediation, an agency requires a VDP to inform the public about:</p><ul>
<li>the scope of public-facing systems covered by its VDP; and</li>
<li>the nature of vulnerabilities which can be reported under its VDP.</li>
</ul>]]></paragraph>
<paragraph
    title="5.9.24.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>To aid consistency, it is important that government agencies have a core set of content in their VDP.</p>]]></paragraph>
<paragraph
    title="5.9.24.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="7133"
><![CDATA[<p class="Normal-nonumbering">An agency MUST develop and publish a VDP.</p>]]></paragraph>
<paragraph
    title="5.9.24.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="7134"
><![CDATA[<p>An agency’s VDP MUST contain at least the following core content:</p><ul>
<li>A scoping statement listing the systems the policy applies to;</li>
<li>Contact details;</li>
<li>Secure communication options (including any public keys);</li>
<li>Information the finder should include in the report;</li>
<li>Acknowledgement of reports and a response time;</li>
<li>Guidance on what forms of vulnerability testing are out of scope for reporters/finders (permitted activities);</li>
<li>Reporters/finders agreeing to not share information about the vulnerability until the end of the disclosure period, in order to allow the agency to address any issues before they become public;</li>
<li>Illegal activities are not permitted (specifying the relevant legislation, such as the Crimes Act); and</li>
<li>Either that “Bug bounties” will not be paid for any discoveries, or it should provide information about the agency’s bug bounty programme.</li>
</ul>]]></paragraph>
</block>
<block title=" Vulnerability disclosure policy (VDP) Additional Content"><paragraph
    title="5.9.25.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p class="NormS5C7b">As well as mandatory content listed above, additional information that agencies may consider providing includes guidance for reporters/finders to locate the agency’s policy and how to confidentially communicate technical details to the agency’s security experts.</p>]]></paragraph>
<paragraph
    title="5.9.25.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="7136"
><![CDATA[<p class="NormS5C9">An agency SHOULD publish a security.txt to permit secure communications and direct any reports to a specific agency resource, in accordance with the agency’s VDP.</p>]]></paragraph>
</block>
<block title=" Vulnerability disclosure policy (VDP) Setting Expectations"><paragraph
    title="5.9.26.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p class="NormS5C7b">Agencies must set clear expectations for reporters/finders on the timeframe within which agencies intend to address and remediate vulnerabilities that have been reported to them.  The industry standard for a vulnerability disclosure policy is 90 days.</p>]]></paragraph>
<paragraph
    title="5.9.26.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="7138"
><![CDATA[<p class="Normal-nonumbering">An agency MUST commit to addressing disclosed vulnerabilities within the timeframe it sets in its policy.</p>]]></paragraph>
<paragraph
    title="5.9.26.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="7139"
><![CDATA[<p class="Normal-nonumbering">An agency’s vulnerability disclosure timeframe SHOULD be set to no more than 90 days.</p>]]></paragraph>
</block>
<block title=" Vulnerability disclosure policy (VDP) Integration"><paragraph
    title="5.9.27.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p class="NormS5C7b">It is essential that a VDP is integrated and consistent with an agency’s information security documentation and its policies, processes and procedures for Incident Management, Product Security and Software Security (Chapters 5, 7, 12, 14).</p>]]></paragraph>
<paragraph
    title="5.9.27.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="7141"
><![CDATA[<p class="NormS5C9">Agencies MUST ensure they integrate their VDP with other elements of their information security policies.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="6. Information security monitoring"><section title="6.1. Information Security Reviews"><subsection title="Objective"><paragraph
    title="6.1.1."


><![CDATA[<p>Information security reviews maintain the security of agency systems and detect gaps and deficiencies.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="6.1.2."


><![CDATA[<p>This section covers information on conducting reviews of any agency’s information security posture and security implementation.</p>]]></paragraph>
</block>
<block title="Information security reviews"><paragraph
    title="6.1.3."


><![CDATA[<p>An information security review:</p><ul>
<li>identifies any changes to the business requirements or concept of operation for the subject of the review;</li>
<li>identifies any changes to the security risks faced by the subject of the review;</li>
<li>assesses the effectiveness of the existing counter-measures;</li>
<li>validates the implementation of controls and counter-measures; and</li>
<li>reports on any changes necessary to maintain an effective security posture.</li>
</ul>]]></paragraph>
<paragraph
    title="6.1.4."


><![CDATA[<p>An information security review can be scoped to cover anything from a single system to an entire agency’s systems.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="6.1.5."


><![CDATA[<p>Additional information relating to system auditing is contained in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title&nbsp;</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>ISO/IEC 27006:2015&nbsp;</strong></td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.iso27001security.com/html/27006.html" target="_blank">https://www.iso.org/standard/62313.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27007:2020&nbsp;</strong></td>
<td>
<p class="no-uppercase"><strong>Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.iso27001security.com/html/27007.html" target="_blank">https://www.iso.org/standard/77802.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC TS 27008:2019&nbsp;</strong></td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Guidelines for the assessment of information security controls</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.iso27001security.com/html/27008.html" target="_blank">https://www.iso.org/standard/67397.html</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="6.1.6."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 99.9838%; height: 304.333px;">
<tbody>
<tr style="height: 18.6667px;">
<td style="width: 22.7368%; height: 18.6667px;"><strong>Reference</strong></td>
<td style="width: 32.0648%; height: 18.6667px;"><strong>Title</strong></td>
<td style="width: 45.1822%; height: 18.6667px;"><strong>Source</strong></td>
</tr>
<tr style="height: 144.333px;">
<td style="width: 22.7368%; height: 144.333px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 32.0648%; height: 144.333px;">
<p>GOV3, INFOSEC1, INFOSEC2, INFOSEC3 and INFOSEC4</p>
</td>
<td style="width: 45.1822%; height: 144.333px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements&nbsp;</a></p>
</td>
</tr>
<tr style="height: 141.333px;">
<td style="width: 22.7368%; height: 141.333px;">
<p><strong>PSR requirements sections</strong></p>
</td>
<td style="width: 32.0648%; height: 141.333px;">
<p>Self-assessment &amp; reporting</p>
<p>Protective security measures</p>
</td>
<td style="width: 45.1822%; height: 141.333px;">
<p><a href="https://www.protectivesecurity.govt.nz/about/self-assessment-and-reporting">Self-assessment and reporting | Protective Security Requirements</a><br><a rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/about/compliance" target="_blank"></a></p>
<p><a rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/about/compliance" target="_blank">Complying with the Protective Security Requirements | Protective Security Requirements</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Conducting information security reviews"><paragraph
    title="6.1.7.R.01."

    tags="Governance,Information Security Review"


><![CDATA[<p>Annual reviews of an agency’s information security posture can assist with ensuring that agencies are responding to the latest threats, environmental changes and that systems are properly configured in accordance with any changes to information security documentation and guidance.</p>]]></paragraph>
<paragraph
    title="6.1.7.C.01."

    tags="Governance,Information Security Review"


    classification="All Classifications"
    compliance="Should"
    cid="1040"
><![CDATA[<p>Agencies SHOULD undertake and document information security reviews of their systems at least annually.</p>]]></paragraph>
</block>
<block title="Managing Conflicts of Interest"><paragraph
    title="6.1.8.R.01."

    tags="Governance,Information Security Review"


><![CDATA[<p>Reviews may be undertaken by personnel independent of the target of evaluation or by an independent third party to ensure that there is no (perceived or actual) conflict of interest and that an information security review is undertaken in an objective manner.</p>]]></paragraph>
<paragraph
    title="6.1.8.C.01."

    tags="Governance,Information Security Review"


    classification="All Classifications"
    compliance="Should"
    cid="1043"
><![CDATA[<p>Agencies SHOULD have information security reviews conducted by personnel independent to the target of the review or by an independent third party.</p>]]></paragraph>
</block>
<block title="Focus of information security reviews "><paragraph
    title="6.1.9.R.01."

    tags="Governance,Information Security Review"


><![CDATA[<p>Incidents, significant changes or an aggregation of minor changes may require a security review to determine and support any necessary changes and to demonstrate good systems governance. An agency may choose to undertake an information security review:</p><ul>
<li>as a result of a specific information security incident;</li>
<li>because a change to a system or its environment that significantly impacts on the agreed and implemented system architecture and information security policy; or</li>
<li>as part of a regular scheduled review.</li>
</ul>]]></paragraph>
<paragraph
    title="6.1.9.R.02."

    tags="Governance,Information Security Review"


><![CDATA[<p>In order to review risk, an information security review should analyse the threat environment and the highest classification of information that is stored, processed or communicated by that system.</p>]]></paragraph>
<paragraph
    title="6.1.9.R.03."

    tags="Governance,Information Security Review"


><![CDATA[<p>Depending on the scope and subject of the information security review, agencies may gather information on areas including:</p><ul>
<li>agency priorities, business requirements and/or concept of operations;</li>
<li>threat data;</li>
<li>risk likelihood and consequence estimates;</li>
<li>effectiveness of existing counter-measures;</li>
<li>other possible counter-measures; </li>
<li>changes to standards, policies and guidelines;</li>
<li>recommended good practices; and</li>
<li>significant system incidents and changes.</li>
</ul>]]></paragraph>
<paragraph
    title="6.1.9.C.01."

    tags="Governance,Information Security Review"


    classification="All Classifications"
    compliance="Should"
    cid="1048"
><![CDATA[<p>Agencies SHOULD review the components detailed in the table below. Agencies SHOULD also ensure that any adjustments and changes as a result of any vulnerability analysis are consistent with the vulnerability disclosure policy.</p><table class="table-secondary">
<tbody>
<tr>
<td>Component</td>
<td>Review</td>
</tr>
<tr>
<td>Information security documentation</td>
<td>The SecPol, Systems Architecture, SRMPs, SSPs, SitePlan, SOPs, the VDP, the IRP, and any third party assurance reports.</td>
</tr>
<tr>
<td>Dispensations</td>
<td>Prior to the identified expiry date.</td>
</tr>
<tr>
<td>Operating environment</td>
<td>When an identified threat emerges or changes, an agency gains or loses a function or the operation of functions are moved to a new physical environment.</td>
</tr>
<tr>
<td>Procedures</td>
<td>After an information security incident or test exercise.</td>
</tr>
<tr>
<td>System security</td>
<td>Items that could affect the security of the system on a regular basis.</td>
</tr>
<tr>
<td>Threats</td>
<td>Changes in threat environment and risk profile.</td>
</tr>
<tr>
<td>NZISM</td>
<td>Changes to baseline or other controls, any new controls and guidance.</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
</subsection>
</section>
<section title="6.2. Vulnerability Analysis"><subsection title="Objective"><paragraph
    title="6.2.1."


><![CDATA[<p>Exploitable information system weaknesses can be identified by vulnerability analyses and inform assessments and controls selection.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="6.2.2."


><![CDATA[<p>This section covers information on conducting vulnerability assessments on systems as part of the suite of good IT governance activities.</p>]]></paragraph>
</block>
<block title="Changes as a result of a vulnerability analysis"><paragraph
    title="6.2.3."


><![CDATA[<p>It is important that normal change management processes are followed where changes are necessary in order to address security risks identified in a vulnerability analysis.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Vulnerability analysis strategy"><paragraph
    title="6.2.4.R.01."

    tags="Governance,Vulnerability Analysis"


><![CDATA[<p>Vulnerabilities may be unintentionally introduced and new vulnerabilities are constantly identified, presenting ongoing risks to information systems security.</p>]]></paragraph>
<paragraph
    title="6.2.4.R.02."

    tags="Governance,Vulnerability Analysis"


><![CDATA[<p>While agencies are encouraged to monitor the public domain for information related to vulnerabilities that could affect their systems, they should not remain complacent if no specific vulnerabilities relating to deployed products are disclosed.</p>]]></paragraph>
<paragraph
    title="6.2.4.R.03."

    tags="Governance,Vulnerability Analysis"


><![CDATA[<p>In some cases, vulnerabilities can be introduced as a result of poor information security practices or as an unintended consequence of activities within an agency. As such, even if no new public domain vulnerabilities in deployed products have been disclosed, there is still value to be gained from regular vulnerability analysis activities.</p>]]></paragraph>
<paragraph
    title="6.2.4.R.04."

    tags="Governance,Vulnerability Analysis"


><![CDATA[<p>Furthermore, monitoring vulnerabilities, conducting analysis and being aware of industry and product changes and advances, including NZISM requirements, provides an awareness of other changes which may adversely impact the security risk profile of the agency’s systems.</p>]]></paragraph>
<paragraph
    title="6.2.4.C.01."

    tags="Governance,Vulnerability Analysis"


    classification="All Classifications"
    compliance="Should"
    cid="1063"
><![CDATA[<p>Agencies SHOULD implement a vulnerability analysis strategy by:</p><ul>
<li>monitoring public domain information about new vulnerabilities in operating systems and application software;</li>
<li>considering the use of automated tools to perform vulnerability assessments on systems in a controlled manner;</li>
<li>running manual checks against system configurations to ensure that only allowed services are active and that disallowed services are prevented; </li>
<li>using security checklists for operating systems and common applications; and</li>
<li>examining any significant incidents on the agency’s systems.</li>
</ul>]]></paragraph>
</block>
<block title="Conducting vulnerability assessments"><paragraph
    title="6.2.5.R.01."

    tags="Governance,Vulnerability Analysis"


><![CDATA[<p>A baseline or known point of origin is the basis of any comparison and allows measurement of changes and improvements when further information security monitoring activities are conducted.</p>]]></paragraph>
<paragraph
    title="6.2.5.C.01."

    tags="Governance,Vulnerability Analysis"


    classification="All Classifications"
    compliance="Should"
    cid="1066"
><![CDATA[<p>Agencies SHOULD conduct vulnerability assessments in order to establish a baseline. This SHOULD be done:</p><ul>
<li>before a system is first used;</li>
<li>after any significant incident;</li>
<li>after a significant change to the system;</li>
<li>after changes to standards, policies and guidelines; </li>
<li>when specified by an ITSM or system owner.</li>
</ul>]]></paragraph>
</block>
<block title="Resolving vulnerabilities"><paragraph
    title="6.2.6.R.01."

    tags="Governance,Vulnerability Analysis"


><![CDATA[<p>Vulnerabilities may occur as a result of poorly designed or implemented information security practices, accidental activities or malicious activities, and not just as the result of a technical issue.</p>]]></paragraph>
<paragraph
    title="6.2.6.C.01."

    tags="Governance,Vulnerability Analysis"


    classification="All Classifications"
    compliance="Should"
    cid="1069"
><![CDATA[<p>Agencies SHOULD analyse and treat all vulnerabilities and subsequent security risks to their systems identified during a vulnerability assessment.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="6.3. Change Management"><subsection title="Objective"><paragraph
    title="6.3.1."


><![CDATA[<p>To ensure information security is an integral part of the change management process, it should be incorporated into the agency’s IT maintenance governance and management activities.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="6.3.2."


><![CDATA[<p>This section covers information on identifying and managing routine and urgent changes to systems.</p>]]></paragraph>
</block>
<block title="Identifying the need for change"><paragraph
    title="6.3.3."


><![CDATA[<p>The need for change can be identified in various ways, including:</p><ul>
<li>system users identifying problems or enhancements;</li>
<li>vendors notifying of upgrades to software or IT equipment;</li>
<li>vendors notifying of the end of life to software or IT equipment;</li>
<li>advances in technology in general;</li>
<li>implementing new systems that necessitate changes to existing systems;</li>
<li>identifying new tasks or functionality requiring updates or new systems;</li>
<li>organisational change;</li>
<li>business process or concept of operation change;</li>
<li>standards evolution;</li>
<li>government policy or Cabinet directives;</li>
<li>threat or vulnerability identification and notifications received or issued; and</li>
<li>other incidents or continuous improvement activities.</li>
</ul>]]></paragraph>
</block>
<block title="Types of system change"><paragraph
    title="6.3.4."


><![CDATA[<p>A proposed change to a system could involve:</p><ul>
<li>an upgrade to, or introduction of IT equipment;</li>
<li>an upgrade to, or introduction of software;</li>
<li>environment or infrastructure change; or</li>
<li>major changes to access controls.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="6.3.5."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 120.833%; height: 268.404px;">
<tbody>
<tr style="height: 23.0556px;">
<td style="width: 15.8228%; height: 23.0556px;"><strong>Reference</strong></td>
<td style="width: 22.6217%; height: 23.0556px;"><strong>Title</strong></td>
<td style="width: 61.5607%; height: 23.0556px;"><strong>Source</strong></td>
</tr>
<tr style="height: 122.681px;">
<td style="width: 15.8228%; height: 122.681px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 22.6217%; height: 122.681px;">
<p>GOV3, INFOSEC1, INFOSEC2, INFOSEC3 and INFOSEC4</p>
</td>
<td style="width: 61.5607%; height: 122.681px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
</td>
</tr>
<tr style="height: 122.667px;">
<td style="width: 15.8228%; height: 122.667px;">
<p><strong>PSR requirements sections</strong></p>
</td>
<td style="width: 22.6217%; height: 122.667px;">
<p>Self assessment &amp; reporting</p>
<p>Protective security measures</p>
</td>
<td style="width: 61.5607%; height: 122.667px;">
<p><a href="https://www.protectivesecurity.govt.nz/about/self-assessment-and-reporting">Self-assessment and reporting | Protective Security Requirements</a></p>
<p><a rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/about/compliance" target="_blank">Complying with the Protective Security Requirements | Protective Security Requirements</a><a href="https://www.protectivesecurity.govt.nz/guidance/security-governance/managing-business-continuity"></a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Change management"><paragraph
    title="6.3.6.R.01."

    tags="Governance,Change Management"


><![CDATA[<p>A considered and accountable process requires consultation with all stakeholders before any changes are implemented. In the case of changes that will affect the security or accreditation status of a system, the Accreditation Authority is a key stakeholder and will need to be consulted and grant approval for the proposed changes.</p>]]></paragraph>
<paragraph
    title="6.3.6.R.02."

    tags="Governance,Change Management"


><![CDATA[<p>Change management processes are most likely to be bypassed or ignored when an urgent change needs to be made to a system. In these cases it is essential that the agency’s change management process strongly enforces appropriate actions to be taken before and after an urgent change is implemented.</p>]]></paragraph>
<paragraph
    title="6.3.6.C.01."

    tags="Governance,Change Management"


    classification="Top Secret"
    compliance="Must"
    cid="1088"
><![CDATA[<p>Agencies MUST ensure that for routine and urgent changes:</p><ul>
<li>the change management process, as defined in the relevant information security documentation, is followed;</li>
<li>the proposed change is approved by the relevant authority;</li>
<li>any proposed change that could impact the security or accreditation status of a system is submitted to the Accreditation Authority for approval; and</li>
<li>all associated information security documentation is updated to reflect the change.</li>
</ul>]]></paragraph>
<paragraph
    title="6.3.6.C.02."

    tags="Governance,Change Management"


    classification="All Classifications"
    compliance="Should"
    cid="1089"
><![CDATA[<p>Agencies SHOULD ensure that for routine and urgent changes:</p><ul>
<li>the change management process, as defined in the relevant information security documentation, is followed;</li>
<li>the proposed change is approved by the relevant authority;</li>
<li>any proposed change that could impact the security of a system or accreditation status is submitted to the Accreditation Authority for approval; and</li>
<li>all associated information security documentation is updated to reflect the change.</li>
</ul>]]></paragraph>
</block>
<block title="Change management process"><paragraph
    title="6.3.7.R.01."

    tags="Governance,Change Management"


><![CDATA[<p>Uncontrolled changes pose risks to information systems as well as the potential to cause operational disruptions.  A change management process is fundamental to ensure a considered and accountable approach with appropriate approvals.  Furthermore, the change management process provides an opportunity for the security impact of the change to be considered and if necessary, reaccreditation processes initiated.</p>]]></paragraph>
<paragraph
    title="6.3.7.C.01."

    tags="Governance,Change Management"


    classification="Top Secret"
    compliance="Must"
    cid="1093"
><![CDATA[<p>An agency’s change management process MUST define appropriate actions to be followed before and after urgent changes are implemented.</p>]]></paragraph>
<paragraph
    title="6.3.7.C.02."

    tags="Governance,Change Management"


    classification="All Classifications"
    compliance="Should"
    cid="1094"
><![CDATA[<p>An agency’s change management process SHOULD define appropriate actions to be followed before and after urgent changes are implemented.</p>]]></paragraph>
<paragraph
    title="6.3.7.C.03."

    tags="Governance,Change Management"


    classification="All Classifications"
    compliance="Should"
    cid="1095"
><![CDATA[<p>Agencies SHOULD follow this change management process outline:</p><ul>
<li>produce a written change request;</li>
<li>submit the change request to all stakeholders for approval;</li>
<li>document the changes to be implemented;</li>
<li>test the approved changes;</li>
<li>notification to user of the change schedule and likely effect or outage;</li>
<li>implement the approved changes after successful testing;</li>
<li>update the relevant information security documentation including the SRMP, SSP and SOPs</li>
<li>notify and educate system users of the changes that have been implemented as close as possible to the time the change is applied; and</li>
<li>continually educate system users in regards to changes.</li>
</ul>]]></paragraph>
</block>
<block title="Changes impacting the security of a system"><paragraph
    title="6.3.8.R.01."

    tags="Governance,Change Management"


><![CDATA[<p>The accreditation of a system accepts residual security risk relating to the operation of that system. Changes may impact the overall security risk for the system. It is essential that the Accreditation Authority is consulted and accepts the changes and any changes to risk.</p>]]></paragraph>
<paragraph
    title="6.3.8.C.01."

    tags="Governance,Change Management"


    classification="All Classifications"
    compliance="Must"
    cid="1098"
><![CDATA[<p>When a configuration change impacts the security of a system and is subsequently assessed as having changed the overall security risk for the system, the agency MUST reaccredit the system.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="6.4. Business Continuity and Disaster Recovery"><subsection title="Objective"><paragraph
    title="6.4.1."


><![CDATA[<p>To ensure business continuity and disaster recovery processes are established to assist in meeting the agency’s business requirements, minimise any disruption to the availability of information and systems, and assist recoverability.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="6.4.2."


><![CDATA[<p>This section covers information on business continuity and disaster recovery relating specifically to systems.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="6.4.3."


><![CDATA[<p>Additional information relating to business continuity is contained in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>ISO 22301:2019</strong></td>
<td>
<p class="no-uppercase"><strong>Security and resilience — Business continuity management systems — Requirements</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td>
<p><a title="ISO 22301:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/75106.html" target="_blank">https://www.iso.org/standard/75106.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27001:2013</strong></td>
<td><strong>Information Technology – Security Techniques - Information Security Management Systems - Requirements</strong></td>
<td style="text-align: center;">&nbsp;ISO</td>
<td>
<p><a title="ISO/IEC 27001:2013" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27002:2022</strong></td>
<td>
<p class="no-uppercase"><strong>Information security, cybersecurity and privacy protection — Information security controls</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td>
<p><a title="ISO/IEC 27002:2022" rel="noopener noreferrer" href="https://www.iso.org/standard/75652.html" target="_blank">https://www.iso.org/standard/75652.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27005:2018</strong></td>
<td><strong>Information Technology – Security Techniques - Information Security Risk Management</strong></td>
<td style="text-align: center;">&nbsp;ISO</td>
<td>
<p><a title="ISO/IEC 27005:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/75281.html" target="_blank">https://www.iso.org/standard/75281.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27031:2011</strong></td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td>
<p><a title="ISO/IEC 27031:2011" rel="noopener noreferrer" href="https://www.iso.org/standard/44374.html" target="_blank">https://www.iso.org/standard/44374.html</a></p>
</td>
</tr>
<tr>
<td><strong><strong>SAA/SNZ HB 221:2004</strong></strong></td>
<td><strong>Business Continuity Management</strong></td>
<td style="text-align: center;">&nbsp;Standards NZ</td>
<td>
<p><span><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz/</a>&nbsp;<a rel="noopener noreferrer" href="https://www.standards.co.nz%20" target="_blank"></a></span></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="6.4.4."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<p>&nbsp;</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td>GOV3, GOV7, INFOSEC1 and PHYSEC1</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements/&nbsp;&nbsp;&nbsp;</a></p>
<p><a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Availability requirements"><paragraph
    title="6.4.5.R.01."

    tags="Governance,Business Continuity"


><![CDATA[<p>Availability and recovery requirements will vary based on each agency’s business needs and are likely to be widely variable across government. Agencies will determine their own availability and recovery requirements and implement measures consistent with the agency's SRMP to achieve them as part of their risk management and governance processes.</p>]]></paragraph>
<paragraph
    title="6.4.5.C.01."

    tags="Governance,Business Continuity"


    classification="All Classifications"
    compliance="Must"
    cid="1120"
><![CDATA[<p>Agencies MUST determine availability and recovery requirements for their systems and implement measures consistent with the agency's SRMP to support them.</p>]]></paragraph>
</block>
<block title="Backup strategy"><paragraph
    title="6.4.6.R.01."

    tags="Governance,Business Continuity"


><![CDATA[<p>Having a backup strategy in place is a fundamental part of business continuity planning. The backup strategy ensures that critical business information is recoverable if lost. Vital records are defined as any information, systems data, configurations or equipment requirements necessary to restore normal operations.</p>]]></paragraph>
<paragraph
    title="6.4.6.C.01."

    tags="Governance,Business Continuity"


    classification="All Classifications"
    compliance="Should"
    cid="1123"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>Identify vital records;</li>
<li>backup all vital records;</li>
<li>store copies of critical information, with associated documented recovery procedures, offsite and secured in accordance with the requirements for the highest classification of the information; and</li>
<li>test backup and restoration processes regularly to confirm their effectiveness.</li>
</ul>]]></paragraph>
</block>
<block title="Business Continuity plan"><paragraph
    title="6.4.7.R.01."

    tags="Governance,Business Continuity"


><![CDATA[<p>It is important to develop a business continuity plan to assist in ensuring that critical systems and data functions can be maintained when the system is operating under constraint, for example, when bandwidth is unexpectedly limited below established thresholds.</p>]]></paragraph>
<paragraph
    title="6.4.7.C.01."

    tags="Governance,Business Continuity"


    classification="All Classifications"
    compliance="Should"
    cid="1126"
><![CDATA[<p>Agencies SHOULD develop and document a business continuity plan.</p>]]></paragraph>
</block>
<block title="Disaster recovery plan"><paragraph
    title="6.4.8.R.01."

    tags="Governance,Business Continuity"


><![CDATA[<p>Developing and documenting a disaster recovery plan, will reduce the time between a disaster occurring, and critical functions of systems being restored.</p>]]></paragraph>
<paragraph
    title="6.4.8.C.01."

    tags="Governance,Business Continuity"


    classification="All Classifications"
    compliance="Should"
    cid="1129"
><![CDATA[<p>Agencies SHOULD develop and document a disaster recovery plan.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="7. Information Security Incidents"><section title="7.1. Detecting Information Security Incidents"><subsection title="Objective"><paragraph
    title="7.1.1."


><![CDATA[<p>Organisations have implemented tools, processes and procedures to detect information security incidents, minimise their impact and have these activities embedded as part of IT governance.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="7.1.2."


><![CDATA[<p>This section covers information relating to detecting information security incidents.&nbsp; Detecting physical and personnel security incidents is out of scope of this section, unless there is an impact on information systems. Refer to <a title="Physical Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13224">Chapter 8 - Physical Security</a>&nbsp;and&nbsp;<a title="Personnel Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 - Personnel Security</a>.&nbsp;</p>]]></paragraph>
<paragraph
    title="7.1.3."


><![CDATA[<p class="NormS7C1">It is important to note that in most cases, information systems are likely to be affected.</p>]]></paragraph>
<paragraph
    title="7.1.4."


><![CDATA[<p>Additional information relating to detecting information security incidents, and topics covered in this section, can be found in the following sections of this manual:</p><ul>
<li><a title="Vulnerability Disclosure Policy" href="http://nzism.gcsb.govt.nz/ism-document#Section-12947">Section 5.9 - Vulnerability Disclosure Policy</a>;</li>
<li><a title="Information Security Reviews" href="http://nzism.gcsb.govt.nz/ism-document#Section-13002">Section 6.1 - Information Security Reviews</a>;</li>
<li><a title="Vulnerability Analysis" href="http://nzism.gcsb.govt.nz/ism-document#Section-13027">Section 6.2 - Vulnerability Analysis</a>;</li>
<li><a title="Reporting Information Security Incidents" href="http://nzism.gcsb.govt.nz/ism-document#Section-13120">Section 7.2 – Reporting Information Security Incidents</a>;</li>
<li><a title="Managing Information Security Incidents" href="http://nzism.gcsb.govt.nz/ism-document#Section-13177">Section 7.3 – Managing Information Security Incidents</a>;</li>
<li><a title="Information Security Awareness and Training" href="http://nzism.gcsb.govt.nz/ism-document#Section-13361">Section 9.1 - Information Security Awareness and Training</a>;</li>
<li><a title="Event logging and auditing" href="http://nzism.gcsb.govt.nz/ism-document#Section-15629">Section 16.6 - Event Logging and Auditing;</a></li>
<li><a title="Key Management" href="http://nzism.gcsb.govt.nz/ism-document#Section-16086">Section 17.9 – Key Management</a>; and</li>
<li><a title="Intrusion Detection and Prevention" href="http://nzism.gcsb.govt.nz/ism-document#Section-16436">Section 18.4 - Intrusion Detection and Prevention</a>.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="7.1.5."


><![CDATA[<p class="NormS7C1">Standards and guidance published by Standards Bodies and industry groups include:</p>
<table class="table-main" style="width: 131.424%;">
<tbody>
<tr>
<td style="width: 11.2404%;"><strong>Reference&nbsp;</strong></td>
<td style="width: 13.4885%;"><strong>Title</strong></td>
<td style="text-align: center; width: 12.8273%;"><strong>Publisher</strong></td>
<td style="width: 62.4173%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 11.2404%;"><strong>ISO/IEC 27035-1:2023</strong></td>
<td style="width: 13.4885%;"><strong>&nbsp;Information technology — Security techniques — Information security incident management — Part 1: Principles and Process</strong></td>
<td style="text-align: center; width: 12.8273%;">ISO</td>
<td style="width: 62.4173%;"><a title="Part 1" rel="noopener noreferrer" href="https://www.iso.org/standard/78973.html" target="_blank">ISO/IEC 27035-1:2023 - Information technology — Information security incident management — Part 1: Principles and process</a>&nbsp;</td>
</tr>
<tr>
<td style="width: 11.2404%;"><strong>ISO/IEC 27035-2:2023</strong></td>
<td style="width: 13.4885%;"><strong>Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response</strong></td>
<td style="text-align: center; width: 12.8273%;">ISO</td>
<td style="width: 62.4173%;"><a title="Part 2" rel="noopener noreferrer" href="https://www.iso.org/standard/78974.html" target="_blank">ISO/IEC 27035-2:2023 - Information technology — Information security incident management — Part 2: Guidelines to plan and prepare for incident response</a></td>
</tr>
<tr>
<td style="width: 11.2404%;"><strong>&nbsp;</strong></td>
<td style="width: 13.4885%;"><strong>Definitions of Computer Security Incident</strong></td>
<td style="text-align: center; width: 12.8273%;">NIST</td>
<td style="width: 62.4173%;"><a title="Definition of Computer Security Incident" rel="noopener noreferrer" href="https://csrc.nist.gov/glossary/term/Computer_Security_Incident" target="_blank">https://csrc.nist.gov/glossary/term/Computer_Security_Incident</a>&nbsp;&nbsp;</td>
</tr>
<tr>
<td style="width: 11.2404%;"><strong>SP 800-61 rev.2</strong></td>
<td style="width: 13.4885%;"><strong>Computer Security Incident Handling Guide</strong></td>
<td style="text-align: center; width: 12.8273%;">NIST</td>
<td style="width: 62.4173%;"><a title="NIST" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf [PDF, 1.5 MB]</a></td>
</tr>
<tr>
<td style="width: 11.2404%;">&nbsp;</td>
<td style="width: 13.4885%;"><strong>US-CERT Federal Incident Notification Guidelines</strong></td>
<td style="text-align: center; width: 12.8273%;">CISA</td>
<td style="width: 62.4173%;"><a title="Incident Notification Guidelines" rel="noopener noreferrer" href="https://us-cert.cisa.gov/incident-notification-guidelines" target="_blank">https://us-cert.cisa.gov/incident-notification-guidelines</a>&nbsp;</td>
</tr>
<tr>
<td style="width: 11.2404%;">&nbsp;</td>
<td style="width: 13.4885%;"><strong>NCSC Incident Management Be Resilient Be Prepared</strong></td>
<td style="text-align: center; width: 12.8273%;">NCSC</td>
<td style="width: 62.4173%;"><a rel="noopener noreferrer" href="https://www.ncsc.govt.nz/protect-your-organisation/guides/incident-management-be-resilient-be-prepared/" target="_blank">https://www.ncsc.govt.nz/protect-your-organisation/guides/incident-management-be-resilient-be-prepared/</a></td>
</tr>
<tr>
<td style="width: 11.2404%;">&nbsp;</td>
<td style="width: 13.4885%;"><strong>Cyber Security Incident Response Guide</strong></td>
<td style="text-align: center; width: 12.8273%;">CREST</td>
<td style="width: 62.4173%;"><a href="https://www.crest-approved.org/buying-building-cyber-services/implementation-procurement-guides-resources/">Implementation &amp; Procurement Guides - CREST</a><a href="https://www.crest-approved.org/wp-content/uploads/2022/04/CSIR-Procurement-Guide-1.pdf"></a></td>
</tr>
<tr>
<td style="width: 11.2404%;">&nbsp;</td>
<td style="width: 13.4885%;"><strong>Good Practice Guide for Incident Management</strong></td>
<td style="text-align: center; width: 12.8273%;">ENISA</td>
<td style="width: 62.4173%;"><a href="https://www.enisa.europa.eu/publications/good-practice-guide-for-incident-management">Good Practice Guide for Incident Management | ENISA</a></td>
</tr>
<tr>
<td style="width: 11.2404%;">&nbsp;</td>
<td style="width: 13.4885%;"><strong><span style="font-size: 12.0pt; font-family: &#039;Aptos&#039;,sans-serif; mso-fareast-font-family: Aptos; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: Aptos; mso-ligatures: standardcontextual; mso-ansi-language: EN-NZ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">Vulnerability Disclosure for Security researchers</span></strong></td>
<td style="text-align: center; width: 12.8273%;">CISA</td>
<td style="width: 62.4173%;"><a href="https://www.cisa.gov/news-events/news/securitytxt-simple-file-big-value">security.txt: A Simple File with Big Value | CISA</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="7.1.6."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td><a title="PSR Mandatory Requirements - Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/governance/mandatory-requirements-2/" target="_blank"></a><span>GOV6, GOV7, INFOSEC1 <span>and&nbsp;</span>INFOSEC4</span></td>
<td><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Preventing and detecting information security incidents"><paragraph
    title="7.1.7.R.01."

    tags="Governance,Information Security Incidents"


><![CDATA[<p class="Normal-nonumbering">Processes and procedures for the detection of information security incidents will assist in mitigating attacks using the most common vectors in systems exploits.</p>]]></paragraph>
<paragraph
    title="7.1.7.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p class="Normal-nonumbering">New or advanced attacks and exploits can frequently be detected through other metrics and effects, rather than direct identification. For example, unexpected spike in network traffic or network latency, unapproved changes in file permissions, unexpected high utilisation of computing resources etc.</p>]]></paragraph>
<paragraph
    title="7.1.7.R.03."

    tags="Governance,Information Security Incidents"


><![CDATA[<p>Potential information security incidents are detected by both personnel and automated incident detection tools.</p>
<ol>
<li>Personnel should be well trained and aware of information security issues.</li>
<li>Automated incident detection tools should be utilised to assist in developing use cases and a known baseline. Management and operation of the tools should be undertaken by experienced information security personnel.</li>
</ol>]]></paragraph>
<paragraph
    title="7.1.7.R.04."

    tags="Governance,Information Security Incidents"


><![CDATA[<p>Agencies may consider some of the tools described in the table below for detecting potential information security incidents.</p>
<p>&nbsp;</p>
<table class="table-secondary" style="width: 100%;">
<tbody>
<tr>
<td>Tool</td>
<td>Description</td>
</tr>
<tr>
<td>Next-Generation Firewall (NGFW)</td>
<td width="454">
<p>NGFWs can provide dynamic network defence by combining application/cloud service level control and dynamic threat feeds with signature or other anomaly detection to help prevent malicious connections to the network, or users connecting to malicious or non-approved cloud services. NGFWs may be deployed as cloud services (i.e. cloud firewall or firewall-as-a-service) or as a hardware or software appliance.</p>
</td>
</tr>
<tr>
<td>Protective DNS</td>
<td>Protective DNS provides real-time secure DNS resolver checks for domains and IP addresses against known malicious entities.</td>
</tr>
<tr>
<td>Threat Intelligence Platform (TIP)</td>
<td>TIPs enable an automated means to collect, analyse and manage threat data received from various intelligence sources to enrich prevention and detection capabilities.</td>
</tr>
<tr>
<td>Network and host Intrusion Detection Systems (IDSs)</td>
<td>Monitor and analyse network and host activity, usually relying on a list of known attack signatures to recognise/detect malicious activity and potential information security incidents.</td>
</tr>
<tr>
<td>Cloud threat detection capabilities</td>
<td>Enable, monitor and tune the threat detection capabilities of respective cloud services to detect threats and create high-quality alerts from log data or agents for cloud workloads and identity providers.</td>
</tr>
<tr>
<td>Anomaly detection systems</td>
<td>Baselines normal host and network activity and identifies events that deviate from expected patterns of activity .</td>
</tr>
<tr>
<td style="width: 26.0779%;">Endpont Detection and Response (EDR) /Extended Detection and Response (XDR</td>
<td style="width: 73.8873%;">Endpoint Detection and Response (EDR) provide host based threat detection and response that provide real-time monitoring and analytics. Extended Detection and Response expands on the functions of EDR to distinct security capabilities within your organisation.</td>
</tr>
<tr>
<td style="width: 26.0779%;">Log analysis</td>
<td style="width: 73.8873%;">Involves collecting and analysing event logs using pattern recognition to detect anomalous activities.</td>
</tr>
<tr>
<td style="width: 26.0779%;">Application Allow listing</td>
<td style="width: 73.8873%;">Lists the authorised activities and applications and permits their usage.</td>
</tr>
<tr>
<td style="width: 26.0779%;">Security Information and Event Management (SIEM)</td>
<td style="width: 73.8873%;">SIEM solutions provide centralised platform for log collection, storage, alerting and detection of security threats.</td>
</tr>
<tr>
<td style="width: 26.0779%;">Data Loss Prevention (DLP)</td>
<td style="width: 73.8873%;">DLP solutions identify and prevent sharing or transfer of sensitive information.</td>
</tr>
<tr>
<td style="width: 26.0779%;">security.txt</td>
<td style="width: 73.8873%;">Internet standard RFC 9116 defines a way for organisations to disclose their vulnerability disclosure practices.</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="7.1.7.R.05."

    tags="Governance,Information Security Incidents"


><![CDATA[<p class="Normal-nonumbering">Automated tools are only as good as their implementation and the level of analysis they perform.&nbsp; If tools are not configured to assess all areas of potential security risk then some vulnerabilities or attacks will not be detected. &nbsp;Maintenance of the tools is important to ensure that emerging threats and vulnerabilities are able to be identified. Failure to do so will reduce the effectiveness to identify vulnerabilities.</p>]]></paragraph>
<paragraph
    title="7.1.7.C.01."

    tags="Information Security Documentation,Information Security Incidents"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="1153"
><![CDATA[<p>Agencies MUST develop, implement and maintain tools and procedures covering the detection of potential information security incidents, incorporating:</p><ul>
<li>user awareness and training;</li>
<li>counter-measures against malicious code, known attack methods and types;</li>
<li>intrusion detection strategies;</li>
<li>data egress monitoring &amp; control;</li>
<li>access control anomalies;</li>
<li>audit analysis;</li>
<li>system integrity checking; and</li>
<li>vulnerability assessments.</li>
</ul>]]></paragraph>
<paragraph
    title="7.1.7.C.02."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1154"
><![CDATA[<p>Agencies SHOULD develop, implement and maintain tools and procedures covering the detection of potential information security incidents, incorporating:</p>
<ul>
<li>user awareness and training;</li>
<li>counter-measures against malicious code, known attack methods and types;</li>
<li>intrusion detection strategies;</li>
<li>dynamic network defence (i.e. protective DNS and/or NGFW)</li>
<li>data egress monitoring &amp; control;</li>
<li>access control anomalies;</li>
<li>audit analysis;</li>
<li>system integrity checking; and</li>
<li>vulnerability assessments.</li>
</ul>]]></paragraph>
<paragraph
    title="7.1.7.C.03."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1155"
><![CDATA[<p class="Normal-nonumbering">Agencies SHOULD use the results of the security risk assessment to determine the appropriate balance of resources allocated to prevention versus resources allocated to detection of information security incidents.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="7.2. Reporting Information Security Incidents"><subsection title="Objective"><paragraph
    title="7.2.1."


><![CDATA[<p>Reporting of information security incidents is incorporated as an essential part of incident management, whether the reporting is within an agency or reports are provided to another government agency.&nbsp;</p>]]></paragraph>
<paragraph
    title="7.2.2."


><![CDATA[<p>Reporting helps to maintain an accurate threat environment picture for government systems, particularly when All-of-Government (AoG) or multi-agency systems are involved.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="7.2.3."


><![CDATA[<p class="NormS7C2">This section covers information relating specifically to the reporting of information security incidents.&nbsp; It does <strong>not </strong>cover the reporting of physical or personnel security incidents <strong>unless</strong> there is an impact on information systems.<br>For example, keypads and access cards are part of a wider information technology system, where physical key locks are not.</p>]]></paragraph>
<paragraph
    title="7.2.4."


><![CDATA[<p class="NormS7C2">It is important to note that, in most cases, information systems are likely to be affected.</p>]]></paragraph>
</block>
<block title="Requirement for information security incident reporting"><paragraph
    title="7.2.5."


><![CDATA[<p class="NormS7C2">The requirement to report an information security incident report applies irrespective of whether incident management is internally managed or if an agency has outsourced some or all of its information technology functions and services.</p>]]></paragraph>
<paragraph
    title="7.2.6."


><![CDATA[<p class="NormS7C2">The information security threat and intelligence landscape continues to evolve, partly  driven by more advanced, capable, well-resourced and motivated adversaries, as well as the need to improve management and governance of information systems.  To assist in managing these requirements, a standardised form of information exchange is essential.</p>]]></paragraph>
<paragraph
    title="7.2.7."


><![CDATA[<p>Agencies must have a comprehensive understanding of their assets, both physical and intellectual. By establishing clear boundaries, they can effectively manage their scope, ensuring informed decisions and efficient incident response.&nbsp;&nbsp;</p>]]></paragraph>
<paragraph
    title="7.2.8."


><![CDATA[<p>Agencies need to consider that vendor contract(s) and agreement(s) enable sharing of information relating to incidents with the NCSC.</p>
<p>&nbsp;</p>]]></paragraph>
</block>
<block title="Definition of a Security Incident"><paragraph
    title="7.2.9."


><![CDATA[<p>A <strong>security incident</strong> is a violation, breach or infringement of a security policy or an attempt to gain unauthorised access to official resources. It is important to note that security incidents include physical incidents (such as lost documents) as well as “cyber” incidents.</p>]]></paragraph>
</block>
<block title="Definition of a Cyber Security Incident"><paragraph
    title="7.2.10."


><![CDATA[<p>A <strong>cyber security incident</strong> is any event that jeopardises or may jeopardise the confidentiality, integrity, or availability of an information system or the information a system processes, stores, or communicates.&nbsp; This includes a violation or potential violation of security policies, security procedures, acceptable use policies or any relevant regulation or legislation.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="7.2.11."


><![CDATA[<p>The detection,&nbsp;triaging, recording, management and response to an incident depends primarily on effective prevention and detection mechanisms and a robust response plan.&nbsp; Effective detection and response mechanisms also provide an important record of events and assist in preventing repeat events, improving defences and streamlining response measures.</p>]]></paragraph>
<paragraph
    title="7.2.12."


><![CDATA[<p>A key part of the detection and response is incident reporting, including internal security system reports as well as any essential external reporting.&nbsp; It is essential that response is timely and methodical in order to minimise the effects of the incident.&nbsp; In all cases it is vital that steps are taken to quickly contain the incident, minimise damage and implement measures to prevent or contain any reoccurrence.</p>]]></paragraph>
<paragraph
    title="7.2.13."


><![CDATA[<p>Not&nbsp;every cybersecurity event is serious enough to warrant detailed investigation and reporting, for example a single multi-factor authentication challenge failure from an employee on premises.&nbsp; Multiple multi-factor challenge failures, however, may indicate a malicious access attempt.&nbsp; Thresholds should be established which will trigger an incident response.&nbsp; In all cases, once an incident has been determined, it should be recorded to support analysis and reporting.</p>]]></paragraph>
<paragraph
    title="7.2.14."


><![CDATA[<p>It&nbsp;is also important to categorise incidents in order to better manage allocation of resources to the containment and remediation of the incident.&nbsp; A three-tier categorisation is suggested:</p>
<ol>
<li class="NormS7C2"><strong>Critical</strong>: Incident affecting critical systems or information with potential to impact operations, revenue, customers or information disclosed in data breach.<br>For example, distributed denial of service attack, unauthorised access to system, multi-system ransomware.<br><br></li>
<li><strong>Serious</strong>: Incident affecting noncritical systems or information, impact on operations, revenue, customers or information disclosed in data breach.<br>For example, execution of malware on a single system, potentially compromised credentials.<br><br></li>
<li><strong>Low</strong>: Possible incident affecting noncritical systems.&nbsp; Incidents or employee investigations that are not time sensitive.&nbsp; <br>For example, blocked phishing attempts.</li>
</ol>]]></paragraph>
<paragraph
    title="7.2.15."


><![CDATA[<p>Incidents where the scope or cause of activity has not yet been determined should be categorised as serious or critical and actioned accordingly.</p>]]></paragraph>
<paragraph
    title="7.2.16."


><![CDATA[<p>Fa<span>ctors that assist in determining the severity of an incident include:</span></p>
<ul>
<li>Whether the incident affects a single agency or multiple agencies;</li>
<li><!--[endif]-->Functional impact of the incident (availability);</li>
<li><!--[endif]-->Information impact of the incident (confidentiality, integrity);</li>
<li><!--[endif]-->Recoverability from the incident;</li>
<li><!--[endif]-->Whether a breach of personal information held by the agency has occurred;</li>
<li><!--[endif]-->Whether unauthorised access to agency information systems may have occurred;</li>
<li><!--[endif]-->Reputational risk to the agency;</li>
<li><!--[endif]-->Impact on any MOUs, MOAs and similar formal agreements;</li>
<li><!--[endif]-->Impact on the disclosure of information theft of data.</li>
</ul>
<p class="NormS7C2" style="mso-list: l0 level1 lfo1;">&nbsp;</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="7.2.17."


><![CDATA[<p>Additional information relating to information security incidents can be found at:</p>
<table class="table-main" style="width: 100%; height: 537.6px;">
<tbody>
<tr style="height: 18.4px;">
<td style="width: 17.2114%; height: 18.4px;"><strong>Reference</strong></td>
<td style="width: 30.4242%; height: 18.4px;"><strong>Title</strong></td>
<td style="text-align: center; width: 13.3866%; height: 18.4px;"><strong>Publisher</strong></td>
<td style="width: 39.1168%; height: 18.4px;"><strong>Source</strong></td>
</tr>
<tr style="height: 110.4px;">
<td style="width: 17.2114%; height: 110.4px;">
<p><strong>SP 800-61r3&nbsp;</strong></p>
<p><strong>April 2025</strong></p>
</td>
<td style="width: 30.4242%; height: 110.4px;"><strong>Computer Security Incident Handling Guide,&nbsp;</strong></td>
<td style="text-align: center; width: 13.3866%; height: 110.4px;"><strong>NIST</strong></td>
<td style="width: 39.1168%; height: 110.4px;"><strong><span style="font-size: 12.0pt; font-family: &#039;Aptos&#039;,sans-serif; mso-fareast-font-family: Aptos; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: Aptos; mso-ligatures: standardcontextual; mso-ansi-language: EN-NZ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><a href="https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvlpubs.nist.gov%2Fnistpubs%2FSpecialPublications%2FNIST.SP.800-61r3.pdf&amp;data=05%7C02%7Crs01%40ncsc.govt.nz%7C308085111632488f2efd08dd90d248f7%7C27dc6ab39c394134a7b2beddcf3638e6%7C1%7C0%7C638825955031506612%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=ZquQJEntfDLQqfIid8gI7Vr0PMf4wo%2FIrUudBHOFihY%3D&amp;reserved=0">Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile</a></span></strong></td>
</tr>
<tr style="height: 124px;">
<td style="width: 17.2114%; height: 124px;"><strong>SP&nbsp;800-60 Volume 1 Revision 1</strong></td>
<td style="width: 30.4242%; height: 124px;">
<p><strong>Guide for Mapping Types of Information and Information Systems to Security Categories</strong></p>
</td>
<td style="text-align: center; width: 13.3866%; height: 124px;">
<p>NIST</p>
</td>
<td style="width: 39.1168%; height: 124px;"><a href="https://csrc.nist.gov/pubs/sp/800/60/v1/r1/final">SP 800-60 Vol. 1 Rev. 1, Guide for Mapping Types of Information and Information Systems to Security Categories | CSRC</a></td>
</tr>
<tr style="height: 142.4px;">
<td style="width: 17.2114%; height: 142.4px;">
<p><strong>SP&nbsp;800-60 Volume 2 Revision 1</strong></p>
</td>
<td style="width: 30.4242%; height: 142.4px;">
<p><strong>Guide for Mapping Types of Information and Information Systems to Security Categories, Volume ll: Appendices</strong></p>
</td>
<td style="text-align: center; width: 13.3866%; height: 142.4px;">NIST</td>
<td style="width: 39.1168%; height: 142.4px;"><a href="https://csrc.nist.gov/pubs/sp/800/60/v2/r1/final">SP 800-60 Vol. 2 Rev. 1, Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices | CSRC</a></td>
</tr>
<tr style="height: 68.8px;">
<td style="width: 17.2114%; height: 68.8px;">&nbsp;</td>
<td style="width: 30.4242%; height: 68.8px;">
<p><strong>Guide to cyber threat sharing</strong></p>
</td>
<td style="text-align: center; width: 13.3866%; height: 68.8px;">NIST</td>
<td style="width: 39.1168%; height: 68.8px;"><a rel="noopener noreferrer" href="https://www.us-cert.gov/Information-Sharing-Specifications-Cybersecurity" target="_blank">Guide to cyber threat sharing</a></td>
</tr>
<tr style="height: 73.6px;">
<td style="width: 17.2114%; height: 73.6px;">&nbsp;</td>
<td style="width: 30.4242%; height: 73.6px;">
<p><strong>Cyber Threats and Advisories</strong></p>
</td>
<td style="text-align: center; width: 13.3866%; height: 73.6px;">CISA</td>
<td style="width: 39.1168%; height: 73.6px;"><a href="https://www.cisa.gov/topics/cyber-threats-and-advisories">Cyber Threats and Advisories | Cybersecurity and Infrastructure Security Agency CISA</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Reporting information security incidents"><paragraph
    title="7.2.18.R.01."

    tags="Governance,Information Security Incidents"


><![CDATA[<p class="NormS7C2">Reporting information security incidents provides management with a means to assess and minimise damage to a system and to take remedial actions.&nbsp; Incidents should be reported to an ITSM, as soon as possible. The ITSM or CISO may seek advice from NCSC as required.&nbsp;</p>]]></paragraph>
<paragraph
    title="7.2.18.C.01."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1203"
><![CDATA[<p>Agencies MUST direct personnel to report information security incidents to an ITSM as soon as possible after the information security incident is discovered in accordance with agency procedures.</p>]]></paragraph>
<paragraph
    title="7.2.18.C.02."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1205"
><![CDATA[<p class="Normal-nonumbering">Agencies SHOULD:</p>
<ul>
<li>encourage personnel to note and report any observed or suspected security weaknesses in, or threats to, systems or services;</li>
<li>establish and follow procedures for reporting system, software or other malfunctions;</li>
<li>put mechanisms in place to enable the types, volumes and costs of information security incidents and malfunctions to be quantified and monitored; and</li>
<li>deal with the violation of agency information security policies and procedures by personnel through training and, where warranted, a formal disciplinary process.</li>
</ul>]]></paragraph>
</block>
<block title="Responsibilities when reporting an information security incident"><paragraph
    title="7.2.19.R.01."

    tags="Governance,Information Security Incidents"


><![CDATA[<p class="Normal-nonumbering">The ITSM actively manages information security incidents and MUST ensure the CISO has sufficient awareness of and information on any information security incidents within an agency.</p>
<p class="Normal-nonumbering">The CISO is required to keep the CSO and/or Agency Head informed of information security incidents within their agency.&nbsp;</p>]]></paragraph>
<paragraph
    title="7.2.19.R.02."

    tags="Governance,Information Security Incidents"


><![CDATA[<p class="Normal-nonumbering">Reporting on Critical and Serious incidents requires immediate action.</p>
<p class="Normal-nonumbering">Reporting on incidents categorised as Low can usually be adequately managed through periodic (weekly or monthly) reports.&nbsp;</p>]]></paragraph>
<paragraph
    title="7.2.19.C.01."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1211"
><![CDATA[<p>The ITSM MUST keep the CISO fully informed of information security incidents within an agency.</p>]]></paragraph>
</block>
<block title="Reporting information security incidents to National Cyber Security Centre (NCSC)"><paragraph
    title="7.2.20.R.01."

    tags="Governance,Information Security Incidents"


><![CDATA[<p>The NCSC uses significant information security incident reports as the basis for identifying and responding to information security events across government, and New Zealand. Reports are also used to develop new policy, procedures, techniques and training measures to prevent the recurrence of similar information security incidents across government.</p>]]></paragraph>
<paragraph
    title="7.2.20.R.02."


><![CDATA[<p>Reporting on Critical and Serious incidents requires <span style="color: #c00000;">immediate action</span>.</p>
<p>Reporting of Critical or Serious information security incidents to the NCSC through the appropriate channels ensures that appropriate and timely assistance can be provided to the agency.&nbsp;&nbsp; In addition, it allows the NCSC to maintain an accurate threat environment view across government systems.</p>]]></paragraph>
<paragraph
    title="7.2.20.R.03."


><![CDATA[<p>Reporting&nbsp;on incidents categorised as Low can be scheduled to a suitable timeframe e.g. weekly.&nbsp;</p>]]></paragraph>
<paragraph
    title="7.2.20.C.01."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1216"
><![CDATA[<p class="NormS7C2">The Agency ITSM, MUST report information security incidents categorised as:</p>
<ul>
<li><strong>Critical</strong>;</li>
<li><strong>Serious</strong>; or</li>
<li>incidents related to multi-agency or government systems;</li>
</ul>
<p class="NormS7C2">to the NCSC as soon as possible.</p>
<p>A Report Form is provided on the NCSC website under Reporting an Incident at <a rel="noopener noreferrer" href="https://www.ncsc.govt.nz/incidents/report-an-incident-and-request-support" target="_blank">Report an incident and request support | National Cyber Security Centre</a></p>
<p class="NormS7C2" style="margin-left: 70.9pt; text-indent: 0cm; mso-list: none;">&nbsp;</p>]]></paragraph>
<paragraph
    title="7.2.20.C.02."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1220"
><![CDATA[<p class="NormS7C2">Agencies SHOULD report information security incidents categorised as <strong>Low</strong> to the NCSC.</p>
<p class="NormS7C2">A <span>Report Form is provided on the NCSC website under Reporting an Incident at <a href="https://www.ncsc.govt.nz/incidents/report-an-incident-and-request-support">Report an incident and request support | National Cyber Security Centre</a></span></p>]]></paragraph>
<paragraph
    title="7.2.20.C.03."

    tags="Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="7536"
><![CDATA[<p>Agencies SHOULD formally share post-incident review reports by emailing them to <a title="NCSC incidents" href="mailto:incidents@ncsc.govt.nz">incidents@ncsc.govt.nz</a>.</p>]]></paragraph>
</block>
<block title="Outsourcing and information security incidents"><paragraph
    title="7.2.21.R.01."

    tags="Governance,Information Security Incidents"


><![CDATA[<p class="NormS7C2">In the case of outsourcing of information technology services and functions, the agency remains responsible for the reporting of all information security incidents.&nbsp; This includes any outsourced cloud services used by the agency.&nbsp; As such, the agency MUST ensure that the service provider informs them of all information security incidents to enable them to assess the incident and provide formal reporting.</p>]]></paragraph>
<paragraph
    title="7.2.21.C.01."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1226"
><![CDATA[<p class="NormS7C2">Agencies that outsource their information technology services and functions MUST ensure that the service provider advises and consults with the agency when an information security incident occurs.</p>]]></paragraph>
</block>
<block title="Cryptographic keying material"><paragraph
    title="7.2.22.R.01."

    tags="Governance,Key Management,Information Security Incidents"


><![CDATA[<p>Reporting any information security incident involving the loss or misuse of cryptographic keying material is particularly important. Systems users in this situation are those that rely on the use of cryptographic keying material for the confidentiality and integrity of their secure communications.</p>]]></paragraph>
<paragraph
    title="7.2.22.R.02."

    tags="Governance,Key Management,Information Security Incidents"


><![CDATA[<p class="Normal-nonumbering">It is important to note that a loss or compromise of keying material is a Critical or Serious information security incident and strict procedures must be followed to minimise the impact of the incident.</p>]]></paragraph>
<paragraph
    title="7.2.22.C.01."

    tags="Governance,Key Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1233"
><![CDATA[<p class="NormS7C2">Agencies MUST notify all system users of any suspected or confirmed loss or compromise of keying material.</p>]]></paragraph>
</block>
<block title="Replacement of Cryptographic Key (HACE) keying material"><paragraph
    title="7.2.23.R.01."

    tags="Governance,Key Management,Information Security Incidents"


><![CDATA[<p class="NormS7C2">If an encryption key is compromised, there is no need to attack the algorithm itself and it is a trivial matter to decrypt any encrypted data.&nbsp; This is why strong key management is vital in order to protect the encryption keying materials.&nbsp; If a compromise of keying materials is known or even suspected, the cryptographic key must be replaced as a matter of urgency and measures taken to reduce the impact of the key compromise.&nbsp; See also Section 17.9 – Key Management.</p>]]></paragraph>
<paragraph
    title="7.2.23.C.01."

    tags="Governance,Key Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="6592"
><![CDATA[<p class="Normal-nonumbering">Agencies MUST replace compromised cryptographic keys as a matter of urgency and record the replacement in the incident reporting.</p>]]></paragraph>
</block>
<block title="High Assurance Cryptographic Equipment (HACE) keying material"><paragraph
    title="7.2.24.R.01."

    tags="Governance,High Assurance Products,Key Management,Information Security Incidents"


><![CDATA[<p>For information security incidents involving the suspected loss or compromise of HACE keying material, GCSB will investigate the possibility of compromise, and where possible, initiate action to reduce the impact of the compromise.</p>]]></paragraph>
<paragraph
    title="7.2.24.C.01."

    tags="Governance,High Assurance Products,Key Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1237"
><![CDATA[<p class="Normal-nonumbering">Agencies MUST urgently notify GCSB of any suspected loss or compromise of keying material associated with HACE.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="7.3. Managing Information Security Incidents"><subsection title="Objective"><paragraph
    title="7.3.1."


><![CDATA[<p>Organisations have processes implemented for incident identification, management and analysis of information security incidents, including selection of appropriate remedies which will assist in preventing or reducing the impact of future information security incidents.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="7.3.2."


><![CDATA[<p>This section covers information relating primarily to managing information security incidents. The management of physical and personnel security incidents is considered to be out of scope unless it directly impacts on the protection of systems (e.g. the breaching of physical protection for a server room).</p>]]></paragraph>
<paragraph
    title="7.3.3."


><![CDATA[<p class="NormS7C3">It is important to note that, in most cases, information systems are likely to be affected.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="7.3.4."


><![CDATA[<p>Additional information relating to the management of ICT evidence is contained in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27037:2012</strong></p>
</td>
<td>
<p><strong>Information Technology – Security Techniques – Guidelines for identification, collection, acquisition and preservation of digital evidence.</strong></p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="ISO/IEC 27037" rel="noopener noreferrer" href="https://www.iso.org/standard/44381.html" target="_blank">https://www.iso.org/standard/44381.html</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>HB 171:2003</strong></p>
</td>
<td>
<p><strong>Guidelines for the Management of Information Technology Evidence</strong></p>
</td>
<td style="text-align: center;">Standards Australia&nbsp;</td>
<td><a href="https://www.saiglobal.com/PDFTemp/Previews/OSH/as/misc/handbook/HB171.PDF">https://www.saiglobal.com/PDFTemp/Previews/OSH/as/misc/handbook/HB171.PDF [PDF, 350 KB]</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>&nbsp;Incident Response&nbsp;</strong></p>
</td>
<td style="text-align: center;">NCSC&nbsp;</td>
<td><a href="https://www.ncsc.govt.nz/incidents/">Incidents | National Cyber Security Centre (ncsc.govt.nz)</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Information security incident management documentation"><paragraph
    title="7.3.5.R.01."

    tags="Governance,Information Security Documentation,Incident Management,Information Security Incidents"


><![CDATA[<p>Ensuring responsibilities and procedures for information security incidents are documented in relevant Information Security Documentation will ensure that when an information security incident does occur, agency personnel can respond in an appropriate manner. In addition, ensuring that system users are aware of reporting procedures will assist in identifying any information security incidents that an ITSM, or system owner fail to notice.</p>]]></paragraph>
<paragraph
    title="7.3.5.C.01."

    tags="Governance,Information Security Documentation,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1260"
><![CDATA[<p>Agencies MUST detail information security incident responsibilities and procedures for each system in the relevant Information Security Documents.</p>]]></paragraph>
<paragraph
    title="7.3.5.R.02."

    tags="Incident Management,Information Security Incidents"


><![CDATA[<p>Alternative communications efforts should be established to avoid using potentially compromised infrastructure to communicate during an incident.</p>]]></paragraph>
</block>
<block title="Recording information security incidents"><paragraph
    title="7.3.6.R.01."

    tags="Governance,Information Security Documentation,Incident Management,Information Security Incidents"


><![CDATA[<p>The purpose of recording information security incidents is to highlight the nature and frequency of information security incidents so that corrective action can be taken. This information can subsequently be used as an input to security risk assessments of systems.</p>]]></paragraph>
<paragraph
    title="7.3.6.C.01."

    tags="Governance,Information Security Documentation,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1264"
><![CDATA[<p>Agencies SHOULD ensure that <strong>all</strong> information security incidents are recorded in a register.</p>]]></paragraph>
<paragraph
    title="7.3.6.C.02."

    tags="Governance,Information Security Documentation,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1266"
><![CDATA[<p>Agencies SHOULD use their incidents register as a reference for future security risk assessments.</p>]]></paragraph>
</block>
<block title="Handling data spills or data breach"><paragraph
    title="7.3.7.R.01."

    tags="Data Management,Governance,Incident Management,Information Security Incidents"


><![CDATA[<p>A data spill or data breach is defined as the unauthorised or unintentional release, transmission or transfer of data. If there is a possibility that sensitive or classified information may be compromised as a result of an information security incident, agencies need to be able to respond in a timely fashion to limit damage and contain the incident.</p>
<p>For example, Data Loss Prevention (DLP) techniques and tools such as network activity monitoring, endpoint DLP tools, data classification can aid in detecting and preventing data spills or data breaches.</p>]]></paragraph>
<paragraph
    title="7.3.7.C.01."

    tags="Data Management,Governance,Information Security Documentation,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1271"
><![CDATA[<p>Agencies MUST implement procedures and processes to detect data spills or data breach.</p>]]></paragraph>
<paragraph
    title="7.3.7.C.02."

    tags="Data Management,Governance,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1273"
><![CDATA[<p>When a data spill occurs agencies MUST assume that data at the highest classification held on or processed by the system, has been compromised.</p>]]></paragraph>
<paragraph
    title="7.3.7.C.03."

    tags="Data Management,Governance,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1274"
><![CDATA[<p>Agency SOPs MUST include procedure for:</p>
<ul>
<li>all personnel with access to systems;&nbsp;</li>
<li>notification to the ITSM of any data spillage&nbsp;or breaches;&nbsp;and</li>
<li>notification to the ITSM of access to any data which they are not authorised to access.</li>
</ul>]]></paragraph>
<paragraph
    title="7.3.7.C.04."

    tags="Data Management,Governance,Information Security Documentation,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1275"
><![CDATA[<p>Agencies MUST document procedures for dealing with data spills&nbsp;or data breaches in their IRP.</p>]]></paragraph>
<paragraph
    title="7.3.7.C.05."

    tags="Data Management,Governance,Information Security Documentation,IRP,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1276"
><![CDATA[<p>Agencies MUST treat any data spill&nbsp;or data breach as an information security incident and follow the IRP to deal with it.</p>]]></paragraph>
<paragraph
    title="7.3.7.C.06."

    tags="Data Management,Governance,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1277"
><![CDATA[<p>When a data spill or data breach occurs agencies MUST report the details to the Privacy Commissioner and information owner in accordance with the <a rel="noopener noreferrer" href="https://www.legislation.govt.nz/act/public/2020/0031/latest/LMS23223.html" target="_blank">Privacy Act 2020</a>.</p>]]></paragraph>
</block>
<block title="Containing data spills"><paragraph
    title="7.3.8.R.01."

    tags="Data Management,Technical,Incident Management,Information Security Incidents"


><![CDATA[<p class="Normal-nonumbering">The spillage of classified information onto a system not accredited to handle the information is considered a <span style="text-decoration: underline;">serious</span> information security incident.&nbsp; It may be a <span style="text-decoration: underline;">critical</span> information security incident if personal information or particularly sensitive information is spilled.&nbsp; Refer to <a title="Reporting information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Section-13120">Section 7.2 – Reporting Information Security Incidents</a>.</p>]]></paragraph>
<paragraph
    title="7.3.8.R.02."

    tags="Data Management,Technical,Incident Management,Information Security Incidents"


><![CDATA[<p><strong><em>Isolation</em></strong> may include disconnection from other systems and any external connections. In some cases system isolation may not be possible for architectural or operational reasons.</p>]]></paragraph>
<paragraph
    title="7.3.8.R.03."

    tags="Data Management,Technical,Incident Management,Information Security Incidents"


><![CDATA[<p><strong><em>Segregation</em></strong> may be achieved by isolation, enforcing separation of key elements of a virtual system, removing network connectivity to the relevant device or applying access controls to prevent or limit access.</p>]]></paragraph>
<paragraph
    title="7.3.8.R.04."

    tags="Data Management,Technical,Incident Management,Information Security Incidents"


><![CDATA[<p>It is important to note that powering off a system can destroy information that may be useful in forensics analysis or other investigative work. In large, inter-connected systems, powering off a system may not be feasible.</p>]]></paragraph>
<paragraph
    title="7.3.8.C.01."

    tags="Data Management,Technical,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1283"
><![CDATA[<p>When classified information is introduced onto a system not accredited to handle the information, the following actions MUST be followed:</p><ol>
<li>Immediately seek the advice of an ITSM;</li>
<li>Segregate or isolate the affected system and/or data spill;</li>
<li>Personnel MUST NOT delete the higher classified information unless specifically authorised by an ITSM.</li>
</ol>]]></paragraph>
<paragraph
    title="7.3.8.C.02."

    tags="Data Management,Technical,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must Not"
    cid="1284"
><![CDATA[<p>When classified information is introduced onto a system not accredited to handle the information, personnel MUST NOT copy, view, print or email the information.</p>]]></paragraph>
<paragraph
    title="7.3.8.C.03."

    tags="Data Management,Governance,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1285"
><![CDATA[<p>When a data spill or data breach involving classified or sensitive information or contamination<span style="font-size: 10.5pt; line-height: 127%; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: Calibri; color: #212529; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;"> </span>of classified systems occurs and systems cannot be segregated, or isolated agencies SHOULD immediately contact the&nbsp;<a href="https://ncsc.govt.nz">NCSC</a> for further advice.</p>]]></paragraph>
</block>
<block title="Handling malicious code infection"><paragraph
    title="7.3.9.R.01."

    tags="Technical,Incident Management,Information Security Incidents"


><![CDATA[<p class="Normal-nonumbering">Malicious code or malware is defined as software that attempts to compromise the confidentiality, integrity or availability of a system. This guidance for handling malicious code infections assists organisations have the procedures and processes in place to manage potential infections, further spread and similar future infections. Important details include:</p>
<ul>
<li>the infection date/time of the machine;</li>
<li>any observed effects and source details;</li>
<li>the possibility that system records and logs could be compromised; and</li>
<li>the period of infection.</li>
</ul>]]></paragraph>
<paragraph
    title="7.3.9.R.02."

    tags="Technical,Incident Management,Information Security Incidents"


><![CDATA[<p>Positive detection of malicious code will require the below steps to occur:</p>
<ul>
<li>Isolation of infected systems to prevent further spread. Check connected systems and media for infections and isolate as required;</li>
<li>Removal of the malicious code should be performed with appropriate malware removal tools;&nbsp;</li>
<li>Eradication and recovery in some cases would require restoring systems with original media.<span style="font-size: 10.5pt; line-height: 127%; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: Calibri; color: #212529; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;"> </span></li>
</ul>]]></paragraph>
<paragraph
    title="7.3.9.R.03."

    tags="Technical,Incident Management,Information Security Incidents"


><![CDATA[<p>Agencies should be aware that some malicious code infections such as rootkits, employ persistence mechanisms. This will require specialist assistance or advice to detect and eradicate .</p>]]></paragraph>
<paragraph
    title="7.3.9.C.01."

    tags="Technical,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1290"
><![CDATA[<p class="Normal-nonumbering">Agencies SHOULD follow the steps described below when malicious code is detected:</p>
<ul>
<li class="MsoNormal" style="text-indent: -21.25pt; line-height: normal;">&nbsp; &nbsp; &nbsp; isolate the infected system;</li>
<li>decide whether to request assistance from <a title="NCSC" rel="noopener noreferrer" href="https://ncsc.govt.nz/" target="_blank">NCSC</a>;</li>
<li>if such assistance is requested and agreed to, delay any further action until advised by <a title="NCSC" rel="noopener noreferrer" href="https://ncsc.govt.nz/" target="_blank">NCSC</a>;</li>
<li>check connected systems and media including backups for malicious code;&nbsp;</li>
<li>isolate all infected systems and media to prevent reinfection;</li>
<li>change all passwords and key material stored or potentially accessed from compromised systems, including any websites with password controlled access;</li>
<li>advise system users of any relevant aspects of the compromise, including a recommendation to change all passwords on compromised systems;</li>
<li>revoke all session tokens associated with user and/or device;</li>
<li>use up-to-date anti-malware software to remove the malware from the systems or media;</li>
<li>monitor network traffic for malicious activity;</li>
<li>record and report the information security incident and perform any other activities specified in the IRP; and</li>
<li>in certain scenarios rebuilding and reinitialising the system and/or user profile may be required.</li>
</ul>]]></paragraph>
</block>
<block title="Allowing continued attacks"><paragraph
    title="7.3.10.R.01."

    tags="Technical,Incident Management,Information Security Incidents"


><![CDATA[<p>Agencies allowing an attacker to continue an attack against a system in order to seek further information or evidence will need to establish with their business owner(s) and legal advisor(s) whether the actions are breaching any business service level agreements or contractual obligations.</p>]]></paragraph>
<paragraph
    title="7.3.10.C.01."

    tags="Technical,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1294"
><![CDATA[<p>Agencies considering allowing an attacker to continue some actions under controlled conditions for the purpose of seeking further information or evidence MUST<span style="font-size: 10.5pt; line-height: 127%; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: Calibri; color: #212529; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">&nbsp;</span>seek legal advice.</p>]]></paragraph>
</block>
<block title="Integrity of evidence"><paragraph
    title="7.3.11.R.01."

    tags="Technical,Incident Management,Information Security Incidents"


><![CDATA[<p>While gathering evidence it is important to maintain the integrity of the information and the chain of evidence. Even though in most cases an investigation does not directly lead to a police prosecution, it is important that the integrity of evidence such as manual logs, automatic audit trails and intrusion detection tool outputs be protected. This may also include a record of activities taken by the agency to contain the incident.</p>]]></paragraph>
<paragraph
    title="7.3.11.C.01."

    tags="Technical,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1297"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>transfer a copy of raw audit trails and other relevant data onto media for secure archiving, as well as securing manual log records for retention; and</li>
<li>ensure that all personnel involved in the investigation maintain a record of actions undertaken to support the investigation.</li>
</ul>]]></paragraph>
</block>
<block title="Seeking assistance"><paragraph
    title="7.3.12.R.01."

    tags="Technical,Incident Management,Information Security Incidents"


><![CDATA[<p>After detecting an information security incident, organisations need to preserve the evidence prior to taking any remediation steps. For example, snapshots including memory of virtual machines. This greatly increases NCSC’s ability to provide assistance.</p>]]></paragraph>
<paragraph
    title="7.3.12.C.01."

    tags="Technical,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1300"
><![CDATA[<p class="Normal-nonumbering">Agencies SHOULD ensure that any requests for NCSC assistance are made as soon as possible after the information security incident is detected and that no actions which could affect the integrity of the evidence are carried out prior to NCSC’s involvement.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="8. Physical Security"><section title="8.1. Facilities"><subsection title="Objective"><paragraph
    title="8.1.1."


><![CDATA[<p>Physical security measures are applied to facilities in order to protect systems and their infrastructure.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="8.1.2."


><![CDATA[<p>This section covers information on the physical security of facilities. Information on physical security controls for servers and network devices, network infrastructure and IT equipment can be found in the following sections of this chapter.</p>]]></paragraph>
</block>
<block title="Physical security requirements for storing classified information"><paragraph
    title="8.1.3."


><![CDATA[<p>Many of the physical controls in this manual are derived from the <a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR Policy framework - Physical security (PHYSEC)</a>&nbsp;within the <a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">Protective Security Requirements (PSR)</a>. In particular from the minimum standard for security containers, secure rooms or lockable commercial cabinets needed for storing classified information.</p>]]></paragraph>
</block>
<block title="Secure and unsecure areas"><paragraph
    title="8.1.4."


><![CDATA[<p>In the context of this manual a secure area may be a single room or a facility that has security measures in place for the processing of classified information, or may encompass an entire building.</p>]]></paragraph>
</block>
<block title="Physical security certification authorities"><paragraph
    title="8.1.5."


><![CDATA[<p>The certification of an agency’s physical security measures is an essential part of the certification and accreditation process. The authority and responsibility are listed in the table below:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Classification</strong></td>
<td><strong>Authority</strong></td>
<td><strong>Responsibility</strong></td>
</tr>
<tr>
<td><strong>SECRET</strong></td>
<td>CSO</td>
<td>Physical</td>
</tr>
<tr>
<td><strong>TOP SECRET</strong></td>
<td>NZSIS</td>
<td>Physical</td>
</tr>
<tr>
<td><strong>TOP SECRET SCIF</strong></td>
<td>GCSB</td>
<td>
<p>Network Infrastructure</p>
<p>Technical Security</p>
<p>Surveillance Counter Measures</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="8.1.6."


><![CDATA[<p>Top Secret (TS) physical certification should be completed before any Technical inspections and certifications occur.</p>]]></paragraph>
</block>
<block title="Facilities located outside of New Zealand"><paragraph
    title="8.1.7."


><![CDATA[<p>Agencies operating sites located outside of New Zealand can contact GCSB to determine any additional requirements which may exist such as technical surveillance and oversight counter-measures and testing.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="8.1.8."


><![CDATA[<p>High-level information relating to physical security is also contained in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27002:2022</strong></p>
<p class="no-uppercase">&nbsp;</p>
</td>
<td>&nbsp;<strong>Information security, cybersecurity and privacy protection — Information security controls</strong></td>
<td style="text-align: center;">
<p>ISO</p>
<p>&nbsp;</p>
</td>
<td>
<p><a title="ISO/IEC 27002:2022" rel="noopener noreferrer" href="https://www.iso.org/standard/75652.html" target="_blank">https://www.iso.org/standard/75652.html</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="8.1.9."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 100%;">
<tbody>
<tr>
<td style="width: 19.8192%;">
<p><strong>Reference</strong></p>
</td>
<td style="width: 45.029%;">
<p><strong>Title</strong></p>
</td>
<td style="width: 35.117%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 19.8192%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 45.029%;">
<p>GOV2, GOV6, GOV7, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1, PHYSEC2, PHYSEC3 and PHYSEC4</p>
</td>
<td style="width: 35.117%;">
<p><a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank"></a><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<p><a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a><a title="PSR Mandatory Requirements - Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/physical-security/physical-security-mandatory-requirements-2/" target="_blank"></a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Facility physical security"><paragraph
    title="8.1.10.R.01."

    tags="Governance,Physical Security,Facilities"


><![CDATA[<p>The application of defence-in-depth to the protection of systems and infrastructure is enhanced through the use of successive layers of physical security.</p>
<p>Typically the layers of security are:</p>
<ul>
<li>site;</li>
<li>building;</li>
<li>room;</li>
<li>racks;</li>
<li>approved containers;</li>
<li>operational hours; and</li>
<li>staffing levels.</li>
</ul>]]></paragraph>
<paragraph
    title="8.1.10.R.02."

    tags="Governance,Physical Security,Facilities"


><![CDATA[<p>All layers are designed to control and limit access to those with the appropriate authorisation for the site, infrastructure and system. Deployable platforms need to meet physical security certification requirements as with any other system. Physical security certification authorities dealing with deployable platforms may have specific requirements that supersede the requirements of this manual and as such security personnel should contact their appropriate physical security certification authority to seek guidance.</p>]]></paragraph>
<paragraph
    title="8.1.10.C.01."

    tags="Governance,Physical Security,Facilities"


    classification="All Classifications"
    compliance="Must"
    cid="1323"
><![CDATA[<p>Agencies MUST ensure that any facility containing a system or its associated infrastructure, including deployable systems, are certified and accredited in accordance with the <a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>.</p>]]></paragraph>
</block>
<block title="Preventing observation by unauthorised people"><paragraph
    title="8.1.11.R.01."

    tags="Governance,Physical Security,Facilities"


><![CDATA[<p>Agency facilities without sufficient perimeter security are often exposed to the potential for observation through windows or open doors. This is sometimes described as the risk of oversight. Ensuring classified information on desks and computer screens is not visible will assist in reducing this security risk.</p>]]></paragraph>
<paragraph
    title="8.1.11.C.01."

    tags="Governance,Physical Security,Facilities"


    classification="All Classifications"
    compliance="Should"
    cid="1326"
><![CDATA[<p>Agencies SHOULD prevent unauthorised people from observing systems, in particular desks, screens and keyboards.</p>]]></paragraph>
<paragraph
    title="8.1.11.C.02."

    tags="Governance,Physical Security,Facilities"


    classification="All Classifications"
    compliance="Should"
    cid="1327"
><![CDATA[<p>Agencies SHOULD position desks, screens and keyboards away from windows and doorways so that they cannot be overseen by unauthorised persons.  If required, blinds or drapes SHOULD be fixed to the inside of windows, and doors kept closed to avoid oversight.</p>]]></paragraph>
</block>
<block title="Bringing non-agency owned devices into secure areas"><paragraph
    title="8.1.12.R.01."

    tags="Governance,Physical Security,Facilities"


><![CDATA[<p>No non-agency owned devices are to be brought into TOP SECRET areas without their prior approval of the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="8.1.12.C.01."

    tags="Governance,Physical Security,Facilities"


    classification="Top Secret"
    compliance="Must Not"
    cid="1330"
><![CDATA[<p>Agencies MUST NOT permit non-agency owned devices to be brought into TOP SECRET areas without prior approval from the Accreditation Authority.</p>]]></paragraph>
</block>
<block title="Technical Inspection and surveillance counter-measure testing"><paragraph
    title="8.1.13.R.01."

    tags="Governance,Physical Security,Facilities"


><![CDATA[<p>Technical surveillance counter-measure testing is conducted as part of the physical security certification to ensure that facilities do not have any unauthorised listening devices or other surveillance devices installed and that physical security measures are compatible with technical controls. This testing and inspection will normally occur AFTER the physical site accreditation has been completed (in accordance with the <a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>). Further testing may also be necessary after uncleared access to the secure facility, such as contractors or visitors.</p>]]></paragraph>
<paragraph
    title="8.1.13.C.01."

    tags="Governance,Physical Security,Facilities"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="1333"
><![CDATA[<p>Agencies MUST ensure that technical surveillance counter-measure tests are conducted as a part of the physical security certification.</p>]]></paragraph>
<paragraph
    title="8.1.13.C.02."

    tags="Governance,Physical Security,Facilities"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="1334"
><![CDATA[<p>Agencies MUST determine if further technical surveillance counter-measure testing is required, particularly if visitors or contractors have entered secure areas.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="8.2. Servers And Network Devices"><subsection title="Objective"><paragraph
    title="8.2.1."


><![CDATA[<p>Secured server and communications rooms provide appropriate physical security for servers and network devices.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="8.2.2."


><![CDATA[<p>This section covers the physical security of servers and network devices. Information relating to network infrastructure and IT equipment can be found in other sections of this chapter.</p>]]></paragraph>
</block>
<block title="Secured server and communications rooms"><paragraph
    title="8.2.3."


><![CDATA[<p>In order to reduce physical security requirements for information systems infrastructure, other network devices and servers, agencies may choose to certify and accredit the physical security of the site or IT equipment room to the standard specified in the PSR. This has the effect of providing an additional layer of physical security. See <a title="PSR - Physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR - Physical Security</a></p>]]></paragraph>
<paragraph
    title="8.2.4."


><![CDATA[<p>Agencies choosing NOT to certify and accredit the physical security of the site or IT equipment room, must continue to meet the full storage requirements specified in the PSR.&nbsp; See <a title="PSR - Physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR - Physical Security</a>, <a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">PSR - Information Security</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Securing servers and network devices"><paragraph
    title="8.2.5.R.01."

    tags="Governance,Physical Security,Accreditation"


><![CDATA[<p>Security containers for IT infrastructure, network devices or servers situated in an unsecure area must be compliant with the requirements of the <a title="PSR physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>. Installing IT infrastructure, network devices or servers in a secure facility can lower the storage requirements, provided multiple layers of physical security have been implemented, certified and accredited.</p>]]></paragraph>
<paragraph
    title="8.2.5.R.02."

    tags="Governance,Physical Security"


><![CDATA[<p>The establishment of a secure communications room to house IT infrastructure, network devices, and other related equipment will provide a further physical security layer.</p>]]></paragraph>
<paragraph
    title="8.2.5.C.01."

    tags="Governance,Physical Security"


    classification="All Classifications"
    compliance="Must"
    cid="1349"
><![CDATA[<p>Agencies MUST ensure that servers and network devices are secured within cabinets as outlined in <a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR Policy Framework - Physical security</a> and&nbsp;supporting documentation.</p>]]></paragraph>
</block>
<block title="Securing server rooms, communications rooms and security containers"><paragraph
    title="8.2.6.R.01."

    tags="Governance,Physical Security"


><![CDATA[<p>If personnel decide to leave server rooms, communications rooms or security containers with keys in locks, unlocked or with security functions disabled it negates the purpose of providing security in the first place. Such activities will compromise the security efforts of the agencies and should not be permitted by the agency.</p>]]></paragraph>
<paragraph
    title="8.2.6.C.01."

    tags="Governance,Physical Security"


    classification="All Classifications"
    compliance="Must"
    cid="1353"
><![CDATA[<p>Agencies MUST ensure that keys or equivalent access mechanisms to server rooms, communications rooms and security containers are appropriately controlled.</p>]]></paragraph>
<paragraph
    title="8.2.6.C.02."

    tags="Governance,Physical Security"


    classification="All Classifications"
    compliance="Must Not"
    cid="1354"
><![CDATA[<p>Agencies MUST NOT leave server rooms, communications rooms or security containers in an unsecured state unless the server room is occupied by authorised personnel.</p>]]></paragraph>
</block>
<block title="Administrative measures - Site security plans"><paragraph
    title="8.2.7.R.01."

    tags="Governance,Physical Security,Site Plan"


><![CDATA[<p>Site security plans (SitePlan), the physical security equivalent of the SSP and SOPs for systems, are used to document all aspects of physical security for systems. Formally documenting this information ensures that standards, controls and procedures can easily be reviewed by security personnel.</p>]]></paragraph>
<paragraph
    title="8.2.7.C.01."

    tags="Governance,Physical Security,Site Plan"


    classification="All Classifications"
    compliance="Must"
    cid="1357"
><![CDATA[<p>Agencies MUST develop a Site Security Plan (SitePlan) for each server and communications room. Information to be covered includes, but is not limited to:</p><ul>
<li>a summary of the security risk review for the facility the server or communications room is located in;</li>
<li>roles and responsibilities of facility and security personnel;</li>
<li>the administration, operation and maintenance of the electronic access control system or security alarm system;</li>
<li>key management, the enrolment and removal of system users and issuing of personal identification number codes and passwords;</li>
<li>personnel security clearances, security awareness training and regular briefings;</li>
<li>regular inspection of the generated audit trails and logs;</li>
<li>end of day checks and lockup;</li>
<li>reporting of information security incidents; and</li>
<li>what activities to undertake in response to security alarms.</li>
</ul>]]></paragraph>
</block>
<block title="No-lone-zones"><paragraph
    title="8.2.8.R.01."

    tags="Governance,Physical Security"


><![CDATA[<p>Areas containing particularly sensitive materials or IT equipment can be provided with additional security through the use of a designated no-lone-zone. The aim of this designation is to enforce two-person integrity, where all actions are witnessed by at least one other person.</p>]]></paragraph>
<paragraph
    title="8.2.8.C.01."

    tags="Governance,Physical Security"


    classification="All Classifications"
    compliance="Must"
    cid="1360"
><![CDATA[<p>Agencies operating no-lone-zones MUST suitably signpost the area and have all entry and exit points appropriately secured.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="8.3. Network Infrastructure"><subsection title="Objective"><paragraph
    title="8.3.1."


><![CDATA[<p>Network infrastructure is protected by secure facilities and the use of encryption technologies.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="8.3.2."


><![CDATA[<p>This section covers information relating to the physical security of network infrastructure. Information relating to servers, network devices and IT equipment can be found in other sections of this chapter. Additionally, information on using encryption for infrastructure in unsecure areas can be found in <a title="Cryptographic Fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-15746">Section 17.1 - Cryptographic Fundamentals.</a></p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Network infrastructure in secure areas"><paragraph
    title="8.3.3.R.01."

    tags="Network Security,Technical,Physical Security,Network Infrastructure"


><![CDATA[<p>Network infrastructure is considered to process information being communicated across it and as such needs to meet the minimum physical security requirements for processing classified information as specified in the <a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR Policy Framework - Physical security</a>, and supporting document.</p>]]></paragraph>
<paragraph
    title="8.3.3.R.02."

    tags="Encryption,Network Security,Technical,Physical Security,Network Infrastructure"


><![CDATA[<p>The physical security requirements for network infrastructure can be lowered if encryption is being applied to classified information communicated over the infrastructure (i.e. data in transit encryption). Note this does NOT change the classification of the data itself, only the physical protection requirements.</p>]]></paragraph>
<paragraph
    title="8.3.3.R.03."

    tags="Network Security,Technical,Physical Security,Network Infrastructure"


><![CDATA[<p>It is important to note that physical controls do not provide any protection against malicious software or other malicious entities that may be residing on or have access to the system.</p>]]></paragraph>
<paragraph
    title="8.3.3.R.04."

    tags="Network Security,Technical,Physical Security,Network Infrastructure"


><![CDATA[<p>If classified information being communicated over the infrastructure is not encrypted the malicious entry can capture, corrupt or modify the traffic to assist in furthering any attempts to exploit the network and the information being communicated across it.</p>]]></paragraph>
<paragraph
    title="8.3.3.C.01."

    tags="Network Security,Technical,Physical Security,Network Infrastructure"


    classification="All Classifications"
    compliance="Must"
    cid="1373"
><![CDATA[<p>Agencies MUST certify the physical security of facilities containing network infrastructure to the highest classification of information being communicated over the network infrastructure.</p>]]></paragraph>
<paragraph
    title="8.3.3.C.02."

    tags="Cryptography,Network Security,Technical,Physical Security,Network Infrastructure"


    classification="All Classifications"
    compliance="Should"
    cid="1374"
><![CDATA[<p>Agencies communicating classified information over infrastructure in secure areas SHOULD encrypt their information with at least an Approved Cryptographic Protocol. <a title="Approved cryptographic protocols" href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">See Section 17.3 – Approved Cryptographic Protocols</a>.</p>]]></paragraph>
</block>
<block title="Protecting network infrastructure"><paragraph
    title="8.3.4.R.01."

    tags="Network Security,Technical,Physical Security,Network Infrastructure"


><![CDATA[<p>In order to prevent tampering with patch panels, fibre distribution panels and structured wiring, any such enclosures need to be placed within at least lockable commercial cabinets. Furthermore, keys for such cabinets should not be remain in locks as this defeats the purpose of using lockable commercial cabinets in the first place.</p>]]></paragraph>
<paragraph
    title="8.3.4.C.01."

    tags="Network Security,Technical,Physical Security,Network Infrastructure"


    classification="Top Secret"
    compliance="Must"
    cid="1377"
><![CDATA[<p>Agencies MUST locate patch panels, fibre distribution panels and structured wiring enclosures within at least lockable commercial cabinets.</p>]]></paragraph>
<paragraph
    title="8.3.4.C.02."

    tags="Network Security,Technical,Physical Security,Network Infrastructure"


    classification="All Classifications"
    compliance="Should"
    cid="1378"
><![CDATA[<p>Agencies SHOULD locate patch panels, fibre distribution panels and structured wiring enclosures within at least lockable commercial cabinets.</p>]]></paragraph>
</block>
<block title="Network infrastructure in unsecure areas"><paragraph
    title="8.3.5.R.01."

    tags="Encryption,Network Security,Technical,Physical Security,Network Infrastructure"


><![CDATA[<p>As agencies lose control over classified information when it is communicated over unsecure public network infrastructure or over infrastructure in unsecure areas they MUST ensure that it is encrypted to a sufficient level that if it was captured that it would be sufficiently difficult to determine the original information from the encrypted information.</p>]]></paragraph>
<paragraph
    title="8.3.5.R.02."

    tags="Encryption,Network Security,Technical,Physical Security,Network Infrastructure"


><![CDATA[<p>Encryption does not change the class level of the information itself but allows reduced handling requirements to be applied.</p>]]></paragraph>
<paragraph
    title="8.3.5.C.01."

    tags="Encryption,Network Security,Technical,Physical Security,Network Infrastructure"


    classification="All Classifications"
    compliance="Must"
    cid="1382"
><![CDATA[<p>Agencies communicating classified information over public network infrastructure or over infrastructure in unsecure areas MUST use encryption to lower the handling instructions to be equivalent to those for unclassified networks.<br><br></p>]]></paragraph>
</block>
</subsection>
</section>
<section title="8.4. IT Equipment"><subsection title="Objective"><paragraph
    title="8.4.1."


><![CDATA[<p>IT equipment is secured outside of normal working hours, is non-operational or when work areas are unoccupied.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="8.4.2."


><![CDATA[<p>This section covers information relating to the physical security of IT equipment containing media. This includes but is not limited to workstations, printers, photocopiers, scanners and multi-function devices (MFDs).</p>]]></paragraph>
<paragraph
    title="8.4.3."


><![CDATA[<p>Additional information relating to IT equipment and media can be found in the following chapters and sections of this manual:</p><ul>
<li><a title="Fax machines, Multifunction Devices and Network Printers" href="http://nzism.gcsb.govt.nz/ism-document#Section-13999">Section 11.2 - Fax Machines, Multifunction Devices and Network Printers</a>;</li>
<li><a title="Product security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 - Product Security</a>; and</li>
<li><a title="Decommissioning and Disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 – Decommissioning and Disposal</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Handling IT equipment containing media"><paragraph
    title="8.4.4."


><![CDATA[<p>During non-operational hours agencies need to store media containing classified information that resides within IT equipment in accordance with the requirements of the <a title="PSR Physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>. Agencies can comply with this requirement by undertaking one of the following processes:</p>
<ul>
<li>ensuring IT equipment always reside in an appropriate class of secure room;</li>
<li>storing IT equipment during non-operational hours in an appropriate class of security container or lockable commercial cabinet;</li>
<li>using IT equipment with removable non-volatile media which is stored during non-operational hours in an appropriate class of security container or lockable commercial cabinet as well as securing its volatile media;</li>
<li>using IT equipment without non-volatile media as well as securing its volatile media;</li>
<li>using an encryption product to reduce the physical storage requirements of the non-volatile media as well as securing its volatile media; or</li>
<li>configuring IT equipment to prevent the storage of classified information on the non-volatile media when in use and enforcing scrubbing of temporary data at logoff or shutdown as well as securing its volatile media.</li>
</ul>]]></paragraph>
<paragraph
    title="8.4.5."


><![CDATA[<p>The intent of using cryptography or preventing the storage of classified information on non-volatile media is to enable agencies to treat the media within IT equipment in accordance with the storage requirements of a lower classification, as specified in the <a title="PSR Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>, during non-operational hours. Temporary data should be deleted at log off or shut down and volatile media secured.</p>]]></paragraph>
<paragraph
    title="8.4.6."


><![CDATA[<p>As the process of using cryptography and preventing the storage of classified information on non-volatile media does not constitute the sanitisation and reclassification of the media, the media retains its classification for the purposes of reuse, reclassification, declassification, sanitisation, destruction and disposal requirements as specified in this manual.</p>]]></paragraph>
</block>
<block title="IT equipment using hybrid hard drives or solid state drives"><paragraph
    title="8.4.7."


><![CDATA[<p>The process of preventing the storage of classified information on non-volatile media, and enforcing deletion of temporary data at logoff or shutdown, is NOT approved as a method of lowering the storage requirements, when hybrid hard drives or solid state drives are used.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Accounting for IT equipment"><paragraph
    title="8.4.8.R.01."

    tags="Governance,IT Equipment,Media Management,Physical Security"


><![CDATA[<p>Ensuring that IT equipment containing media is accounted for by using asset registers, equipment registers, operational &amp; configuration records and regular audits will assist in preventing loss or theft, or in the cases of loss or theft, alerting appropriate authorities to its loss or theft.</p>]]></paragraph>
<paragraph
    title="8.4.8.R.02."

    tags="Governance,IT Equipment,Media Management,Physical Security"


><![CDATA[<p>Asset registers may not provide a complete record as financial limits may result in smaller value items not being recorded. In such cases other registers and operational information can be utilised to assist in building a more complete record.</p>]]></paragraph>
<paragraph
    title="8.4.8.C.01."

    tags="Governance,IT Equipment,Media Management,Physical Security"


    classification="All Classifications"
    compliance="Must"
    cid="1400"
><![CDATA[<p>Agencies MUST account for all IT equipment containing media.</p>]]></paragraph>
</block>
<block title="Processing requirements"><paragraph
    title="8.4.9.R.01."

    tags="Governance,IT Equipment,Classifying Media,Media Management,Physical Security,Certification"


><![CDATA[<p>As the media within IT equipment takes on the classification of the information it is processing, the area that it is used within needs to be certified to a level that is appropriate for the classification of that information.</p>]]></paragraph>
<paragraph
    title="8.4.9.C.01."

    tags="Governance,IT Equipment,Media Management,Physical Security,Certification,Facilities"


    classification="All Classifications"
    compliance="Must"
    cid="1407"
><![CDATA[<p>Agencies MUST certify the physical security of facilities containing IT equipment to the highest classification of information being processed, stored or communicated by the equipment within the facilities.</p>]]></paragraph>
</block>
<block title="Storage requirements"><paragraph
    title="8.4.10.R.01."

    tags="Governance,IT Equipment,Media Management,Physical Security,Certification"


><![CDATA[<p>The <a title="PSR Physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a> states that either Class C, B or A secure rooms or Class C, B or A security containers or lockable commercial cabinets can be used to meet physical security requirements for the storage of IT equipment containing media. The class of secure room or security container will depend on the physical security certification of the surrounding area and the classification of the information.</p>]]></paragraph>
<paragraph
    title="8.4.10.C.01."

    tags="Governance,IT Equipment,Media Management,Physical Security,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="1403"
><![CDATA[<p>Agencies MUST ensure that when secure areas are non-operational or when work areas are unoccupied IT equipment with media is secured in accordance with the minimum physical security requirements for storing classified information as specified in the <a title="PSR Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR Policy Framework - Physical security</a> and&nbsp;supporting documents.</p>]]></paragraph>
</block>
<block title="Securing non-volatile media for storage"><paragraph
    title="8.4.11.R.01."

    tags="Governance,Media Handling,Media Management,Physical Security"


><![CDATA[<p>The use of techniques to prevent the storage of classified information on non-volatile media and processes to delete temporary data at logoff or shutdown may sound secure but there is no guarantee that they will always work effectively or will not be bypassed in unexpected circumstances such as a loss of power. As such, agencies need to consider these risks when implementing such a solution.</p>]]></paragraph>
<paragraph
    title="8.4.11.C.01."

    tags="Governance,IT Equipment,Media Handling,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="1409"
><![CDATA[<p>Agencies choosing to prevent the storage of classified information on non-volatile media and enforcing scrubbing of temporary data at logoff or shutdown SHOULD:</p><ul>
<li>assess the security risks associated with such a decision; and</li>
<li>specify the processes and conditions for their application within the system’s SSP.</li>
</ul><p> </p>]]></paragraph>
</block>
<block title="Securing volatile media for storage"><paragraph
    title="8.4.12.R.01."

    tags="Governance,IT Equipment,Media Handling,Physical Security"


><![CDATA[<p>If agencies need to conduct a security risk assessment as part of the procedure for storing IT equipment containing media during non-operation hours, they should consider security risks such as:</p><ul>
<li>an attacker gaining access to the IT equipment immediately after power is removed and accessing the contents of volatile media to recover encryption keys or parts thereof. This is sometimes described as a data remanence attack;</li>
<li>extreme environmental conditions causing data to remain in volatile media for extended periods after the removal of power; and</li>
<li>the physical security of the locations in which the IT equipment will reside.</li>
</ul>]]></paragraph>
<paragraph
    title="8.4.12.C.01."

    tags="Governance,IT Equipment,Media Handling,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="1412"
><![CDATA[<p>Agencies securing volatile media for IT equipment during non-operational hours SHOULD:</p><ul>
<li>disconnect power from the equipment the media resides within;</li>
<li>assess the security risks if not sanitising the media; and</li>
<li>specify any additional processes and controls that will be applied within the system’s SSP.</li>
</ul>]]></paragraph>
</block>
<block title="Encrypting media within IT equipment"><paragraph
    title="8.4.13.R.01."

    tags="Encryption,Governance,IT Equipment,Media Handling,Physical Security"


><![CDATA[<p>Current industry good practice is to encrypt all media within IT equipment. Newer operating systems provide this functionality and older operating systems can be supported with the use of open source or proprietary applications.</p>]]></paragraph>
<paragraph
    title="8.4.13.C.01."

    tags="Approved Cryptographic Algorithms,Encryption,IT Equipment,Technical,Media Handling,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="1415"
><![CDATA[<p>Agencies SHOULD encrypt media within IT equipment with an Approved Cryptographic Algorithm. See <a title="Approved Cryptographic Algorithms" href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">Section 17.2 - Approved Cryptographic Algorithms</a>.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="8.5. Tamper Evident Seals"><subsection title="Objective"><paragraph
    title="8.5.1."


><![CDATA[<p>Tamper evident seals and associated auditing processes identify attempts to bypass the physical security of systems and their infrastructure.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="8.5.2."


><![CDATA[<p>This section covers information on tamper evident seals that can be applied to assets.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Recording seal usage"><paragraph
    title="8.5.3.R.01."

    tags="Governance,Physical Security"


><![CDATA[<p>Recording information about seals in a register and on which asset they are used assists in reducing the security risk that seals could be substituted without security personnel being aware of the change.</p>]]></paragraph>
<paragraph
    title="8.5.3.C.01."

    tags="Governance,Physical Security"


    classification="Top Secret"
    compliance="Must"
    cid="1425"
><![CDATA[<p>Agencies MUST record the usage of seals in a register that is appropriately secured.</p>]]></paragraph>
<paragraph
    title="8.5.3.C.02."

    tags="Governance,Physical Security"


    classification="Top Secret"
    compliance="Must"
    cid="1426"
><![CDATA[<p>Agencies MUST record in a register, information on:</p><ul>
<li>issue and usage details of seals and associated tools;</li>
<li>serial numbers of all seals purchased; and</li>
<li>the location or asset on which each seal is used.</li>
</ul>]]></paragraph>
<paragraph
    title="8.5.3.C.03."

    tags="Governance,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="1427"
><![CDATA[<p>Agencies SHOULD record the usage of seals in a register that is appropriately secured.</p>]]></paragraph>
<paragraph
    title="8.5.3.C.04."

    tags="Governance,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="1428"
><![CDATA[<p>Agencies SHOULD record in a register information on:</p><ul>
<li>issue and usage details of seals and associated tools;</li>
<li>serial numbers of all seals purchased; and</li>
<li>the location or asset on which each seal is used.</li>
</ul>]]></paragraph>
</block>
<block title="Purchasing seals"><paragraph
    title="8.5.4.R.01."

    tags="Governance,Physical Security"


><![CDATA[<p>Using uniquely numbered seals ensures that a seal can be uniquely mapped to an asset. This assists security personnel in reducing the security risk that seals could be replaced without anyone being aware of the change.</p>]]></paragraph>
<paragraph
    title="8.5.4.C.01."

    tags="Governance,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="1431"
><![CDATA[<p>Agencies SHOULD consult with the seal manufacturer to ensure that, if available, any purchased seals and sealing tools display a unique identifier or image appropriate to the agency.</p>]]></paragraph>
<paragraph
    title="8.5.4.C.02."

    tags="Governance,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="1432"
><![CDATA[<p>Seals and any seal application tools SHOULD be secured when not in use.</p>]]></paragraph>
<paragraph
    title="8.5.4.C.03."

    tags="Governance,Physical Security"


    classification="All Classifications"
    compliance="Should Not"
    cid="1433"
><![CDATA[<p>Agencies SHOULD NOT allow contractors to independently purchase seals and associated tools on behalf of the government.</p>]]></paragraph>
</block>
<block title="Reviewing seal usage"><paragraph
    title="8.5.5.R.01."

    tags="Governance,Physical Security"


><![CDATA[<p>Users of assets with seals should be encouraged to randomly check the integrity of the seals and to report any concerns to security personnel. In addition, conducting at least annual reviews will allow for detection of any tampering to an asset and ensure that the correct seal is located on the correct asset.</p>]]></paragraph>
<paragraph
    title="8.5.5.C.01."

    tags="Governance,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="1436"
><![CDATA[<p>Agencies SHOULD review seals for differences with a register at least annually. At the same time seals SHOULD be examined for any evidence of tampering.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="9. Personnel Security"><section title="9.1. Information Security Awareness and Training"><subsection title="Objective"><paragraph
    title="9.1.1."


><![CDATA[<p>A security culture is fostered through induction training and ongoing security education tailored to roles, responsibilities, changing threat environment and sensitivity of information, systems and operations.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="9.1.2."


><![CDATA[<p>This section covers information relating specifically to information security awareness and training.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="9.1.3."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td>
<p><strong>Reference</strong></p>
</td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><br><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a> &nbsp;</p>
<a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Information security awareness and training responsibility"><paragraph
    title="9.1.4.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>Agency management is <span style="text-decoration: underline;">responsible</span> for ensuring that an appropriate information security awareness and a training program is provided for all personnel. Without management support, security personnel might not have sufficient resources to facilitate awareness and training for other personnel.</p>]]></paragraph>
<paragraph
    title="9.1.4.R.02."

    tags="Governance,Personnel Security"


><![CDATA[<p>Awareness and knowledge degrades over time without ongoing refresher training and updates. Providing ongoing information security awareness and training will assist in keeping personnel aware of issues and their responsibilities.</p>]]></paragraph>
<paragraph
    title="9.1.4.R.03."

    tags="Governance,Personnel Security"


><![CDATA[<p>Methods that can be used to continually promote awareness include logon banners, system access forms and departmental bulletins and memoranda.</p>]]></paragraph>
<paragraph
    title="9.1.4.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Must"
    cid="1449"
><![CDATA[<p>Agency management MUST ensure that all personnel who have access to a system have sufficient training and ongoing information security awareness.</p>]]></paragraph>
</block>
<block title="Information security awareness and training"><paragraph
    title="9.1.5.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>Information security awareness and training programs are designed to help system users:</p><ul>
<li>become familiar with their roles and responsibilities;</li>
<li>understand any legislative or regulatory mandates and requirements;</li>
<li>understand any national or agency policy mandates and requirements;</li>
<li>understand and support security requirements; </li>
<li>assist in maintaining security; and</li>
<li>learn how to fulfil their security responsibilities.</li>
</ul>]]></paragraph>
<paragraph
    title="9.1.5.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Must"
    cid="1452"
><![CDATA[<p>Agencies MUST provide ongoing information security awareness and a training programme for personnel on topics such as responsibilities, legislation and regulation, consequences of non-compliance with information security policies and procedures, and potential security risks and counter-measures.</p>]]></paragraph>
<paragraph
    title="9.1.5.C.02."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Must"
    cid="1453"
><![CDATA[<p>Agencies MUST provide information security awareness training as part of their employee induction programmes.</p>]]></paragraph>
</block>
<block title="Degree and content of information security awareness and training"><paragraph
    title="9.1.6.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>The detail, content and coverage of information security awareness and training will depend on the objectives of the organisation. Personnel with responsibilities beyond that of a general user should have tailored training to meet their needs.</p>]]></paragraph>
<paragraph
    title="9.1.6.R.02."

    tags="Governance,Personnel Security"


><![CDATA[<p>As part of the guidance provided to system users, there should be sufficient emphasis placed on the activities that are NOT allowed on systems. The minimum list of content will also ensure that personnel are sufficiently exposed to issues that could cause an information security incident through lack of awareness or through lack of knowledge.</p>]]></paragraph>
<paragraph
    title="9.1.6.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should"
    cid="1457"
><![CDATA[<p>Agencies SHOULD align the detail, content and coverage of information security awareness and training programmes to system user responsibilities.</p>]]></paragraph>
<paragraph
    title="9.1.6.C.02."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should"
    cid="1458"
><![CDATA[<p>Agencies SHOULD ensure that information security awareness and training includes information on:</p><ul>
<li>the purpose of the training or awareness program;</li>
<li>any legislative or regulatory mandates and requirements;</li>
<li>any national or agency policy mandates and requirements;</li>
<li>agency security appointments and contacts;</li>
<li>the legitimate use of system accounts, software and classified information;</li>
<li>the security of accounts, including shared passwords;</li>
<li>authorisation requirements for applications, databases and data;</li>
<li>the security risks associated with non-agency systems, particularly the Internet;</li>
<li>reporting any suspected compromises or anomalies;</li>
<li>reporting requirements for information security incidents, suspected compromises or anomalies;</li>
<li>classifying, marking, controlling, storing and sanitising media;</li>
<li>protecting workstations from unauthorised access;</li>
<li>informing the support section when access to a system is no longer needed; </li>
<li>observing rules and regulations governing the secure operation and authorised use of systems; and</li>
<li>supporting documentation such as SOPs and user guides.</li>
</ul>]]></paragraph>
<paragraph
    title="9.1.6.C.03."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should"
    cid="1459"
><![CDATA[<p>Agencies SHOULD ensure that information security awareness and training includes advice to system users not to attempt to:</p><ul>
<li>tamper with the system;</li>
<li>bypass, strain or test information security mechanisms;</li>
<li>introduce or use unauthorised IT equipment or software on a system;</li>
<li>replace items such as keyboards, pointing devices and other peripherals with personal equipment;</li>
<li>assume the roles and privileges of others;</li>
<li>attempt to gain access to classified information for which they have no authorisation; or</li>
<li>relocate equipment without proper authorisation.</li>
</ul>]]></paragraph>
</block>
<block title="System familiarisation training"><paragraph
    title="9.1.7.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>A TOP SECRET system needs increased awareness by personnel. Ensuring familiarisation with information security policies and procedures, the secure operation of the system and basic information security training, will provide them with specific knowledge relating to these types of systems.</p>]]></paragraph>
<paragraph
    title="9.1.7.C.01."

    tags="Governance,Personnel Security"


    classification="Top Secret"
    compliance="Must"
    cid="1462"
><![CDATA[<p>Agencies MUST provide all system users with familiarisation training on the information security policies and procedures and the secure operation of the system before being granted unsupervised access to the system.</p>]]></paragraph>
</block>
<block title="Disclosure of information while on courses"><paragraph
    title="9.1.8.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>Government personnel attending courses with non-government personnel may not be aware of the consequences of disclosing information relating to the security of their agency’s systems. Raising awareness of such consequences in personnel will assist in preventing disclosures that could lead to a targeted attack being launched against an agency’s systems.</p>]]></paragraph>
<paragraph
    title="9.1.8.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should"
    cid="1465"
><![CDATA[<p>Agencies SHOULD advise personnel attending courses along with non-government personnel not to disclose any details that could be used to compromise agency security.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="9.2. Authorisations, Security Clearances And Briefings"><subsection title="Objective"><paragraph
    title="9.2.1."


><![CDATA[<p>Only appropriately authorised, cleared and briefed personnel are allowed access to systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="9.2.2."


><![CDATA[<p>This section covers information relating to the authorisations, security clearances and briefings required by personnel to access systems. Information on the technical implementation of access controls for systems can be found in Section 16.2 - System Access.</p>]]></paragraph>
</block>
<block title="Security clearances – New Zealand and foreign"><paragraph
    title="9.2.3."


><![CDATA[<p>Where this manual refers to security clearances, the reference applies to a National Security Clearance granted by a New Zealand government agency. Foreign nationals may be granted a National Security Clearance if <strong>identified</strong> risks can be mitigated. Refer to <a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">PSR&nbsp;Personnel Security</a> for more information.&nbsp;</p>]]></paragraph>
<paragraph
    title="9.2.4."


><![CDATA[<p>Such security clearances are required for many roles worldwide by government, commercial and other organisations where there is a requirement for assurance of the ability of an individual and organisation to securely access, manage, and protect confidential, sensitive or classified information.  Not all security clearances will grant the same level or types of access.</p>]]></paragraph>
<paragraph
    title="9.2.5."


><![CDATA[<p>The process invariably includes background or security checks on the individual, a briefing and then signing documents, in which the individual formally acknowledges the legal requirements to not share such information with unauthorised individuals or organisations.  This will include a requirement not to inappropriately remove, store or access classified documents or other sensitive information.</p>]]></paragraph>
<paragraph
    title="9.2.6."


><![CDATA[<p>In New Zealand there are two security authorisation processes:</p><ol style="list-style-type: lower-roman;">
<li>for information classified CONFIDENTIAL and above; and</li>
<li>for information classified RESTRICTED and below.</li>
</ol>]]></paragraph>
<paragraph
    title="9.2.7."


><![CDATA[<p>For information classified&nbsp;<strong>CONFIDENTIAL and above</strong>&nbsp;a formal vetting process is required to gain a <strong>National Security Clearance</strong>.&nbsp; Refer to the&nbsp;<a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz" target="_blank">PSR</a>&nbsp;for more detail of vetting requirements and the process for applying for National Security Clearance.</p>]]></paragraph>
<paragraph
    title="9.2.8."


><![CDATA[<p>For information classified <strong>RESTRICTED and below</strong>, the authorisations, security checks and supporting briefings form part of the Agency’s recruitment and induction processes for all staff.  These authorisations, security checks and briefings are evidenced by a formal record of approval of the authorisation, the requirement for a security check and a signed acknowledgement from the individual staff member. The level of detail for the agency's process will depend on the role, tasks and position of the agency employee.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR References"><paragraph
    title="9.2.9."


><![CDATA[<p>Additional policy and information on granting and maintaining security clearances can be found in:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td>
<p>GOV4, INFOSEC1, PERSEC1, PERSEC2, PERSEC3, PERSEC4, PHYSEC1 and PHYSEC2</p>
</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<p><a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Documenting authorisations, security clearance and briefing requirements"><paragraph
    title="9.2.10.R.01."

    tags="Governance,Information Security Documentation,Personnel Security"


><![CDATA[<p>Ensuring that the requirements for access to a system are documented and agreed upon will assist in determining if system users have appropriate authorisations, security clearances and need-to-know to access the system.</p>]]></paragraph>
<paragraph
    title="9.2.10.R.02."

    tags="Governance,Information Security Documentation,Physical Security"


><![CDATA[<p>Types of system users for which access requirements will need to be documented include general users, privileged users, system administrators, contractors and visitors.</p>]]></paragraph>
<paragraph
    title="9.2.10.C.01."

    tags="Governance,Information Security Documentation,Personnel Security"


    classification="All Classifications"
    compliance="Must"
    cid="1480"
><![CDATA[<p>Agencies MUST specify in the System Security Plan (SSP) any authorisations, security clearances and briefings necessary for system access.</p>]]></paragraph>
</block>
<block title="Authorisation and system access"><paragraph
    title="9.2.11.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>Personnel seeking access to a system will need to have a genuine business requirement to access the system as verified by their supervisor or manager. Once a requirement to access a system is established, the system user should be given only the privileges that they need to undertake their duties. Providing all system users with privileged access when there is no such requirement can cause significant security vulnerabilities in a system.</p>]]></paragraph>
<paragraph
    title="9.2.11.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="Top Secret"
    compliance="Must"
    cid="1483"
><![CDATA[<p>Agencies MUST:</p><ul>
<li>limit system access on a need-to-know/need-to-access basis;</li>
<li>provide system users with the least amount of privileges needed to undertake their duties; and</li>
<li>have any requests for access to a system authorised by the supervisor or manager of the system user.</li>
</ul>]]></paragraph>
<paragraph
    title="9.2.11.C.02."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Should"
    cid="1484"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>limit system access on a need-to-know/need-to-access basis;</li>
<li>provide system users with the least amount of privileges needed to undertake their duties;</li>
<li>have any requests for access to a system authorised by the supervisor or manager of the system user; and</li>
<li>ensure a formal acknowledgement of the security briefing is obtained and recorded.</li>
</ul>]]></paragraph>
</block>
<block title="Recording authorisation for personnel to access systems"><paragraph
    title="9.2.12.R.01."

    tags="Governance,Information Security Documentation,Personnel Security,System Access"


><![CDATA[<p>In many cases, the requirement to maintain a secure record of all personnel authorised to access a system, their user identification, who provided the authorisation and when the authorisation was granted, can be met by retaining a completed system account request form signed by the supervisor or manager of the system user.</p>]]></paragraph>
<paragraph
    title="9.2.12.C.01."

    tags="Governance,Information Security Documentation,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Should"
    cid="1487"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>maintain a secure record of:
<ul>
<li>all authorised system users;</li>
<li>their user identification;</li>
<li>why access is required;</li>
<li>role and privilege level,</li>
<li>who provided the authorisation to access the system;</li>
<li>when the authorisation was granted; and</li>
</ul>
</li>
<li>keep a copy of&nbsp;the acknowledgement signed by the individual granted a clearance; and</li>
<li>maintain the record, for the life of the system or information to which access is granted, or the length of employment, whichever is the longer.</li>
</ul>]]></paragraph>
</block>
<block title="Security clearance for system access"><paragraph
    title="9.2.13.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>Information classified as CONFIDENTIAL and above requires personnel to have been granted a formal security clearance before access is granted. Refer to the <a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">PSR Policy Framework - Personnel Security</a>.</p>]]></paragraph>
<paragraph
    title="9.2.13.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="Confidential, Top Secret, Secret"
    compliance="Must Not"
    cid="1490"
><![CDATA[<p>System users MUST NOT be granted access to systems or information classified CONFIDENTIAL or above unless vetting procedures have been completed and formal security clearance granted.</p>]]></paragraph>
<paragraph
    title="9.2.13.C.02."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1491"
><![CDATA[<p>All system users MUST:</p>
<ul>
<li>hold a security clearance or other authorisation appropriate for the system classification; or</li>
<li>have been granted access in accordance with the requirements in the <a title="PSR Personnel security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">PSR</a> for emergency access.</li>
</ul>]]></paragraph>
</block>
<block title="System access briefings"><paragraph
    title="9.2.14.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>Some systems process endorsed or compartmented information. As such, unique briefings may exist that system users need to receive before being granted access to the system. All system users will require a briefing on their responsibilities on access to and use of the system to which they have been granted access to avoid inadvertent errors and security breaches. Specialised system training may also be required.</p>]]></paragraph>
<paragraph
    title="9.2.14.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1494"
><![CDATA[<p>All system users MUST have received any necessary briefings before being granted access to compartmented or endorsed information or systems.</p>]]></paragraph>
</block>
<block title="Access by foreign nationals to NZEO systems"><paragraph
    title="9.2.15.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>NZEO information is restricted to New Zealand nationals.</p>]]></paragraph>
<paragraph
    title="9.2.15.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must Not"
    cid="1497"
><![CDATA[<p>Where systems process, store or communicate unprotected NZEO information, agencies MUST NOT allow foreign nationals, including seconded foreign nationals, to have access to the system.</p>]]></paragraph>
<paragraph
    title="9.2.15.C.02."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must Not"
    cid="1498"
><![CDATA[<p>Where agencies protect NZEO information on a system by implementing controls to ensure that NZEO information is not passed to, or made accessible to, foreign nationals, agencies MUST NOT allow foreign nationals, including seconded foreign nationals, to have access to the system.</p>]]></paragraph>
</block>
<block title="Access by foreign nationals to New Zealand systems"><paragraph
    title="9.2.16.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>When information from foreign nations is entrusted to the New Zealand Government, care needs to be taken to ensure that foreign nationals do not have access to such information unless it has also been released to their country.</p>]]></paragraph>
<paragraph
    title="9.2.16.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must Not"
    cid="1501"
><![CDATA[<p>Where systems process, store or communicate classified information with nationality releasability markings, agencies MUST NOT allow foreign nationals, including seconded foreign nationals, to have access to such information that is not marked as releasable to their nation.</p>]]></paragraph>
</block>
<block title="Granting limited higher access"><paragraph
    title="9.2.17.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>Under exceptional circumstances, temporary access to systems classified RESTRICTED and below may be granted.</p>]]></paragraph>
<paragraph
    title="9.2.17.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="Confidential, Top Secret, Secret"
    compliance="Must Not"
    cid="1504"
><![CDATA[<p>Agencies MUST NOT permit limited higher access for systems and information classified CONFIDENTIAL or above.</p>]]></paragraph>
<paragraph
    title="9.2.17.C.02."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1505"
><![CDATA[<p>Agencies granting <strong>limited</strong> higher access to information or systems MUST ensure that:</p><ul>
<li>the requirement to grant limited higher access is temporary in nature and is an exception rather than the norm;</li>
<li>an ITSM has recommended the limited higher access;</li>
<li>a cessation date for limited higher access has been set;</li>
<li>the access period does not exceed two months;</li>
<li>the limited higher access is granted on an occasional NOT non-ongoing basis;</li>
<li>the system user is not granted privileged access to the system;</li>
<li>the system user’s access is formally documented; and</li>
<li>the system user’s access is approved by the CISO.</li>
</ul>]]></paragraph>
</block>
<block title="Controlling limited higher access"><paragraph
    title="9.2.18.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>When personnel are granted access to a system under the provisions of limited higher access they need to be closely supervised or have their access controlled such that they have access only to that information they require to undertake their duties.</p>]]></paragraph>
<paragraph
    title="9.2.18.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1508"
><![CDATA[<p>Agencies granting <strong>limited</strong> higher access to a system MUST ensure that:</p><ul>
<li>the approval for access is formally acknowledged and recorded; and either
<ul>
<li>effective controls are in place to restrict access <strong>only</strong> to classified information that is necessary to undertake the system user’s duties; or</li>
<li>the system user is continually supervised by another system user who has the appropriate security clearances to access the system.</li>
</ul>
</li>
</ul>]]></paragraph>
</block>
<block title="Granting emergency access"><paragraph
    title="9.2.19.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>Emergency access to a system may be granted where there is an immediate and critical need to access information for which personnel do not have the appropriate security clearances. Such access will need to be granted by the agency head or their delegate and be formally documented.</p>]]></paragraph>
<paragraph
    title="9.2.19.R.02."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>It is important that appropriate debriefs take place at the conclusion of any emergency in order to manage the ongoing security of information and systems and to identify “lessons learned”.</p>]]></paragraph>
<paragraph
    title="9.2.19.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="Confidential, Top Secret, Secret"
    compliance="Must Not"
    cid="1512"
><![CDATA[<p>Emergency access MUST NOT be granted unless personnel have a security clearance to at least CONFIDENTIAL level.</p>]]></paragraph>
<paragraph
    title="9.2.19.C.02."

    tags="Governance,Personnel Security,System Access"


    classification="Confidential, Secret, Top Secret"
    compliance="Must Not"
    cid="1513"
><![CDATA[<p>Emergency access MUST NOT be used on reassignment of duties while awaiting completion of full security clearance procedures.</p>]]></paragraph>
<paragraph
    title="9.2.19.C.03."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1514"
><![CDATA[<p>Agencies granting emergency access to a system MUST ensure that:</p><ul>
<li>the requirements to grant emergency access is due to an immediate and critical need to access classified information and there is insufficient time to complete clearance procedures;</li>
<li>the agency head or their delegate has approved the emergency access;</li>
<li>the system user’s access is formally documented;</li>
<li>the system user’s access is reported to the CISO; </li>
<li>appropriate briefs and debriefs for the information and system are conducted;</li>
<li>access is limited to information and systems necessary to deal with the particular emergency and is governed by strict application of the “need to know” principle; </li>
<li>emergency access is limited to ONE security clearance level higher than the clearance currently held; and</li>
<li>the security clearance process is completed as soon as possible.</li>
</ul>]]></paragraph>
<paragraph
    title="9.2.19.C.04."

    tags="Governance,Personnel Security,System Access"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="1515"
><![CDATA[<p>Personnel granted emergency access MUST be debriefed at the conclusion of the emergency.</p>]]></paragraph>
</block>
<block title="Accessing endorsed or compartmented information"><paragraph
    title="9.2.20.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>Limited higher access to systems processing, storing or communicating endorsed or compartmented information is not permitted.</p>]]></paragraph>
<paragraph
    title="9.2.20.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must Not"
    cid="1518"
><![CDATA[<p>Agencies MUST NOT grant limited higher access to systems that process, store or communicate endorsed or compartmented information.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="9.3. Using The Internet"><subsection title="Objective"><paragraph
    title="9.3.1."


><![CDATA[<p>Personnel use Internet services in a responsible and security conscious manner, consistent with agency policies.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="9.3.2."


><![CDATA[<p>This section covers information relating to personnel using Internet services such as the Web, Web-based email, news feeds, subscriptions and other services. Whilst this section does not address Internet services such as IM, IRC, IPT and video conferencing, agencies need to remain aware that unless applications using these communications methods are evaluated and approved by GCSB they are NOT approved for communicating classified information over the Internet.</p>]]></paragraph>
<paragraph
    title="9.3.3."


><![CDATA[<p>Additional information on using applications that can be used with the Internet can be found in&nbsp;<a title="Web Applications" href="http://nzism.gcsb.govt.nz/ism-document#Section-15091">Section 14.3 - Web Applications</a> and <a title="Email Applications" href="http://nzism.gcsb.govt.nz/ism-document#Section-15183">Section 15.1 - Email Applications</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Using the Internet"><paragraph
    title="9.3.4.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>Agencies will need to determine what constitutes suspicious activity, questioning or contact in relation to their own work environment. Suspicious activity, questioning or contact may relate to the work duties of personnel or the specifics of projects being undertaken by personnel within the agency.</p>]]></paragraph>
<paragraph
    title="9.3.4.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Must"
    cid="1529"
><![CDATA[<p>Agencies MUST ensure personnel are instructed to report any suspicious activity, questioning or contact when using the Internet, to an ITSM.</p>]]></paragraph>
</block>
<block title="Awareness of Web usage policies"><paragraph
    title="9.3.5.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>Users MUST be familiar with and formally acknowledge agency Web usage policies for system users in order to follow the policy and guidance.</p>]]></paragraph>
<paragraph
    title="9.3.5.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Must"
    cid="1532"
><![CDATA[<p>Agencies MUST make their system users aware of the agency’s Web usage policies.</p>]]></paragraph>
<paragraph
    title="9.3.5.C.02."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Must"
    cid="1533"
><![CDATA[<p>Personnel MUST formally acknowledge and accept agency Web usage policies.</p>]]></paragraph>
</block>
<block title="Monitoring Web usage"><paragraph
    title="9.3.6.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>Agencies may choose to monitor compliance with aspects of Web usage policies, such as access attempts to blocked websites, pornographic and gambling websites, as well as compiling a list of system users that excessively download and/or upload data without an obvious or known legitimate business requirement.</p>]]></paragraph>
<paragraph
    title="9.3.6.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should"
    cid="1536"
><![CDATA[<p>Agencies SHOULD implement measures to monitor their personnel, visitor and contractor compliance with their Web usage policies.</p>]]></paragraph>
</block>
<block title="Posting information on the Web"><paragraph
    title="9.3.7.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>Personnel need to take special care not to accidentally post information on the Web, especially in forums and blogs. Even Official Information or UNCLASSIFIED information that appears to be benign in isolation could, in aggregate, have a considerable security impact on the agency, government sector or wider government.</p>]]></paragraph>
<paragraph
    title="9.3.7.R.02."

    tags="Governance,Personnel Security"


><![CDATA[<p>To ensure that personal opinions of agency personnel are not interpreted as official policy or associated with an agency, personnel will need to maintain separate professional and personal accounts when using websites, especially when using online social networks.</p>]]></paragraph>
<paragraph
    title="9.3.7.R.03."

    tags="Governance,Personnel Security"


><![CDATA[<p>Accessing personal accounts from an agency’s systems is discouraged.</p>]]></paragraph>
<paragraph
    title="9.3.7.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Must"
    cid="1541"
><![CDATA[<p>Agencies MUST ensure personnel are instructed to take special care when posting information on the Web.</p>]]></paragraph>
<paragraph
    title="9.3.7.C.02."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Must"
    cid="1542"
><![CDATA[<p>Agencies MUST ensure personnel posting information on the Web maintain separate professional accounts from any personal accounts they have for websites.</p>]]></paragraph>
<paragraph
    title="9.3.7.C.03."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should"
    cid="1543"
><![CDATA[<p>Agencies SHOULD monitor websites where personnel post information and if necessary remove or request the removal of any inappropriate information.</p>]]></paragraph>
<paragraph
    title="9.3.7.C.04."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should"
    cid="1544"
><![CDATA[<p>Accessing personal accounts from agency systems SHOULD be discouraged.</p>]]></paragraph>
</block>
<block title="Posting personal information on the Web"><paragraph
    title="9.3.8.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>Personnel need to be aware that any personal interest or other information they post on websites can be used to develop a detailed profile of their families, lifestyle, interest and hobbies in order to attempt to build a trust relationship with them or others. This relationship could then be used to attempt to elicit information from them or implant malicious software on systems by inducing them to, for instance, open emails or visit websites with malicious content.</p>]]></paragraph>
<paragraph
    title="9.3.8.R.02."

    tags="Governance,Personnel Security"


><![CDATA[<p>Profiling is a common marketing and targeting technique facilitated by the internet.</p>]]></paragraph>
<paragraph
    title="9.3.8.R.03."

    tags="Governance,Personnel Security"


><![CDATA[<p>Individuals who work for high-interest agencies, who hold security clearances or who are involved in high-profile projects are of particular interest to profilers, cyber criminals and other users of this information.</p>]]></paragraph>
<paragraph
    title="9.3.8.R.04."

    tags="Governance,Personnel Security"


><![CDATA[<p>The following is of particular interest to profilers:</p><ul>
<li>photographs;</li>
<li>past and present employment details;</li>
<li>personal details, including DOB, family members, birthdays, address and contact details;</li>
<li>schools and institutions;</li>
<li>clubs, hobbies and interests;</li>
<li>educational qualifications;</li>
<li>current work duties;</li>
<li>details of work colleagues and associates; and</li>
<li>work contact details.</li>
</ul>]]></paragraph>
<paragraph
    title="9.3.8.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should"
    cid="1550"
><![CDATA[<p>Agencies SHOULD ensure that personnel are informed of the security risks associated with posting personal information on websites, especially for those personnel holding higher level security clearances.</p>]]></paragraph>
<paragraph
    title="9.3.8.C.02."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should"
    cid="1551"
><![CDATA[<p>Personnel SHOULD be encouraged to use privacy settings for websites to restrict access to personal information they post to only those they authorise to view it.</p>]]></paragraph>
<paragraph
    title="9.3.8.C.03."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should"
    cid="1552"
><![CDATA[<p>Personnel SHOULD be encouraged to undertake a Web search of themselves to determine what personal information is available and contact an ITSM if they need assistance in determining if the information is appropriate to be viewed by the general public or potential adversaries.</p>]]></paragraph>
</block>
<block title="Peer-to-peer applications"><paragraph
    title="9.3.9.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>Personnel using peer-to-peer file sharing applications are often unaware of the extent of files that are being shared from their workstation. In most cases peer-to-peer file sharing applications will scan workstations for common file types and share them automatically for sharing or public consumption. Examples of peer-to-peer file sharing applications include Shareaza, KaZaA, Ares, Limewire, eMule and uTorrent.</p>]]></paragraph>
<paragraph
    title="9.3.9.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should Not"
    cid="1555"
><![CDATA[<p>Agencies SHOULD NOT allow personnel to use peer-to-peer applications over the Internet.</p>]]></paragraph>
</block>
<block title="Receiving files via the Internet"><paragraph
    title="9.3.10.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>When personnel receive files via peer-to-peer file sharing, IM or IRC applications they are often bypassing security mechanisms put in place by the agency to detect and quarantine malicious code. Personnel should be encouraged to send files via established methods such as email, to ensure they are appropriately scanned for malicious code.</p>]]></paragraph>
<paragraph
    title="9.3.10.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should Not"
    cid="1558"
><![CDATA[<p>Agencies SHOULD NOT allow personnel to receive files via peer-to-peer, IM or IRC applications.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="9.4. Escorting Uncleared Personnel"><subsection title="Objective"><paragraph
    title="9.4.1."


><![CDATA[<p>Uncleared personnel are escorted within secure areas.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="9.4.2."


><![CDATA[<p>This section covers information relating to the escorting of uncleared personnel without security clearances in secure areas.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="9.4.3."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 112.5%;">
<tbody>
<tr>
<td style="width: 16.9963%;"><strong>Reference</strong></td>
<td style="width: 14.8331%;"><strong>Title</strong></td>
<td style="width: 68.1397%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 16.9963%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 14.8331%;">GOV4, INFOSEC1, PERSEC1, PERSEC2, PHYSEC1 and PHYSEC2</td>
<td style="width: 68.1397%;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Secuirty" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<p><a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Unescorted access"><paragraph
    title="9.4.4.R.01."

    tags="Governance,Personnel Security,Facilities"


><![CDATA[<p>Ensuring that personnel have correct security clearances to access sensitive areas and that access by escorted personnel is recorded for auditing purposes is widely considered a standard security practice.</p>]]></paragraph>
<paragraph
    title="9.4.4.C.01."

    tags="Governance,Personnel Security,Facilities"


    classification="Top Secret"
    compliance="Must"
    cid="1569"
><![CDATA[<p>Agencies MUST ensure that all personnel with unescorted access to TOP SECRET areas have appropriate security clearances and briefings.</p>]]></paragraph>
</block>
<block title="Maintaining an unescorted access list"><paragraph
    title="9.4.5.R.01."

    tags="Governance,Personnel Security,Facilities"


><![CDATA[<p>Maintaining an unescorted access list reduces the administrative overhead of determining if personnel can enter a TOP SECRET area without an escort. Personnel with approval for unescorted access must be able to verify their identity at all times while within the secure area.</p>]]></paragraph>
<paragraph
    title="9.4.5.C.01."

    tags="Governance,Personnel Security,Facilities"


    classification="Top Secret"
    compliance="Must"
    cid="1572"
><![CDATA[<p>Agencies MUST maintain an up to date list of personnel entitled to enter a TOP SECRET area without an escort.</p>]]></paragraph>
<paragraph
    title="9.4.5.C.02."

    tags="Governance,Personnel Security,Facilities"


    classification="Top Secret"
    compliance="Must"
    cid="1573"
><![CDATA[<p>Personnel MUST display identity cards at all times while within the secure area.</p>]]></paragraph>
</block>
<block title="Displaying the unescorted access list"><paragraph
    title="9.4.6.R.01."

    tags="Governance,Personnel Security,Facilities"


><![CDATA[<p>Displaying an unescorted access list allows staff to quickly verify if personnel are entitled to be in a TOP SECRET area without an escort. Care should be taken not to reveal the contents of the access list to non-cleared personnel.</p>]]></paragraph>
<paragraph
    title="9.4.6.C.01."

    tags="Governance,Personnel Security,Facilities"


    classification="Top Secret"
    compliance="Should"
    cid="1576"
><![CDATA[<p>Agencies SHOULD display within a TOP SECRET area, an up to date list of personnel entitled to enter the area without an escort.</p>]]></paragraph>
<paragraph
    title="9.4.6.C.02."

    tags="Governance,Personnel Security,Facilities"


    classification="Top Secret"
    compliance="Should Not"
    cid="1577"
><![CDATA[<p>The unescorted access list SHOULD NOT be visible from outside of the secure area.</p>]]></paragraph>
</block>
<block title="Visitors"><paragraph
    title="9.4.7.R.01."

    tags="Governance,Personnel Security,Facilities"


><![CDATA[<p>Visitors to secure areas should be carefully supervised to ensure the need-to-know principle is strictly adhered to.</p>]]></paragraph>
<paragraph
    title="9.4.7.C.01."

    tags="Governance,Personnel Security,Facilities"


    classification="Top Secret"
    compliance="Should"
    cid="1580"
><![CDATA[<p>Visitors SHOULD be carefully supervised to ensure they do not gain access to or have oversight of information above the level of their clearance or outside of their need-to-know.</p>]]></paragraph>
</block>
<block title="Recording visits in a visitor log"><paragraph
    title="9.4.8.R.01."

    tags="Governance,Personnel Security,Facilities"


><![CDATA[<p>Recording visitors to a TOP SECRET area ensures that the agency has a record of visitors should an investigation into an incident need to take place in the future.</p>]]></paragraph>
<paragraph
    title="9.4.8.C.01."

    tags="Governance,Personnel Security,Facilities"


    classification="Top Secret"
    compliance="Must Not"
    cid="1583"
><![CDATA[<p>Agencies MUST NOT permit personnel not on the unescorted access list to enter a TOP SECRET area unless their visit is recorded in a visitor log and they are escorted by a person on the unescorted access list.</p>]]></paragraph>
</block>
<block title="Content of the visitor log"><paragraph
    title="9.4.9.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>The contents of the visitor log ensure that security personnel have sufficient details to conduct an investigation into an incident if required.</p>]]></paragraph>
<paragraph
    title="9.4.9.C.01."

    tags="Governance,Personnel Security"


    classification="Top Secret"
    compliance="Must"
    cid="1586"
><![CDATA[<p>Agencies MUST, at minimum, record the following information in a visitor log for each entry:</p><ul>
<li>name;</li>
<li>organisation;</li>
<li>person visiting;</li>
<li>contact details for person visiting; and</li>
<li>date and time in and out.</li>
</ul>]]></paragraph>
</block>
<block title="Separate visitor logs"><paragraph
    title="9.4.10.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>Maintaining a separate visitor log for TOP SECRET areas assists in enforcing the need-to-know principle. General visitors do not need-to-know of personnel that have visited TOP SECRET areas.</p>]]></paragraph>
<paragraph
    title="9.4.10.C.01."

    tags="Governance,Personnel Security"


    classification="Top Secret"
    compliance="Must"
    cid="1589"
><![CDATA[<p>Agencies with a TOP SECRET area within a larger facility MUST maintain a separate log from any general visitor log.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="10. Infrastructure"><section title="10.1. Cable Management Fundamentals"><subsection title="Objective"><paragraph
    title="10.1.1."


><![CDATA[<p>Cable management systems are designed to support the integration of systems across government facilities, assist maintenance and engineering changes, as well as minimise the opportunity for tampering or unauthorised changes to cable systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="10.1.2."


><![CDATA[<p>This section covers information relating to cable distribution systems used in facilities within New Zealand. When designing cable management systems, <a title="Cable Labelling and Registration" href="http://nzism.gcsb.govt.nz/ism-document#Section-13749">Section 10.5 - Cable Labelling and Registration</a> and <a title="Cable Patching" href="http://nzism.gcsb.govt.nz/ism-document#Section-13786">Section 10.6 - Cable Patching</a> of this chapter also apply.</p>]]></paragraph>
</block>
<block title="Applicability of controls within this section"><paragraph
    title="10.1.3."


><![CDATA[<p>The controls within this section are applicable only to communications infrastructure located within facilities in New Zealand. For deployable platforms or facilities outside of New Zealand Emanation Security Threat Assessments (Section 10.7) of this chapter of this manual MUST be consulted.</p>]]></paragraph>
</block>
<block title="Common implementation scenarios"><paragraph
    title="10.1.4."


><![CDATA[<p>This section provides common requirements for non-shared facilities. Specific requirements for facilities shared between agencies and facilities shared with non-government entities can be found in subsequent sections of this chapter.</p>]]></paragraph>
</block>
<block title="Red/Black Concept and Cable Separation"><paragraph
    title="10.1.5."


><![CDATA[<p>The <strong>RED/BLACK</strong> concept is the separation of electrical and electronic circuits, devices, equipment cables, connectors, components and systems that transmit store or process national security information from non-national security information. The <strong>RED/BLACK</strong> concept is sometimes described as <strong>RED/BLACK</strong> architecture or <strong>RED/BLACK</strong> engineering.</p>]]></paragraph>
<paragraph
    title="10.1.6."


><![CDATA[<p>The <strong>RED/BLACK</strong> concept should not be confused with the generic description HIGH/LOW or HIGH SIDE/LOW SIDE.  In this context, HIGH refers to systems <strong>classified</strong> CONFIDENTIAL and above and LOW refers to systems <strong>classified</strong> RESTRICTED and below.  While these concepts are similar and often used interchangeably, it is important to recognise that information does not usually change classification. The signal or transmission, however, may transit both <strong>RED</strong> and <strong>BLACK</strong> systems in order to reach its intended destination. It is important to note that systems carrying a particular classification may also carry information at <strong>ALL </strong>lower classifications <strong>BUT NOT</strong> any higher classifications.</p>]]></paragraph>
<paragraph
    title="10.1.7."


><![CDATA[<p>An example is the use of radio transmissions or Wi-Fi where the information may hold a HIGH classification and originate in <strong>RED</strong> equipment but once transmission occurs the <strong>signal</strong> is <strong>BLACK</strong> as radio and Wi-Fi signals can be detected by anyone within range.</p>]]></paragraph>
<paragraph
    title="10.1.8."


><![CDATA[<p>This also leads to the situation where some equipment may have both <strong>RED</strong> and <strong>BLACK</strong> elements.  Examples include Wi-Fi Access Points and encryption devices.  <strong>RED</strong> Information in a <strong>BLACK</strong> environment is invariably protected by encryption and a variety of technical countermeasures.</p>]]></paragraph>
<paragraph
    title="10.1.9."


><![CDATA[<p>All cables with metal conductors (the signal carrier, the grounding element, the strengthening member or an armoured outer covering) can act as fortuitous signal conductors allowing signals to escape or to cross-contaminate other cables and signals.  This provides a path for the exploitation of signals, data and information.</p>]]></paragraph>
<paragraph
    title="10.1.10."


><![CDATA[<p>A fundamental control is the separation of cables and related equipment with sufficient distance between them to prevent cross-contamination.</p>]]></paragraph>
</block>
<block title="Cable trays"><paragraph
    title="10.1.11."


><![CDATA[<p class="NormS10C1b">Where copper or a combination of copper and fibre cables are used, cable trays will provide separation, assist cable management and enhance cable protection.&nbsp; While preferable to separate RED cables of different&nbsp;systems for cable management purposes, the most important element is to maintain RED/BLACK separation.&nbsp;</p>]]></paragraph>
<paragraph
    title="10.1.12."


><![CDATA[<p>It is preferable that cable trays contain dividers.&nbsp; Some cable trays provide only a single receptacle for cables (no dividers).&nbsp;If dividers are not available, multi-core fibre cables should be used.&nbsp; Cables of similar classifications should be bundled.&nbsp; A typical cable tray layout with dividers is depicted below:</p>
<p><img width="600" height="419" alt="" src="/assets/NZISM/10__ResizedImageWzYwMCw0MTld.1.10-Cable-Trays.png" loading="lazy" class="leftAlone ss-htmleditorfield-file image">

</p>
<p>&nbsp;</p>]]></paragraph>
</block>
<block title="Catenary"><paragraph
    title="10.1.13."


><![CDATA[<p class="NormS10C1b">The use of catenary (wire, rope, nylon cord or similar cable support mechanisms) is becoming more widespread in place of cable trays.  Care MUST be taken to maintain <strong>RED/BLACK</strong> separation if this method of cable support is used.</p>]]></paragraph>
</block>
<block title="Earthing"><paragraph
    title="10.1.14."


><![CDATA[<p class="NormS10C1b">It is important that any metal trays or metal catenary are earthed for both safety and to avoid creating any fortuitous conductors.  All earthing points MUST be equipotentially bonded.</p>]]></paragraph>
</block>
<block title="Fibre optic cabling"><paragraph
    title="10.1.15."


><![CDATA[<p>Fibre optic cabling does not produce, and is not influenced by, electromagnetic emanations; as such it offers the highest degree of protection from electromagnetic emanation effects.</p>]]></paragraph>
<paragraph
    title="10.1.16."


><![CDATA[<p>Many more fibres can be run per cable diameter than wired cables thereby reducing cable infrastructure costs. Fibre Optic cable is usually constructed with a glass core, cladding on the core and a further, colour coded coating. Multiple cores can be bundled into a single cable and multiple cables can be bundled into a high capacity cable. This is illustrated in Figures 1 below. Cables also have a central strength member of mylar or some similar high strength, non-conductive material</p>]]></paragraph>
<paragraph
    title="10.1.17."


><![CDATA[<p>Fibre cable is considered the best method to future proof against unforeseen threats.</p>]]></paragraph>
<paragraph
    title="10.1.18."


><![CDATA[<p class="NormS10C1b">Cable trays for fibre only cable may be of any suitable material.&nbsp; If metal trays are used they MUST be earthed.</p>]]></paragraph>
</block>
<block title="Ribbon Fibre Optic Cable"><paragraph
    title="10.1.19."


><![CDATA[<p class="NormS10C1b">In the context of this discussion, traditional and ribbon fibre optic cables are subject to identical controls, restrictions in installation and use and any operational caveats.</p>]]></paragraph>
<paragraph
    title="10.1.20."


><![CDATA[<p>Unlike traditional beam optical cable, ribbon fibre optic cable is arranged into a strip.&nbsp; Because the ribbon contains only coated optical fibres, this type of cable takes up much less space and is generally lighter (weight) than individually buffered optical fibres.&nbsp; As a result, ribbon cables are denser than any other fibre cable design.&nbsp; They are ideal for applications where space is limited, such as in an existing conduit that has very little room left for an additional cable.&nbsp; Ribbon fibre optic cable is a convenient solution for space and weight challenges.</p><p><img class="leftAlone" style="width: 265px; height: 254px;" title="" src="assets/Uploads/Figure-2a-Typical-Ribbon-Cable.jpg" alt="" width="499" height="499">&nbsp;<img class="leftAlone" style="width: 261px; height: 248px;" title="" src="assets/NZISM/Figure-2b-Typical-Ribbon-Cable.jpg" alt="" width="317" height="300"></p><p class="NormS10C1b">Figure 2: Typical Ribbon Cable</p>]]></paragraph>
<paragraph
    title="10.1.21."


><![CDATA[<p class="NormS10C1b">Ribbon cables enable the migration to high fibre count systems required to support high bandwidth applications including 10, 40 and 100Gb/s.  Ribbon cables are rarely used in long distance fibre optic trunk cable but are typically used in data centres, campus, commercial buildings and large industrial sites.  Fibre counts can range from 2 to over 1700.</p>]]></paragraph>
<paragraph
    title="10.1.22."


><![CDATA[<p class="NormS10C1b">The cable ribbons are coated optical fibres placed side by side, encapsulated in Mylar tape, similar to a miniature version of wire ribbons used in computer wiring.  A single ribbon many contain 4, 8, 12 or 24 optical fibres with ribbons stacked up to 22 high.  At present 12-fiber ribbons are readily accessible and identifiable with ribbon identification numbers, TIA-598 compliant fibre colour coding and are available with non-flame-retardant or formulated flame-retardant outer jacket.  They are also available in several configurations including all-dielectric, armoured and aerial self-supporting cables.</p>]]></paragraph>
<paragraph
    title="10.1.23."


><![CDATA[<p class="NormS10C1b">Because the cable profile is different to older round cable type, new cable strippers, cleavers, and fusion splicers are required for installation and maintenance.</p>]]></paragraph>
<paragraph
    title="10.1.24."


><![CDATA[<p class="NormS10C1b">Fibre optic ribbon cable comes in two basic configurations: loose tube ribbon cable and jacket ribbon.  Loose tube cables are where fibre ribbons are stacked on top of one another inside a loose-buffered tube.  This arrangement can hold several hundred fibres in close quarters. The buffer, strength members, and cable jacket carry any strain while the fibre ribbons move freely inside the buffer tube.</p>]]></paragraph>
<paragraph
    title="10.1.25."


><![CDATA[<p>Jacket ribbon cable is similar to a regular tight-buffered cable, but it is elongated to contain a fibre ribbon. This type of cable typically features a small amount of strength member and a ripcord to tear through the jacket.</p>
<p>&nbsp;</p>
<p style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/Figure-3-Jacket-Cable.jpg" alt="" width="300" height="300">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/Figure-4-Loose-tube-Cable.jpg" alt="" width="300" height="300"></p>
<p style="text-align: center;">&nbsp;</p>
<p style="text-align: center;">Figure 3: Jacket Cable&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Figure 4: Loose Tube Cable</p>]]></paragraph>
<paragraph
    title="10.1.26."


><![CDATA[<p>Infrastructure cables contain multiple fibre ribbon units inside a central tube with dielectric strength members for tensile strength and colour coded fibres with individual ribbon unit ID numbers for clear identification.&nbsp; Ribbon fibre optic cables are available in configurations supporting high-speed, applications such as Gigabit Ethernet, 10 Gigabit Ethernet, Gigabit ATM and Fibre Channel.</p>
<p><img class="leftAlone" style="margin-right: auto; margin-left: auto; display: block;" title="" src="assets/NZISM/Figure-5-Infrastructure-Ribbon-Cable.jpg" alt="" width="300" height="300">&nbsp;</p>
<p style="text-align: center;">Figure 5: Infrastructure (High Cable Count) Ribbon Cable</p>]]></paragraph>
</block>
<block title="Armoured Fibre optic cabling"><paragraph
    title="10.1.27."


><![CDATA[<p>Some fibre optic cable also includes conductive metal cable strengtheners and conductive metal armoured sheaths which may be wire-wound or stainless steel mesh for external cable protection and steel wire cores as core strength members. This strengthening and armouring is conductive and specialist advice may be needed to avoid earth loops, cross-coupling, inductive coupling or the introduction of other compromising signals and currents. Fibre optic cable with metal cable strengtheners or conductive armoured sheaths is considered <em>unsuitable</em> for secure installations.</p>
<p style="text-align: center;">&nbsp;</p>
<p><strong><img class="leftAlone" style="float: left;" title="" src="assets/NZISM/Figure-6a-Armouredl-Ribbon-Fibre-Cable.jpg" alt="" width="185" height="293"> <br></strong></p>
<p>&nbsp;</p>
<p><img class="leftAlone" title="" src="assets/NZISM/Figure-6b-Armoured-Ribbon-Fibre-Cable.jpg" alt="" width="185" height="258"><img class="leftAlone" title="" src="assets/NZISM/TCC-AC.png" alt="image diagram of Typical Cable Construction for an Armoured Cable" width="507" height="329"></p>
<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Figure 6 - Armoured Ribbon Fibre Cable</p>
<p>&nbsp;</p>]]></paragraph>
</block>
<block title="Backbone"><paragraph
    title="10.1.28."


><![CDATA[<p>A backbone or core is the central cabling that connects the infrastructure (servers, databases, gateways, equipment and telecommunication rooms etc.) to local areas networks, workstations and other devices, such as MFD’s. Smaller networks may also be connected to the backbone.</p>]]></paragraph>
<paragraph
    title="10.1.29."


><![CDATA[<p>A backbone can span a geographic area of any size including an office, a single building, multi-story buildings, campus, national and international infrastructure. In the context of the NZISM the term backbone generally refers to the central cabling within a building or a campus.</p>]]></paragraph>
<paragraph
    title="10.1.30."


><![CDATA[<p>Backbones can be defined in terms of six criteria:</p><ul>
<li>transmission media;</li>
<li>topology;</li>
<li>security required;</li>
<li>access control;</li>
<li>transmission technique; </li>
<li>transmission speed and capability.</li>
</ul><p><img class="leftAlone" title="" src="assets/NZISM/DiagramAccessNetwork.png" alt="Diagram of Access Network" width="486" height="406"></p>]]></paragraph>
</block>
<block title="TOP SECRET cabling"><paragraph
    title="10.1.31."


><![CDATA[<p>For TOP SECRET cabling the cable’s non-conductive protective sheath IS NOT considered to be a conduit. For TOP SECRET fibre optic cables with sub-units, the cable’s outer protective sheath IS considered to be a conduit.</p>]]></paragraph>
</block>
<block title="Power Filters"><paragraph
    title="10.1.32."


><![CDATA[<p>A power filter is a device placed between an external power source and electronic devices.  It is used in order to attenuate external transients, conducted radio frequencies (RF) or electromagnetic interference (EMI) between the AC or DC power line and the equipment.  Filters can also reduce radiated interference to assist in managing emissions or susceptibility to interference.</p>]]></paragraph>
<paragraph
    title="10.1.33."


><![CDATA[<p>The power lines entering an electronic device can act both as an antenna and as a low impedance conduction path for signals that exist inside the device.  These signals may couple into the power line, either through inductance or capacitance, from internal circuitry, other internal wiring or from other components such as transformers, coils or adjacently routed wires.  To a lesser degree, but still problematic, the power lines can also pickup induced current signals from magnetic fields inside the enclosure.</p>]]></paragraph>
<paragraph
    title="10.1.34."


><![CDATA[<p>The purpose of power supply filters is to smooth the power supply and provide a degree of isolation from the external power supply for connected electronic devices.  RF/EMI filters are designed to reduce line - to - ground (common mode) interference, EMI and anomalous RF.  Best practice is to solve or suppress EMI and RF emissions at source, rather than after emission.</p>]]></paragraph>
<paragraph
    title="10.1.35."


><![CDATA[<p>There are international and national regulations on frequencies and signal levels that a device is permitted to produce in order to minimise or prevent interference with other equipment.  Practically no modern equipment, with fast digital circuits and switch-mode power supply regulators can meet electromagnetic compatibility (EMC) requirements without efficient filtering, particularly when operating in close proximity.  While most devices are designed by manufacturers to meet regulation, not all devices filter EMI or RF to levels acceptable for secure environments.  It may be necessary to use a power line filter to keep signals inside the enclosure as much as possible and keep any generated signals to less than the legal or required limits for conducted emissions.</p>]]></paragraph>
<paragraph
    title="10.1.36."


><![CDATA[<p>Power filters have a variety of capabilities depending on their specification.  It is important the filters are selected correctly for the power supply, expected load and required attenuation capacity. It is important to note that an Uninterruptible Power Supply (UPS) is NOT considered an RF/EMI filter.</p>]]></paragraph>
<paragraph
    title="10.1.37."


><![CDATA[<p>Common usage of filters is for computer systems, laboratory and testing equipment, medical devices, consumer electronics, and to protect any equipment where good quality power supply and protection of the electronic devices and data is required.  Devices can be within buildings, vehicle, ships, aircraft or portable.</p>]]></paragraph>
<paragraph
    title="10.1.38."


><![CDATA[<p>Power filters often include EMC/ RFI filters which channel emissions to earth to prevent them from being conducted back down the supply cables.  This can be detected as an earth leakage current which may cause Residual Current Devices (RCDs) to trip.  This problem can be corrected by using the correct specification of power filter or installing low leakage current devices.  Agencies should consult the GCSB if such problems occur.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="10.1.39."


><![CDATA[<p class="NormS10C1b">Fibre Standards:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>AS/NZS 2967:2014</strong></td>
<td>
<p>Optical fibre communication cabling systems safety.</p>
Provides rules for safe practices in the handling, installation, testing, use and disposal of optical fibre cabling and associated materials and equipment.</td>
<td style="text-align: center;">
<p>Standards NZ</p>
</td>
<td><a rel="noopener noreferrer" href="https://www.standards.govt.nz/shop/asnzs-29672014/" target="_blank">https://www.standards.govt.nz/shop/asnzs-29672014/</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 11801</strong></td>
<td>
<p>Information technology - Generic cabling for customer premises.</p>
Specifies general-purpose telecommunication cabling systems (structured cabling), including several classes of optical fibre interconnections.</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td><a title="Information technology — Generic cabling for customer premises — Part 1: General requirements" rel="noopener noreferrer" href="https://www.iso.org/standard/66182.html" target="_blank">https://www.iso.org/standard/66182.html</a></td>
</tr>
<tr>
<td><strong>IEC 60793 Series</strong></td>
<td>
<p>Optical fibres.</p>
A list of all parts in the IEC 60793 series, published under the general title Optical fibres, can be found on the IEC website.</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td><a rel="noopener noreferrer" href="https://webstore.iec.ch/home" target="_blank">https://webstore.iec.ch/home</a></td>
</tr>
<tr>
<td><strong>IEC 60794&nbsp;Series</strong></td>
<td>
<p>Optical fibre cables.</p>
A list of all parts in the IEC 60794 series, published under the general title Optical fibre cables, can be found on the IEC website.</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td><a rel="noopener noreferrer" href="https://webstore.iec.ch/home" target="_blank">https://webstore.iec.ch/home</a></td>
</tr>
<tr>
<td><strong>ANSI/TIA-568-C.3</strong></td>
<td>Optical Fibre Cabling Components</td>
<td style="text-align: center;">TIA</td>
<td><a rel="noopener noreferrer" href="https://webstore.ansi.org" target="_blank">https://webstore.ansi.org</a></td>
</tr>
<tr>
<td><strong>ANSI/TIA-598-D (Revision of TIA-598-C) July 2014</strong></td>
<td>
<p>Optical Fibre Cable Colour Coding</p>
This standard defines the recommended identification scheme or system for individual fibres, fibre units, and groups of fibre units within a cable structure.</td>
<td style="text-align: center;">
<p>TIA</p>
</td>
<td><a rel="noopener noreferrer" href="https://webstore.ansi.org" target="_blank">https://webstore.ansi.org</a></td>
</tr>
<tr>
<td><strong>ITU-T G.657 – 659 series</strong></td>
<td>
<p>Optical Fibre Cables</p>
Characteristics and recommendations for selection, use and installation.</td>
<td style="text-align: center;">
<p>ITU-T</p>
</td>
<td><a rel="noopener noreferrer" href="https://www.itu.int/en/ITU-T/publications/Pages/recs.aspx" target="_blank">https://www.itu.int/en/ITU-T/publications/Pages/recs.aspx</a></td>
</tr>
</tbody>
</table><p>&nbsp;</p><p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="References - Fibre Standards"><paragraph
    title="10.1.40."


><![CDATA[<p>Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Reference</strong></p>
</td>
<td>
<p><strong>Title</strong></p>
</td>
<td style="text-align: center;">
<p><strong>Publisher</strong></p>
</td>
<td>
<p><strong>Source</strong></p>
</td>
</tr>
<tr>
<td>
<p><strong>NZCSS 400</strong></p>
</td>
<td>
<p><strong>New Zealand Communications Security Standard No 400 (Document classified CONFIDENTIAL)</strong></p>
</td>
<td style="text-align: center;">GCSB</td>
<td>
<p>CONFIDENTIAL document available on application to authorised personnel</p>
</td>
</tr>
<tr>
<td>
<p><strong><strong>AS/NZS 3000:2007<strong>/Amdt 2:2012</strong></strong></strong></p>
</td>
<td>
<p><strong>Electrical Installations (Known as the Australia/New Zealand Wiring Rules,</strong></p>
</td>
<td style="text-align: center;">
<p>Standards NZ</p>
</td>
<td>
<p><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz/</a>&nbsp;&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p><strong>ANSI/TIA-568-C.3&nbsp;</strong></p>
</td>
<td>
<p><strong>Optical Fiber Cabling Components</strong></p>
</td>
<td style="text-align: center;">
<p>American National Standards Institute (ANSI)</p>
</td>
<td>
<p><a title="American National Standards Institute" rel="noopener noreferrer" href="https://www.ansi.org/" target="_blank">https://www.ansi.org/</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>IEEE 802-2014</strong></p>
</td>
<td>
<p><strong>Local and Metropolitan Area Networks: Overview and Architecture</strong></p>
</td>
<td style="text-align: center;">
<p>Institute of Electrical and Electronics Engineers (IEEE)</p>
</td>
<td><a title="IEEE 802" rel="noopener noreferrer" href="https://ieeexplore.ieee.org/document/6847097" target="_blank">https://ieeexplore.ieee.org/document/6847097</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="10.1.41."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td>INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements/&nbsp;&nbsp;&nbsp;</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Backbone"><paragraph
    title="10.1.42.R.01."

    tags="Infrastructure,Technical,Cable Management"


><![CDATA[<p>The design of a backbone requires consideration of a number of criteria including the capacity of the cable to carry the predicted volume of data at acceptable speeds. An element of “future proofing” is also required as re-cabling to manage capacity issues can be costly. Fibre optic cable provides a convenient means of securing and “future proofing” backbones.</p>]]></paragraph>
<paragraph
    title="10.1.42.C.01."

    tags="Infrastructure,Technical,Cable Management"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2216"
><![CDATA[<p>Agencies MUST use fibre optic cable for backbone infrastructures and installations.</p>]]></paragraph>
<paragraph
    title="10.1.42.C.02."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Should"
    cid="2217"
><![CDATA[<p>Agencies SHOULD use fibre optic cable for backbone infrastructures and installations.</p>]]></paragraph>
</block>
<block title="Use of Fibre Optic Cable"><paragraph
    title="10.1.43.R.01."

    tags="Infrastructure,Technical,Cable Management"


><![CDATA[<p>Fibre optic cable is considered more secure than copper cables and provides electrical isolation of signals. Fibre will also provide higher bandwidth and speed to allow a degree of future-proofing in network design.</p>]]></paragraph>
<paragraph
    title="10.1.43.C.01."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Should"
    cid="2220"
><![CDATA[<p>Agencies SHOULD use fibre optic cabling.</p>]]></paragraph>
<paragraph
    title="10.1.43.C.02."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Should"
    cid="2221"
><![CDATA[<p>Agencies SHOULD consult with the GCSB where fibre optic cable incorporating conductive metal strengtheners or sheaths is specified.</p>]]></paragraph>
<paragraph
    title="10.1.43.C.03."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Should"
    cid="2222"
><![CDATA[<p>Agencies SHOULD consult with the GCSB where copper cables are specified.</p>]]></paragraph>
<paragraph
    title="10.1.43.C.04."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Should Not"
    cid="2223"
><![CDATA[<p>Agencies SHOULD NOT use fibre optic cable incorporating conductive metal strengtheners or sheaths except where essential for cable integrity.</p>]]></paragraph>
</block>
<block title="Cabling Standards"><paragraph
    title="10.1.44.R.01."

    tags="Infrastructure,Technical,Cable Management"


><![CDATA[<p>Unauthorised personnel could inadvertently or deliberately access system cabling. This could result in loss or compromise of classified information. Non-detection of covert tampering or access to system cabling may result in long term unauthorised access to classified information by a hostile entity.</p>]]></paragraph>
<paragraph
    title="10.1.44.C.01."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Must"
    cid="2226"
><![CDATA[<p>Agencies MUST install all cabling in accordance with the relevant New Zealand standards as directed by AS/NZS 3000:2007 and NZCSS400.</p>]]></paragraph>
</block>
<block title="Cable colours"><paragraph
    title="10.1.45.R.01."

    tags="Infrastructure,Technical,Cable Management"


><![CDATA[<p>To facilitate cable management, maintenance and security cables and conduit should be colour-coded to indicate the classification of the data carried and/or classification of the compartmented data.</p>]]></paragraph>
<paragraph
    title="10.1.45.R.02."

    tags="Infrastructure,Technical,Cable Management"


><![CDATA[<p>Cables and conduit may be the distinguishing colour for their entire length or display a distinguishing label marking and colour at each end and at a maximum of two metre intervals along the cable.</p>]]></paragraph>
<paragraph
    title="10.1.45.C.01."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Must"
    cid="2230"
><![CDATA[<p>Agencies MUST comply with the cable and conduit colours specified in the following table.</p><table class="table-secondary">
<tbody>
<tr>
<td>Classification</td>
<td>Cable colour</td>
</tr>
<tr>
<td>Compartmented Information (SCI)</td>
<td class="table-cell-orange">Orange/Yellow/Teal or other colour </td>
</tr>
<tr>
<td>TOP SECRET</td>
<td class="table-cell-red">Red</td>
</tr>
<tr>
<td>SECRET</td>
<td class="table-cell-blue">Blue</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td class="table-cell-green">Green</td>
</tr>
<tr>
<td>RESTRICTED and all lower classifications</td>
<td class="table-cell-black">Black</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="10.1.45.C.02."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Must"
    cid="2231"
><![CDATA[<p>Additional colours may be used to delineate special networks and compartmented information of the same classification. These networks MUST be labelled and covered in the agency’s SOPs.</p>]]></paragraph>
</block>
<block title="Cable colours for foreign systems in New Zealand facilities"><paragraph
    title="10.1.46.R.01."

    tags="Infrastructure,Technical,Cable Management"


><![CDATA[<p>Foreign systems should be segregated and separated from other agency systems for security purposes. Colour-coding will facilitate installation, maintenance, certification and accreditation.</p>]]></paragraph>
<paragraph
    title="10.1.46.C.01."

    tags="Infrastructure,Technical,Cable Management"


    classification="Top Secret"
    compliance="Must"
    cid="2234"
><![CDATA[<p>The cable colour to be used for foreign systems MUST be agreed between the host agency, the foreign system owner and the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="10.1.46.C.02."

    tags="Infrastructure,Technical,Cable Management"


    classification="Top Secret"
    compliance="Must Not"
    cid="2235"
><![CDATA[<p>Agencies MUST NOT allow cable colours for foreign systems installed in New Zealand facilities to be the same colour as cables used for New Zealand systems.</p>]]></paragraph>
<paragraph
    title="10.1.46.C.03."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Should"
    cid="2236"
><![CDATA[<p>The cable colour to be used for foreign systems SHOULD be agreed between the host agency, the foreign system owner and the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="10.1.46.C.04."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Should Not"
    cid="2237"
><![CDATA[<p>Agencies SHOULD NOT allow cable colours for foreign systems installed in New Zealand facilities to be the same colour as cables used for New Zealand systems.</p>]]></paragraph>
</block>
<block title="Cable groupings"><paragraph
    title="10.1.47.R.01."

    tags="Infrastructure,Technical,Cable Management"


><![CDATA[<p>Grouping cables provides a method of sharing conduits and cable reticulation systems in the most efficient manner. These conduits and reticulation system must be inspectable and cable separations must be obvious.</p>]]></paragraph>
<paragraph
    title="10.1.47.C.01."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Must"
    cid="2240"
><![CDATA[<p>Agencies MUST contact GCSB for advice when combining the cabling of special networks.</p>]]></paragraph>
<paragraph
    title="10.1.47.C.02."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Must Not"
    cid="2241"
><![CDATA[<p>Agencies MUST NOT deviate from the approved fibre cable combinations for shared conduits and reticulation systems as indicated below.</p><table class="table-secondary">
<tbody>
<tr>
<td>Group</td>
<td>
<p>Approved combination</p>
</td>
</tr>
<tr>
<td>1</td>
<td>UNCLASSIFIED</td>
</tr>
<tr>
<td> </td>
<td>RESTRICTED</td>
</tr>
<tr>
<td>2</td>
<td>CONFIDENTIAL</td>
</tr>
<tr>
<td> </td>
<td>SECRET</td>
</tr>
<tr>
<td>3</td>
<td>TOP SECRET</td>
</tr>
<tr>
<td> </td>
<td>
<p>Other Special Networks</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Fibre optic cables sharing a common conduit"><paragraph
    title="10.1.48.R.01."

    tags="Infrastructure,Technical,Cable Management"


><![CDATA[<p>The use of multi-core fibre optic cables can reduce installation costs. The principles of separation and containment of cross-talk and leakage must be adhered to.</p>]]></paragraph>
<paragraph
    title="10.1.48.C.01."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Must"
    cid="2244"
><![CDATA[<p>With fibre optic cables the arrangements of fibres within the cable sheath, as illustrated in Figure 3, MUST carry a single classification only.</p><p><img class="leftAlone" title="" src="assets/NZISM/TypicalCableConstructionDuplex.png" alt="Typical Cable Construction Duplex" width="532" height="355"></p><p><img class="leftAlone" title="" src="assets/NZISM/TypicalCableConstructionTwinFlex.png" alt="Typical Cable Construction Twin Flex" width="504" height="274"></p><p><img class="leftAlone" title="" src="assets/NZISM/TypicalCableConstructionMulti-coreCable.png" alt="Typical Cable Construction Multi-core Cable" width="544" height="380"></p><p> </p>]]></paragraph>
<paragraph
    title="10.1.48.C.02."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Must"
    cid="2245"
><![CDATA[<p>If a fibre optic cable contains subunits, as shown in Figure 4, each subunit MUST carry only a single classification.</p><p><img class="leftAlone" title="" src="assets/NZISM/TypicalCableConstructionMulti-coreSubunits.png" alt="Typical Cable Construction Multi-core with Subunits" width="544" height="396"></p>]]></paragraph>
<paragraph
    title="10.1.48.C.03."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Must Not"
    cid="2246"
><![CDATA[<p>Agencies MUST NOT mix classifications up to RESTRICTED with classifications of CONFIDENTIAL and above in a single cable.</p>]]></paragraph>
</block>
<block title="Audio secure areas"><paragraph
    title="10.1.49.R.01."

    tags="Infrastructure,Technical,Secure Area,Cable Management"


><![CDATA[<p>Audio secure areas are designed to prevent audio conversation from being heard outside the walls. Penetrating an audio secure area for cables in an unapproved manner can degrade this. Consultation with GCSB needs to be undertaken before any modifications are made to audio secure areas.</p>]]></paragraph>
<paragraph
    title="10.1.49.C.01."

    tags="Infrastructure,Technical,Secure Area,Cable Management"


    classification="Top Secret"
    compliance="Must"
    cid="2249"
><![CDATA[<p>When penetrating an audio secure area for cables, agencies MUST comply with all directions provided by GCSB.</p>]]></paragraph>
</block>
<block title="Wall outlet terminations"><paragraph
    title="10.1.50.R.01."

    tags="Infrastructure,Technical,Cable Management"


><![CDATA[<p>Wall outlet boxes are the preferred method of connecting cable infrastructure to workstations and other equipment. They allow the management of cabling and can utilise a variety of connector types for allocation to different classifications.</p>]]></paragraph>
<paragraph
    title="10.1.50.C.01."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Must"
    cid="2253"
><![CDATA[<p>Cable groups sharing a wall outlet MUST use different connectors for systems of different classifications.</p>]]></paragraph>
<paragraph
    title="10.1.50.C.02."

    tags="Infrastructure,Technical,Cable Management"


    classification="Top Secret"
    compliance="Must"
    cid="2254"
><![CDATA[<p>In areas containing outlets for both TOP SECRET systems and systems of other classifications, agencies MUST ensure that the connectors for the TOP SECRET systems are different to those of the other systems.</p>]]></paragraph>
<paragraph
    title="10.1.50.C.03."

    tags="Infrastructure,Technical,Cable Management"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="2255"
><![CDATA[<p>Cable outlets MUST be labelled with the system classification and connector type.</p>]]></paragraph>
<paragraph
    title="10.1.50.C.04."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Should"
    cid="2256"
><![CDATA[<p>Cable outlets SHOULD be labelled with the system classification and connector type.</p>]]></paragraph>
</block>
<block title="Power Filters"><paragraph
    title="10.1.51.R.01."

    tags="Infrastructure,Technical,Cable Management"


><![CDATA[<p>Power filters are used to provide a filtered (clean) power supply and reduce opportunity for technical attacks. See also <a title="Power Filters" href="http://nzism.gcsb.govt.nz/ism-document#Block-13568">10.1.32</a>.</p>]]></paragraph>
<paragraph
    title="10.1.51.C.01."

    tags="Infrastructure,Technical,Cable Management"


    classification="All Classifications"
    compliance="Should"
    cid="5899"
><![CDATA[<p>Power filters SHOULD be used to provide a filtered power supply and reduce opportunity for technical attacks.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="10.2. Cable Management for Non-Shared Government Facilities"><subsection title="Objective"><paragraph
    title="10.2.1."


><![CDATA[<p>Cable management systems in non-shared government facilities are implemented in a secure and easily inspectable and maintainable way.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="10.2.2."


><![CDATA[<p>This section provides specific requirements for cabling installed in <strong>non-shared</strong> Government facilities.</p><ul>
<li>A <strong>non-shared</strong> facility is a facility occupied <strong>solely</strong> by a single agency.</li>
<li>A <strong>shared</strong> facility is a facility occupied by <strong>more than one</strong> agency.  A shared facility should have stricter physical and technical security controls than a non-shared facility. </li>
</ul>]]></paragraph>
<paragraph
    title="10.2.3."


><![CDATA[<p>This section is to be applied in addition to common requirements for cabling as outlined in the <a title="Cable management fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-13522">Section 10.1 - Cable Management Fundamentals</a>.</p>]]></paragraph>
</block>
<block title="Applicability of controls within this section"><paragraph
    title="10.2.4."


><![CDATA[<p>The controls within this section are only applicable to communications infrastructure located within facilities in New Zealand. For deployable platforms or facilities outside of New Zealand, Emanation Security Threat Assessments (<a title="Emanation Security Threat Assessments" href="http://nzism.gcsb.govt.nz/ism-document#Section-13859">Section 10.7</a>) of this manual will need to be consulted.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="10.2.5."


><![CDATA[<p class="NormS10C2">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong><strong>NZCSS 400</strong></strong></td>
<td><strong>New Zealand Communications Security Standard No 400 (Document classified CONFIDENTIAL)</strong></td>
<td style="text-align: center;">GCSB</td>
<td>
<p>GCSB</p>
<p>CONFIDENTIAL document available on application to authorised personnel</p>
</td>
</tr>
<tr>
<td>
<p><strong><strong>AS/NZS 3000:2007/Amdt 2:2012</strong></strong></p>
</td>
<td>
<p><strong>Electrical Installations (Known as the Australia/New Zealand Wiring Rules</strong></p>
</td>
<td style="text-align: center;">
<p>Standards NZ</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz/</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Cabling Inspection"><paragraph
    title="10.2.6.R.01."

    tags="Infrastructure,Technical,Cable Management,Non-shared Government Facilities"


><![CDATA[<p>Regular inspections of cable installations are necessary to detect any unauthorised or malicious tampering or cable degradation.</p>]]></paragraph>
<paragraph
    title="10.2.6.C.01."

    tags="Infrastructure,Technical,Cable Management,Non-shared Government Facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2270"
><![CDATA[<p>In TOP SECRET areas or zones, all cabling MUST be inspectable at a minimum of five-metre intervals.</p>]]></paragraph>
<paragraph
    title="10.2.6.C.02."

    tags="Infrastructure,Technical,Cable Management,Non-shared Government Facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2271"
><![CDATA[<p>Cabling SHOULD be inspectable at a minimum of five-metre intervals.</p>]]></paragraph>
</block>
<block title="Cables sharing a common reticulation system"><paragraph
    title="10.2.7.R.01."

    tags="Infrastructure,Technical,Cable Management,Non-shared Government Facilities"


><![CDATA[<p>Laying cabling in a neat and controlled manner, observing separation requirements, allows for inspections and reduces the need for individual cable trays for each classification.</p>]]></paragraph>
<paragraph
    title="10.2.7.C.01."

    tags="Infrastructure,Technical,Cable Management,Non-shared Government Facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2274"
><![CDATA[<p>Approved cable groups may share a common reticulation system but SHOULD have either a dividing partition or a visible gap between the differing cable groups or bundles.</p>]]></paragraph>
</block>
<block title="Cabling in walls"><paragraph
    title="10.2.8.R.01."

    tags="Infrastructure,Technical,Cable Management,Non-shared Government Facilities"


><![CDATA[<p>Cabling run correctly in walls allows for neater installations while maintaining separation and inspectability requirements.</p>]]></paragraph>
<paragraph
    title="10.2.8.C.01."

    tags="Infrastructure,Technical,Cable Management,Non-shared Government Facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2277"
><![CDATA[<p>Flexible or plastic conduit SHOULD be used in walls to run cabling from cable trays to wall outlets.</p>]]></paragraph>
</block>
<block title="Cabinet separation"><paragraph
    title="10.2.9.R.01."

    tags="Infrastructure,Technical,Cable Management,Non-shared Government Facilities"


><![CDATA[<p>Having a definite gap between cabinets allows for ease of inspections for any unauthorised or malicious cabling or cross patching.</p>]]></paragraph>
<paragraph
    title="10.2.9.C.01."

    tags="Infrastructure,Technical,Cable Management,Non-shared Government Facilities"


    classification="Top Secret"
    compliance="Should"
    cid="2280"
><![CDATA[<p>TOP SECRET cabinets SHOULD have a visible inspectable gap between themselves and lower classified cabinets.</p>]]></paragraph>
</block>
<block title="Power Filters"><paragraph
    title="10.2.10.R.01."

    tags="Infrastructure,Technical,Cable Management,Non-shared Government Facilities"


><![CDATA[<p>Power filters are used to provide a filtered (clean) power supply and reduce opportunity for technical attacks. See also <a title="Power Filters" href="http://nzism.gcsb.govt.nz/ism-document#Block-13568">10.1.32</a>.</p>]]></paragraph>
<paragraph
    title="10.2.10.C.01."

    tags="Infrastructure,Technical,Cable Management,Non-shared Government Facilities"


    classification="All Classifications"
    compliance="Should"
    cid="5902"
><![CDATA[<p>Power filters SHOULD be used to provide a filtered power supply and reduce opportunity for technical attacks.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="10.3. Cable Management for Shared Government Facilities"><subsection title="Objective"><paragraph
    title="10.3.1."


><![CDATA[<p>Cable management systems in shared government facilities are implemented in a secure and easily inspectable and maintainable way.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="10.3.2."


><![CDATA[<p>This section provides specific requirements for cabling installed in <strong>shared</strong> Government facilities.</p><ul>
<li>A <strong>shared</strong> facility is a facility occupied by <strong>more than one</strong> agency.  A shared facility should have stricter physical and technical security controls than a non-shared facility. </li>
<li>A <strong>non-shared</strong> facility is a facility occupied <strong>solely</strong> by a single agency.</li>
</ul>]]></paragraph>
<paragraph
    title="10.3.3."


><![CDATA[<p>This section is to be applied in addition to common requirements for cabling as outlined in the&nbsp;<a title="Cable management fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-13522">Section 10.1 - Cable Management Fundamentals</a>.</p>]]></paragraph>
</block>
<block title="Applicability of controls within this section"><paragraph
    title="10.3.4."


><![CDATA[<p>The controls within this section are applicable only to communications infrastructure located within facilities in New Zealand. For deployable platforms or facilities outside of New Zealand, Emanation Security Threat Assessments (<a title="Emanation Security Threat Assessments" href="http://nzism.gcsb.govt.nz/ism-document#Section-13859">Section 10.7</a>) of this chapter of this manual will need to be consulted.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Use of fibre optic cabling"><paragraph
    title="10.3.5.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


><![CDATA[<p>Fibre optic cabling does not produce and is not influenced by electromagnetic emanations; as such it offers the highest degree of protection from electromagnetic emanation effects especially in a shared facility where you do not have total control over other areas of the facility.</p>]]></paragraph>
<paragraph
    title="10.3.5.R.02."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


><![CDATA[<p>It is more difficult to tap than copper cabling.</p>]]></paragraph>
<paragraph
    title="10.3.5.R.03."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


><![CDATA[<p>Many more fibres can be run per cable diameter than wired cables thereby reducing cable infrastructure costs.</p>]]></paragraph>
<paragraph
    title="10.3.5.R.04."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


><![CDATA[<p>Fibre cable is the best method to future proof against unforeseen threats.</p>]]></paragraph>
<paragraph
    title="10.3.5.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2295"
><![CDATA[<p>Agencies SHOULD use fibre optic cabling.</p>]]></paragraph>
</block>
<block title="Cabling inspection"><paragraph
    title="10.3.6.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


><![CDATA[<p>In a shared facility it is important that cabling systems are inspected for illicit tampering and damage on a regular basis and have stricter controls than a non-shared facility.</p>]]></paragraph>
<paragraph
    title="10.3.6.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2299"
><![CDATA[<p>In TOP SECRET areas, cables MUST be fully inspectable for their entire length.</p>]]></paragraph>
<paragraph
    title="10.3.6.C.02."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2298"
><![CDATA[<p>Cabling SHOULD be inspectable at a minimum of five-metre intervals.</p>]]></paragraph>
</block>
<block title="Cables sharing a common reticulation system"><paragraph
    title="10.3.7.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


><![CDATA[<p>In a shared facility with another government agency, tighter controls may be required for sharing reticulation systems. Note also the red/black separation requirements in paragraph <a title="Black/Red Cable separation" href="http://nzism.gcsb.govt.nz/ism-document#Block-13532">10.1.5</a>.</p>]]></paragraph>
<paragraph
    title="10.3.7.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2302"
><![CDATA[<p>Approved cable groups SHOULD have either a dividing partition or a visible gap between the individual cable groups. If the partition or gap exists, cable groups may share a common reticulation system.</p>]]></paragraph>
</block>
<block title="Enclosed cable reticulation systems"><paragraph
    title="10.3.8.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


><![CDATA[<p>In a shared facility with another government agency, TOP SECRET cabling is enclosed in a sealed reticulation system to restrict access and control cable management.</p>]]></paragraph>
<paragraph
    title="10.3.8.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


    classification="Top Secret"
    compliance="Should"
    cid="2305"
><![CDATA[<p>The front covers of conduits, ducts and cable trays in floors, ceilings and of associated fittings that contain TOP SECRET cabling, SHOULD be clear plastic.</p>]]></paragraph>
</block>
<block title="Cabling in walls"><paragraph
    title="10.3.9.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


><![CDATA[<p>In a shared facility with another government agency, cabling run correctly in walls allows for neater installations while maintaining separation and inspectability requirements. Controls are slightly more stringent than in a non-shared facility.</p>]]></paragraph>
<paragraph
    title="10.3.9.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2308"
><![CDATA[<p>Cabling from cable trays to wall outlets SHOULD run in flexible or plastic conduit.</p>]]></paragraph>
</block>
<block title="Wall penetrations"><paragraph
    title="10.3.10.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


><![CDATA[<p>Wall penetrations by cabling, requires the integrity of the classified area to be maintained. All cabling is encased in conduit with no gaps in the wall around the conduit. This prevents any visual access to the secure area.</p>]]></paragraph>
<paragraph
    title="10.3.10.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


    classification="Top Secret"
    compliance="Should"
    cid="2311"
><![CDATA[<p>For wall penetrations that exit into a lower classified area, cabling SHOULD be encased in conduit with all gaps between the conduit and the wall filled with an appropriate sealing compound.</p>]]></paragraph>
</block>
<block title="Power reticulation"><paragraph
    title="10.3.11.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


><![CDATA[<p>In a shared facility with lesser-classified systems, it is important that TOP SECRET systems have control over the power system to prevent denial of service by deliberate or accidental means.</p>]]></paragraph>
<paragraph
    title="10.3.11.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


    classification="Top Secret"
    compliance="Should"
    cid="2314"
><![CDATA[<p>TOP SECRET facilities SHOULD have a power distribution board, separately reticulated, located within the TOP SECRET area and supply UPS power to all equipment.</p>]]></paragraph>
</block>
<block title="Power Filters"><paragraph
    title="10.3.12.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


><![CDATA[<p>Power filters are used to provide a filtered (clean) power supply and reduce opportunity for technical attacks. See also <a title="Power Filters" href="http://nzism.gcsb.govt.nz/ism-document#Block-13568">10.1.32</a>.</p>]]></paragraph>
<paragraph
    title="10.3.12.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2317"
><![CDATA[<p>Power filters SHOULD be used to provide a filtered power supply and reduce opportunity for technical attacks.</p>]]></paragraph>
</block>
<block title="Cabinet separation"><paragraph
    title="10.3.13.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


><![CDATA[<p>Having a visible gap between cabinets facilitates inspection for any unauthorised, malicious or cross patch cabling.</p>]]></paragraph>
<paragraph
    title="10.3.13.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Government Facilities"


    classification="Top Secret"
    compliance="Should"
    cid="2320"
><![CDATA[<p>TOP SECRET cabinets SHOULD have a visible gap to separate them from lower classified cabinets.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="10.4. Cable Management for Shared Non-Government Facilities"><subsection title="Objective"><paragraph
    title="10.4.1."

    tags="Technical"


><![CDATA[<p>Cable management systems are implemented in shared non-government facilities to minimise risks to data and information.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="10.4.2."


><![CDATA[<p>This section provides specific requirements for cabling installed in facilities shared by agencies and non-government organisations. This section is to be applied in addition to common requirements for cabling as outlined in <a title="Cable management fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-13522">Section 10.1 - Cable Management Fundamentals</a> section.</p>]]></paragraph>
</block>
<block title="Applicability of controls within this section"><paragraph
    title="10.4.3."


><![CDATA[<p>The controls within this section are applicable only to communications infrastructure located within facilities in New Zealand. For deployable platforms or facilities outside New Zealand, Emanation Security Threat Assessments (<a title="Emanation Security Threat Assessments" href="http://nzism.gcsb.govt.nz/ism-document#Section-13859">Section 10.7</a>) of this chapter of this manual MUST be consulted.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Use of fibre optic cabling"><paragraph
    title="10.4.4.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>Fibre optic cabling is essential in a shared non-government facility. Fibre optic cabling does not produce and is not influenced by electromagnetic emanations; as such it offers the highest degree of protection from electromagnetic emanation effects especially in a shared non-government facility where an agency’s controls may have a limited effect outside the agency controlled area.</p>]]></paragraph>
<paragraph
    title="10.4.4.R.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>Fibre optic cable is more difficult to tap than copper cabling and anti-tampering monitoring can be employed to detect tampering.</p>]]></paragraph>
<paragraph
    title="10.4.4.R.03."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>Many more fibres can be run per cable diameter than wired cables, reducing cable infrastructure costs.</p>]]></paragraph>
<paragraph
    title="10.4.4.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2335"
><![CDATA[<p>In TOP SECRET areas, agencies MUST use fibre optic cabling.</p>]]></paragraph>
<paragraph
    title="10.4.4.C.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2336"
><![CDATA[<p>Agencies SHOULD use fibre optic cabling.</p>]]></paragraph>
</block>
<block title="Cabling inspection"><paragraph
    title="10.4.5.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>In a shared non-government facility, it is imperative that cabling systems be inspectable for tampering and damage on a regular basis particularly where higher threat levels exist or where threats are unknown.</p>]]></paragraph>
<paragraph
    title="10.4.5.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2340"
><![CDATA[<p>In TOP SECRET areas, cables MUST be fully inspectable for their entire length.</p>]]></paragraph>
<paragraph
    title="10.4.5.C.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2341"
><![CDATA[<p>Cabling SHOULD be inspectable at a minimum of five-metre intervals.</p>]]></paragraph>
</block>
<block title="Cables sharing a common reticulation system"><paragraph
    title="10.4.6.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>In a shared non-government facility, tighter controls are placed on sharing reticulation systems as the threats attributable to tampering and damage are increased.</p>]]></paragraph>
<paragraph
    title="10.4.6.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2344"
><![CDATA[<p>In TOP SECRET areas, approved cable groups can share a common reticulation system but MUST have either a dividing partition or a visible gap between the differing cable groups.</p>]]></paragraph>
<paragraph
    title="10.4.6.C.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2345"
><![CDATA[<p>TOP SECRET cabling MUST run in a non-shared, enclosed reticulation system.</p>]]></paragraph>
<paragraph
    title="10.4.6.C.03."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2346"
><![CDATA[<p>Approved cable groups can share a common reticulation system but SHOULD have either a dividing partition or a visible gap between the differing cable groups.</p>]]></paragraph>
</block>
<block title="Enclosed cable reticulation systems"><paragraph
    title="10.4.7.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>In a shared non-government facility, TOP SECRET cabling is enclosed in a sealed reticulation system to prevent access and control cable management.</p>]]></paragraph>
<paragraph
    title="10.4.7.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2349"
><![CDATA[<p>In TOP SECRET areas, the front covers for conduits and cable trays in floors, ceilings and of associated fittings MUST be clear plastic or be inspectable and have tamper proof seals fitted.</p>]]></paragraph>
<paragraph
    title="10.4.7.C.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2350"
><![CDATA[<p>The front covers of conduits, ducts and cable trays in floors, ceilings and of associated fittings SHOULD be clear plastic or be inspectable and have tamper proof seals fitted.</p>]]></paragraph>
</block>
<block title="Cabling in walls or party walls"><paragraph
    title="10.4.8.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>In a shared non-government facility, cabling run correctly in walls allows for neater installations facilitating separation and inspectability. Controls are more stringent than in a non-shared facility or a shared government facility.</p>]]></paragraph>
<paragraph
    title="10.4.8.R.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>A party wall is a wall shared with an unclassified area where there is no control over access. In a shared non-government facility, cabling is not allowed in a party wall. An inner wall can be used to run cabling where the area is sufficient for inspection of the cabling.</p>]]></paragraph>
<paragraph
    title="10.4.8.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Confidential, Secret, Top Secret"
    compliance="Must Not"
    cid="2354"
><![CDATA[<p>Cabling MUST NOT run in a party wall.</p>]]></paragraph>
</block>
<block title="Sealing reticulation systems"><paragraph
    title="10.4.9.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>In a shared non-government facility, where the threats of access to cable reticulation systems is increased, GCSB endorsed anti-tamper seals are required to provide evidence of any tampering or illicit access.</p>]]></paragraph>
<paragraph
    title="10.4.9.R.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>In a shared non-government facility, all conduit joints and wall penetrations are sealed with a visible smear of glue or sealant to prevent access to cabling.</p>]]></paragraph>
<paragraph
    title="10.4.9.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2358"
><![CDATA[<p>Agencies MUST use GCSB endorsed tamper evident seals to seal all removable covers on reticulation systems, including:</p><ul>
<li>conduit inspection boxes;</li>
<li>outlet and junction boxes; and</li>
<li>T-pieces.</li>
</ul>]]></paragraph>
<paragraph
    title="10.4.9.C.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2359"
><![CDATA[<p>Tamper evident seals MUST be uniquely identifiable and a register kept of their unique number and location.</p>]]></paragraph>
<paragraph
    title="10.4.9.C.03."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2360"
><![CDATA[<p>Conduit joints MUST be sealed with glue or sealant.</p>]]></paragraph>
<paragraph
    title="10.4.9.C.04."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2361"
><![CDATA[<p>Conduit joints SHOULD be sealed with glue or sealant.</p>]]></paragraph>
</block>
<block title="Wall penetrations"><paragraph
    title="10.4.10.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>A cable wall penetration into a lesser-classified area requires the integrity of the classified area be maintained. All cabling is encased in conduit with no gaps in the wall around the conduit. This prevents any visual access to the secure area.</p>]]></paragraph>
<paragraph
    title="10.4.10.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="2365"
><![CDATA[<p>Wall penetrations that exit into a lower classified area, cabling MUST be encased in conduit with all gaps between the conduit and the wall filled with an appropriate sealing compound.</p>]]></paragraph>
</block>
<block title="Power reticulation"><paragraph
    title="10.4.11.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>In a shared non-government facility, it is important that TOP SECRET systems have control over the power system to prevent denial of service by deliberate or accidental means. The addition of a UPS is required to maintain availability of the TOP SECRET systems.</p>]]></paragraph>
<paragraph
    title="10.4.11.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="2368"
><![CDATA[<p>Secure facilities MUST have a power distribution board located within the secure area and supply UPS power all equipment.</p>]]></paragraph>
</block>
<block title="Power Filters"><paragraph
    title="10.4.12.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>Power filters are used to provide filtered (clean) power and reduce opportunity for technical attacks. Refer to <a title="Power Filters" href="http://nzism.gcsb.govt.nz/ism-document#Block-13568">10.1.32</a> or consult the GCSB for technical advice.</p>]]></paragraph>
<paragraph
    title="10.4.12.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2371"
><![CDATA[<p>Power filters MUST be used to provide filtered (clean) power and reduce opportunity for technical attacks.</p>]]></paragraph>
</block>
<block title="Equipment Cabinet separation"><paragraph
    title="10.4.13.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>A visible gap between equipment cabinets will make any cross-cabling obvious and will simplify inspections for unauthorised or compromising changes.</p>]]></paragraph>
<paragraph
    title="10.4.13.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="2374"
><![CDATA[<p>Equipment cabinets MUST have a visible gap or non-conductive isolator between cabinets of different classifications.</p>]]></paragraph>
<paragraph
    title="10.4.13.C.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2375"
><![CDATA[<p>There SHOULD be a visible inspectable gap or non-conductive isolator between equipment cabinets of different classifications.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="10.5. Cable Labelling and Registration"><subsection title="Objective"><paragraph
    title="10.5.1."


><![CDATA[<p>To facilitate cable management, and identify unauthorised additions or tampering.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="10.5.2."


><![CDATA[<p>This section covers information relating to the labelling of cabling infrastructure installed in secure areas.</p>]]></paragraph>
</block>
<block title="Applicability of controls within this section"><paragraph
    title="10.5.3."


><![CDATA[<p>The controls within this section are applicable only to communications infrastructure located within facilities in New Zealand. For deployable platforms or facilities outside New Zealand, Emanation Security Threat Assessments (<a title="Emanation Security Threat Assessment" href="http://nzism.gcsb.govt.nz/ism-document#Section-13859">Section 10.7</a>) of this chapter of this manual MUST be consulted.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Conduit label specifications"><paragraph
    title="10.5.4.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p>Conduit labelling of a specific size and colour will facilitate identifying secure conduits.</p>]]></paragraph>
<paragraph
    title="10.5.4.C.01."

    tags="Infrastructure,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2387"
><![CDATA[<p>Agencies MUST comply with the conduit label colours specified in the following table.</p><table class="table-secondary">
<tbody>
<tr>
<td>Classification</td>
<td>
<p>Cable colour</p>
</td>
</tr>
<tr>
<td>
<p>Compartmented Information (SCI)</p>
</td>
<td class="table-cell-orange">
<p>Orange/Yellow/Teal or other colour</p>
</td>
</tr>
<tr>
<td>
<p>TOP SECRET</p>
</td>
<td class="table-cell-red">Red</td>
</tr>
<tr>
<td>
<p>SECRET</p>
</td>
<td class="table-cell-blue">Blue</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td class="table-cell-green">Green</td>
</tr>
<tr>
<td>
<p>RESTRICTED and all lower classifications</p>
</td>
<td class="table-cell-black">Black</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Installing conduit labelling"><paragraph
    title="10.5.5.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p>Conduit labelling in public or reception areas should not draw undue attention to the level of classified processing or any other agency capability.</p>]]></paragraph>
<paragraph
    title="10.5.5.C.01."

    tags="Infrastructure,Technical"


    classification="All Classifications"
    compliance="Should Not"
    cid="2390"
><![CDATA[<p>Conduit labels installed in public or visitor areas SHOULD NOT be labelled in such a way as to draw attention to or reveal classification of data processed or other agency capability.</p>]]></paragraph>
</block>
<block title="Labelling wall outlet boxes"><paragraph
    title="10.5.6.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p>Clear labelling of wall outlet boxes reduces the possibility of incorrectly attaching IT equipment of a lesser classification to the wrong outlet.</p>]]></paragraph>
<paragraph
    title="10.5.6.C.01."

    tags="Infrastructure,Technical"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="2393"
><![CDATA[<p>Wall outlet boxes MUST denote the classification, cable and outlet numbers.</p>]]></paragraph>
<paragraph
    title="10.5.6.C.02."

    tags="Infrastructure,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2394"
><![CDATA[<p>Wall outlet boxes SHOULD denote the classification, cable and outlet numbers.</p>]]></paragraph>
</block>
<block title="Standard operating procedures"><paragraph
    title="10.5.7.R.01."

    tags="Infrastructure,Technical,SOPs"


><![CDATA[<p>Recording labelling conventions in SOPs facilitates maintenance and fault finding.</p>]]></paragraph>
<paragraph
    title="10.5.7.C.01."

    tags="Infrastructure,Technical,SOPs"


    classification="All Classifications"
    compliance="Should"
    cid="2397"
><![CDATA[<p>The SOPs SHOULD record the site conventions for labelling and registration.</p>]]></paragraph>
</block>
<block title="Labelling cables"><paragraph
    title="10.5.8.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p>Labelling cables with the correct socket number, equipment type, source or destination minimises the likelihood of improperly cross connecting equipment and can assist in fault finding and configuration management.</p>]]></paragraph>
<paragraph
    title="10.5.8.C.01."

    tags="Infrastructure,Technical"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2400"
><![CDATA[<p>Agencies MUST label cables at each end, with sufficient information to enable the physical identification and inspection of the cable.</p>]]></paragraph>
<paragraph
    title="10.5.8.C.02."

    tags="Infrastructure,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2401"
><![CDATA[<p>Agencies SHOULD label cables at each end, with sufficient information to enable the physical identification and inspection of the cable.</p>]]></paragraph>
</block>
<block title="Cable register"><paragraph
    title="10.5.9.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p>Cable registers provide a source of information that assessors can view to verify compliance.</p>]]></paragraph>
<paragraph
    title="10.5.9.C.01."

    tags="Infrastructure,Technical"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2404"
><![CDATA[<p>Agencies MUST maintain a register of cables.</p>]]></paragraph>
<paragraph
    title="10.5.9.C.02."

    tags="Infrastructure,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2405"
><![CDATA[<p>Agencies SHOULD maintain a register of cables.</p>]]></paragraph>
</block>
<block title="Cable register contents"><paragraph
    title="10.5.10.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p>Cable registers allow installers and assessors to trace cabling for inspection, tampering or accidental damage. It tracks all cable management changes through the life of the system.</p>]]></paragraph>
<paragraph
    title="10.5.10.C.01."

    tags="Infrastructure,Technical"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="2408"
><![CDATA[<p>The cable register MUST record at least the following information:</p><ul>
<li>cable identification number;</li>
<li>classification;</li>
<li>socket number, equipment type, source or destination site/floor plan diagram; and</li>
<li>seal numbers if applicable.</li>
</ul>]]></paragraph>
<paragraph
    title="10.5.10.C.02."

    tags="Infrastructure,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2409"
><![CDATA[<p>The cable register SHOULD record at least the following information:</p><ul>
<li>cable identification number;</li>
<li>classification;</li>
<li>socket number, equipment type, source or destination site/floor plan diagram; and</li>
<li>seal numbers if applicable.</li>
</ul>]]></paragraph>
</block>
<block title="Cable inspections"><paragraph
    title="10.5.11.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p>Regular cable inspections, are a method of checking the cable management system against the cable register as well as detecting tampering, damage, breakages or other anomalies.</p>]]></paragraph>
<paragraph
    title="10.5.11.C.01."

    tags="Infrastructure,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2412"
><![CDATA[<p>Agencies SHOULD inspect cables for inconsistencies with the cable register in accordance with the frequency defined in the SSP.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="10.6. Patch Panels, Patch Cables and Racks"><subsection title="Objective"><paragraph
    title="10.6.1."


><![CDATA[<p class="NormS10C6">Cable termination, patch panels, patch cables and racks are designed to prevent emanations, cross-connecting or cross-patching systems of differing classifications as well as following good engineering practice.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="10.6.2."


><![CDATA[<p>This section covers information relating to the configuration and installation of patch panels, patch cables and fly leads associated with communications systems.</p>]]></paragraph>
<paragraph
    title="10.6.3."


><![CDATA[<p class="NormS10C6">Reference should also be made to:</p><ul>
<li><a title="Tamper Evident Seals" href="http://nzism.gcsb.govt.nz/ism-document#Section-13339">Section 8.5 – Tamper-evident seals</a>;</li>
<li><a title="Cable management fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-13522">Section 10.1 – Cable management fundamentals</a>;</li>
<li><a title="Emanation Security Threat Assessments" href="http://nzism.gcsb.govt.nz/ism-document#Section-13859">Section 10.7 – Emanation Security Threat Assessments</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Applicability of controls within this section"><paragraph
    title="10.6.4."


><![CDATA[<p>The controls within this section are applicable to all communications infrastructure located within facilities in New Zealand. For deployable platforms or facilities outside New Zealand the Emanation Security Threat Assessments (<a title="Emanation Security Threat Assessments" href="http://nzism.gcsb.govt.nz/ism-document#Section-13859">Section 10.7</a>) of this chapter of this manual MUST be consulted.</p>]]></paragraph>
</block>
<block title="Exception for patch cable and fly lead connectors"><paragraph
    title="10.6.5."


><![CDATA[<p>For patch cables, the same connectors can be used for different classifications <strong>if</strong> the length of the higher classified patch cables is <strong>less</strong> than the distance between the higher classified patch panel and any patch panel of a lower classification.</p>]]></paragraph>
</block>
<block title="Fibre optic patch panels"><paragraph
    title="10.6.6."


><![CDATA[<p class="NormS10C6">For Fibre optic patch panels are sometimes also described as fibre distribution panels.  Their principal function is to safety terminate the fibre optic cable and provide connection access to the cable’s individual fibres.</p>]]></paragraph>
<paragraph
    title="10.6.7."


><![CDATA[<p class="NormS10C6">Fibre patch panels are termination units, providing a secure, organised chamber for housing connectors and splice units while organising, managing and protecting fibre optic cable, splices and connectors.</p>]]></paragraph>
<paragraph
    title="10.6.8."


><![CDATA[<p class="NormS10C6">Fibre patch panels can be either rack mounted or wall mounted and are usually placed near terminating equipment and connected with patch cables.  Free standing patch panel racks are also available.  Patch panels may also be mounted within standard equipment racks.</p>]]></paragraph>
<paragraph
    title="10.6.9."


><![CDATA[<p class="NormS10C6">Rack mount panels may have flat or angled faces to assist in organising the cables themselves.  Angled panels are intended to direct patch cables into vertical cable managers on either side of the rack.  This facilitates maintenance and reduces the requirement for horizontal cable management.</p>]]></paragraph>
<paragraph
    title="10.6.10."


><![CDATA[<p>Fibre patch panels can accommodate fibre adapter panels (also called connector panels), associated trunk cables, connectors, patch cords, and usually integrate cable management.</p>]]></paragraph>
<paragraph
    title="10.6.11."


><![CDATA[<p class="NormS10C6">There are several components in a fibre patch panel which may include:</p><ul>
<li>Chassis or frame;</li>
<li>Drawer to facilitate access for installation and maintenance;</li>
<li>Cassette;</li>
<li>Coupler panels (adapter panels) – to hold the connector couplers;</li>
<li>The connector couplers (connector adapters);</li>
<li>Splice tray – organises and secures splice modules;</li>
<li>Patch cable management trays.</li>
</ul>]]></paragraph>
<paragraph
    title="10.6.12."


><![CDATA[<p class="NormS10C6">While well over 80 different fibre optic cable connector types have been manufactured, there are between 15 and 20 types in common use.</p>]]></paragraph>
</block>
<block title="Multimedia Patch Panels"><paragraph
    title="10.6.13."


><![CDATA[<p class="NormS10C6">A multimedia modular panel allows copper and fibre cables to be terminated in the same rack mount space.  It accommodates several different adapters, suited for Cat6a/6/5e/5 Ethernet cables and fibre patch cables.</p>]]></paragraph>
</block>
<block title="Rack Layout and Cable Management"><paragraph
    title="10.6.14."


><![CDATA[<p class="NormS10C6">Standardised rack layouts and cable management are important for engineering support, security, equipment cooling and to minimise accidental or unnecessary outages.  Many data centres will dictate a hotside (hot air out) and coldside (cold air in).  The hotside is generally the rear of equipment and the rack.  The coldside is generally the front panel of equipment and rack.  The ducting of hot/cold air is often also standardised. </p>]]></paragraph>
<paragraph
    title="10.6.15."


><![CDATA[<p class="NormS10C6"> Standardising rack layout and cable management minimises problems caused by:</p><ul>
<li>Accidently not being able to locate end points of network and patch cables without tracing the cable end to end.</li>
<li>Physically impeding access to equipment.</li>
<li>Positioning of equipment and cables such that airflow (cooling) is impeded.  As the density of equipment in racks increases, cooling becomes an increasingly important factor.  Poor rack design combined with dense rack utilization can contribute to internal rack temperatures significantly higher than ambient room temperatures.</li>
</ul>]]></paragraph>
<paragraph
    title="10.6.16."


><![CDATA[<p class="NormS10C6">Standardising rack layout and cable management also assists in the maintenance of separation and segregation between RED/BLACK systems.</p>]]></paragraph>
</block>
<block title="Standardised Rack Configuration"><paragraph
    title="10.6.17."


><![CDATA[<p>Separate <strong>RED/BLACK</strong> racks are easier to manage, build and maintain and reduce the opportunity for accidental or deliberate cross-connection of <strong>RED/BLACK</strong> systems.  Ideally separate <strong>RED/BLACK</strong> racks should be used.</p>]]></paragraph>
<paragraph
    title="10.6.18."


><![CDATA[<p class="NormS10C6">In small installations (typically single workstation) shared racks are unavoidable.&nbsp; In such cases a shared rack configuration is permissible <strong>provided</strong> separation elements and controls are properly implemented.&nbsp; Extra care must be taken to avoid accidental cross-connection of systems.&nbsp; The following illustrates a standardised shared rack configuration where RED/BLACK and power systems are separated:</p><p class="NormS10C6"><img class="leftAlone" title="" src="assets/NZISM/10.6.18-Standardised-Rack-Configuration-updated-2020.PNG" alt="" width="432" height="479"></p><p class="NormS10C6"><strong>Figure 11: Separation of RED/BLACK</strong></p>]]></paragraph>
</block>
<block title="Separation of Cable Runs"><paragraph
    title="10.6.19."


><![CDATA[<p>In order to maintain the integrity of <strong>RED</strong>/<strong>BLACK</strong> separation, cables for power and data should be separately bundled as power <strong>RED</strong> or <strong>BLACK</strong> and data <strong>RED</strong> or <strong>BLACK</strong>.  Cables should be run with as much distance between the bundles as can be practically managed, within the constraints of cable feeds and rack configuration.  Ideally <strong>RED</strong> and <strong>BLACK</strong> should be on opposite sides of the rack. Cables should be no longer than required to avoid overlength cables compromising separation.</p>]]></paragraph>
</block>
<block title="Access to BLACK equipment and components by uncleared staff and contractors"><paragraph
    title="10.6.20."


><![CDATA[<p>In some instances there may be a requirement for external technical or other uncleared personnel to access <strong>BLACK</strong> equipment and components for servicing, repair or replacement.  Care must be taken to maintain the integrity of <strong>RED</strong> equipment and components.  This can be especially problematic in shared rack configurations as described above.</p><p>This requirement should be identified before installation takes place and segregation measures implemented.  Ideally physical separation of <strong>BLACK</strong> from <strong>RED</strong> is the best solution, recognising however, this may not always be possible or practical. Other solutions may include, for example, a shared rack that has two doors with the <strong>RED</strong> door locked and alarmed so that <strong>BLACK</strong> equipment can be accessed without compromising the security of <strong>RED</strong> equipment.  Discussion with the GCSB may identify other practical solutions.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="10.6.21."


><![CDATA[<p>Further References available below:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title&nbsp;&nbsp;</strong></td>
<td style="text-align: center;"><strong>Publisher&nbsp;</strong></td>
<td><strong>Source&nbsp;</strong></td>
</tr>
<tr>
<td><strong><strong>ISO/IEC 11801-5:2017</strong></strong></td>
<td><strong>Data centres</strong></td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="ISO/IEC 11801-5:2017" rel="noopener noreferrer" href="https://www.iso.org/standard/62247.html" target="_blank">https://www.iso.org/standard/62247.htm</a>l</td>
</tr>
<tr>
<td>
<p><strong><strong>ISO/IEC TR 14763-2-1:2011</strong></strong></p>
</td>
<td>
<p><strong>Information&nbsp;technology -- Implementation and&nbsp;operation of customer premises cabling&nbsp;-- Part 2-1: Planning and installation -&nbsp;Identifiers within administration&nbsp;systems</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="ISO/IEC TR 14763-2-1:2011" rel="noopener noreferrer" href="https://www.iso.org/standard/55236.html" target="_blank">https://www.iso.org/standard/55236.html</a></td>
</tr>
<tr>
<td>
<p><strong>ANSI/<strong>TIA-606-B</strong></strong></p>
</td>
<td>
<p><strong>Administration Standard for&nbsp;the Telecommunications Infrastructure&nbsp;of Commercial Buildings</strong></p>
</td>
<td style="text-align: center;">&nbsp;ANSI</td>
<td><a title="American National Standards Institute" rel="noopener noreferrer" href="https://www.ansi.org/" target="_blank">https://www.ansi.org</a></td>
</tr>
<tr>
<td>
<p><strong><strong>ANSI/TIA-942</strong></strong></p>
</td>
<td>
<p><strong>Telecommunications&nbsp;Infrastructure Standard for Data&nbsp;Centers</strong></p>
</td>
<td style="text-align: center;">&nbsp;ANSI</td>
<td><a title="American National Standards Institute" rel="noopener noreferrer" href="https://www.ansi.org/" target="_blank"><span>https://www.ansi.org</span></a></td>
</tr>
<tr>
<td>
<p><strong><strong>PD IEC/TR 62691:2016</strong></strong></p>
</td>
<td>
<p><strong>Optical fibre&nbsp;cables. Guidelines to the installation of&nbsp;optical fibre cables</strong></p>
</td>
<td style="text-align: center;">
<p>International&nbsp;Electrotechnical<br>Commission (IEC)&nbsp;Available through&nbsp;Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td><strong><strong>PD IEC/TR 62362:2010</strong></strong></td>
<td><strong>Selection of optical fibre cable specifications relative to mechanical, ingress, climatic or electromagnetic characteristics.</strong>
<p><strong>Guidance</strong></p>
</td>
<td style="text-align: center;">
<p>International&nbsp;Electrotechnical<br>Commission (IEC)&nbsp;Available through&nbsp;Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td><strong><strong>IEC 60794-2-31 Ed. 2.0 b(2012)</strong></strong></td>
<td><strong>Optical fibre cables - Part 2-31: Indoor cables - Detailed specification for optical fibre</strong>
<p><strong>ribbon cables for use in premises&nbsp;cabling</strong></p>
</td>
<td style="text-align: center;">
<p>International&nbsp;Electrotechnical<br>Commission (IEC)&nbsp;Available through&nbsp;Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td>
<p><strong><strong>IEC 60794-2-11 Ed. 2.0 b(2012)</strong></strong></p>
</td>
<td>
<p><strong>Optical&nbsp;fibre cables - Part 2-11: Indoor optical&nbsp;fibre cables - Detailed specification for&nbsp;simplex and duplex cables for use in&nbsp;premises cabling</strong></p>
</td>
<td style="text-align: center;">
<p>International&nbsp;Electrotechnical<br>Commission (IEC)&nbsp;Available through&nbsp;Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td><strong><strong>AS/NZS 2967:2014</strong></strong></td>
<td><strong>Optical fibre communication cabling systems safety</strong></td>
<td style="text-align: center;">
<p>Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td>
<p><strong><strong>AS/NZS 14763.3:2017</strong></strong></p>
</td>
<td>
<p><strong>Information technology - Implementation&nbsp;and operation of customer premises cabling&nbsp;- Part 3: Testing of optical fibre cabling</strong></p>
</td>
<td style="text-align: center;">
<p>Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td>
<p><strong><strong>AS/NZS IEC 60825.2:2011</strong></strong></p>
</td>
<td>
<p><strong>Safety of laser products - Part 2: Safety of&nbsp;optical fibre communication systems (OFCS)</strong></p>
</td>
<td style="text-align: center;">
<p>Standards New&nbsp;Zealand</p>
&nbsp;</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a>&nbsp;</td>
</tr>
<tr>
<td>
<p><strong><strong>AS/NZS ISO/IEC 24764:2012</strong></strong></p>
</td>
<td>
<p><strong>Generic&nbsp;cabling systems for data centres</strong></p>
</td>
<td style="text-align: center;">
<p>Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td>
<p><strong><strong>AS/NZS 61386.1:2015</strong></strong></p>
</td>
<td>
<p><strong>Conduit systems&nbsp;for cable management - Part 1: General&nbsp;requirements</strong></p>
</td>
<td style="text-align: center;">
<p>Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td>
<p><strong><strong>AS/NZS 61386.21:2015</strong></strong></p>
</td>
<td>
<p><strong>Conduit systems&nbsp;for cable management - Part 21: Particular&nbsp;requirements - Rigid conduit systems</strong></p>
</td>
<td style="text-align: center;">
<p>Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td>
<p><strong><strong>AS/NZS 61386.22:2015</strong></strong></p>
</td>
<td>
<p><strong>Conduit systems&nbsp;for cable management - Part 22: Particular&nbsp;requirements - Pliable conduit systems</strong></p>
</td>
<td style="text-align: center;">Standards New&nbsp;Zealand</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td>
<p><strong><strong>AS/NZS 61386.23:2015</strong></strong></p>
</td>
<td>
<p><strong>Conduit systems for cable management -&nbsp;Part 23: Particular requirements - Flexible&nbsp;conduit systems</strong></p>
</td>
<td style="text-align: center;">
<p>Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td>
<p><strong><strong>AS/NZS ISO/IEC 29125:2012</strong></strong></p>
</td>
<td>
<p><strong>Telecommunications cabling&nbsp;requirements for remote powering of&nbsp;data terminal equipment</strong></p>
</td>
<td style="text-align: center;">
<p>Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td>
<p><strong><strong>BS EN 61300-2-37:2016</strong></strong></p>
</td>
<td>
<p><strong>Fibre optic&nbsp;interconnecting devices and passive&nbsp;components. Basic test and&nbsp;measurement procedures. Tests. Cable&nbsp;bending for fibre optic closures</strong></p>
</td>
<td style="text-align: center;">
<p>British Standards&nbsp;Institution (BSI)&nbsp;Available through&nbsp;Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td>
<p><strong><strong>BS EN 60794-2-31:2013</strong></strong></p>
</td>
<td>
<p><strong>Optical fibre&nbsp;cables. Indoor cables. Detailed</strong><br><strong>specification for optical fibre ribbon&nbsp;cables for use in premises cabling</strong></p>
</td>
<td style="text-align: center;">
<p>British Standards&nbsp;Institution (BSI)&nbsp;Available through&nbsp;Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td><strong><strong>BS EN 50411-2:2008</strong></strong></td>
<td><strong>Fibre organisers and closures to be used in optical fibre</strong>
<p><strong>communication systems. Product&nbsp;specifications. General and guidance</strong><br><strong>for optical fibre cable joint closures,&nbsp;protected microduct closures, and</strong><br><strong>microduct connectors</strong></p>
</td>
<td style="text-align: center;">
<p>British Standards&nbsp;Institution (BSI)&nbsp;Available through&nbsp;Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td>
<p><strong><strong>BS EN 60794-2-30:2008</strong></strong></p>
</td>
<td>
<p><strong>Optical fibre&nbsp;cables. Indoor cables. Family</strong><br><strong>specification for ribbon cables</strong></p>
</td>
<td style="text-align: center;">
<p>British Standards&nbsp;Institution (BSI)&nbsp;Available through&nbsp;Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td>
<p><strong><strong>BS EN 60794-2-21:2012</strong></strong></p>
</td>
<td>
<p><strong>Optical fibre&nbsp;cables. Indoor optical fibre cables.</strong><br><strong>Detailed specification for multi-fibre&nbsp;optical distribution cables for use in</strong><br><strong>premises cabling</strong></p>
</td>
<td style="text-align: center;">
<p>British Standards&nbsp;Institution (BSI)&nbsp;Available through&nbsp;Standards New&nbsp;Zealand</p>
</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Terminations to patch panels"><paragraph
    title="10.6.22.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p>Cross-connecting a system to another system of a lesser classification through a patch panel may result in a data spill. A data spill could result in the following issues:</p><ul>
<li>inadvertent or deliberate access to information and systems by non-cleared personnel; and/or</li>
<li>information spilling to a system of another classification.</li>
</ul>]]></paragraph>
<paragraph
    title="10.6.22.R.02."

    tags="Infrastructure,Technical"


><![CDATA[<p class="Normal-nonumbering">Cross-connecting Cables run to patch panels are best managed by bundling similar classifications or groups together.&nbsp; RED/BLACK separations should be maintained at all times.&nbsp; A simple approach to this is to bundle and run RED cables up vertical rails of the cabinet and BLACK cables up the opposite side.&nbsp; Where multiple cabinets are installed sides may be alternated to ensure RED/RED and BLACK/BLACK groupings are maintained by running cables groups up/down/across separate rails in the cabinet or in separate conduits.</p>]]></paragraph>
<paragraph
    title="10.6.22.C.01."

    tags="Infrastructure,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2425"
><![CDATA[<p>Agencies MUST ensure that only approved cable groups terminate on a patch panel.</p>]]></paragraph>
<paragraph
    title="10.6.22.C.02."

    tags="Infrastructure,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="5607"
><![CDATA[<p>RED and BLACK cables must be separated and bundled.</p>]]></paragraph>
</block>
<block title="Patch cable and fly lead connectors"><paragraph
    title="10.6.23.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p>Cables equipped with connectors specific to a classification will prevent inadvertent cross-connection. These connectors can be keyed or have specific profiles to prevent connection to other systems.</p>]]></paragraph>
<paragraph
    title="10.6.23.C.01."

    tags="Infrastructure,Technical"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2428"
><![CDATA[<p>In areas containing cabling for multiple classifications, agencies MUST ensure that the connectors for each classification are distinct and different to those of the other classifications.</p>]]></paragraph>
<paragraph
    title="10.6.23.C.02."

    tags="Infrastructure,Technical"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2429"
><![CDATA[<p>In areas containing cabling for multiple classifications, agencies MUST document the selection of connector types for each classification.</p>]]></paragraph>
<paragraph
    title="10.6.23.C.03."

    tags="Infrastructure,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2430"
><![CDATA[<p>In areas containing cabling for systems of different classifications, agencies SHOULD ensure that the connectors for each system are different to those of the other systems.</p>]]></paragraph>
<paragraph
    title="10.6.23.C.04."

    tags="Infrastructure,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2431"
><![CDATA[<p>In areas containing cabling for systems of different classifications, agencies SHOULD document the selection of connector types.</p>]]></paragraph>
</block>
<block title="Physical separation of patch panels"><paragraph
    title="10.6.24.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p>Appropriate physical separation between systems classified <strong>CONFIDENTIAL</strong> or above and a system of a lesser<br>classification (RESTRICTED and below) will:</p><ul>
<li>reduce or eliminate the chances of cross patching between the systems; and</li>
<li>reduce or eliminate the possibility of unauthorised personnel or personnel gaining access to classified system elements.</li>
</ul><p>Refer also to <a title="Cable Management Fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-13522">10.1 – Cable Management Fundamentals</a> for the discussion on RED/BLACK concept and cable separation.</p>]]></paragraph>
<paragraph
    title="10.6.24.C.01."

    tags="Infrastructure,Technical"


    classification="Confidential, Secret, Top Secret"
    compliance="Should"
    cid="2434"
><![CDATA[<p>Agencies SHOULD physically separate patch panels of different classifications by installing them in separate cabinets.</p>]]></paragraph>
<paragraph
    title="10.6.24.C.02."

    tags="Infrastructure,Technical"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="2435"
><![CDATA[<p>Where spatial constraints demand patch panels of different classification are located in the same cabinet, agencies MUST:</p><ul>
<li>provide a physical barrier within the cabinet to separate patch panels;</li>
<li>ensure that only personnel cleared to the highest classification of the circuits in the panel have access to the cabinet; and</li>
<li>obtain approval from the relevant Accreditation Authority prior to installation.</li>
</ul>]]></paragraph>
</block>
<block title="Cabinet Arrangement"><paragraph
    title="10.6.25.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p class="Normal-nonumbering">Standardised layout of rack and cabinets facilitates maintenance and reduces risk of accidental cross-connects.&nbsp; Cabinets may also include UPS or other power supply equipment which is most appropriately housed at the bottom of the cabinet.&nbsp; RED/BLACK separations of equipment and cables should be maintained.&nbsp; Refer to <a title="Rack layout and cable management" href="http://nzism.gcsb.govt.nz/ism-document#Block-13807">10.6.16</a> in the Context above.</p>]]></paragraph>
<paragraph
    title="10.6.25.C.01."

    tags="Infrastructure,Technical"


    classification="Secret, Confidential, Top Secret"
    compliance="Should"
    cid="5610"
><![CDATA[<p class="Normal-nonumbering">Agencies SHOULD arrange the installation of cabinets as follows:</p><ul>
<li>RED equipment at the top;</li>
<li>BLACK equipment in the centre;</li>
<li>Power equipment at the bottom.</li>
</ul>]]></paragraph>
</block>
<block title="Rack Diagrams"><paragraph
    title="10.6.26.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p class="Normal-nonumbering">A rack diagram is a two-dimensional elevation drawing showing the layout or arrangement of equipment on a rack.  It may show the front and the rear elevation of the rack layout.  It does not have to be drawn to scale.   This provides essential information when maintenance or development is undertaken or new equipment installed.</p>]]></paragraph>
<paragraph
    title="10.6.26.C.01."

    tags="Infrastructure,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="5613"
><![CDATA[<p>Agencies SHOULD record equipment layouts and other relevant information on rack diagrams.</p>]]></paragraph>
</block>
<block title="Fly lead installation"><paragraph
    title="10.6.27.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p>Keeping the lengths of fly leads to a minimum prevents clutter around desks, prevents damage to fibre optic cabling and reduces the chance of cross patching and tampering. If lengths become excessive then agencies will need to treat the cabling as infrastructure and run it in conduit or fixed infrastructure such as desk partitioning. Secure patch cords properly to keep them off the floor or the base of racks, where they can be stepped on.</p>]]></paragraph>
<paragraph
    title="10.6.27.C.01."

    tags="Infrastructure,Technical"


    classification="Confidential, Top Secret, Secret"
    compliance="Should"
    cid="2438"
><![CDATA[<p>Agencies SHOULD ensure that the fibre optic fly leads used to connect wall outlets to IT equipment either:</p><ul>
<li>do not exceed 5m in length; or</li>
<li>if they exceed 5m in length:
<ul>
<li>are run in the facility’s fixed infrastructure in a protective and easily inspected pathway;</li>
<li>are clearly labelled at the equipment end with the wall outlet designator; and</li>
<li>are approved by the Accreditation Authority.</li>
</ul>
</li>
</ul><p>&nbsp;</p>]]></paragraph>
</block>
<block title="Earthing and Bonding"><paragraph
    title="10.6.28.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p>It is important that any metal trays or metal catenary are earthed for both safety and to avoid creating any fortuitous conductors.  Effective earthing also depends on properly bonding all conductive elements of a cabinet, rack or case housing any equipment.  Bonding requires good mechanical and electrical connection between conductive elements through bolts and nuts and/or earth straps or jump leads.  Specialist bonding hardware is widely available.</p>]]></paragraph>
<paragraph
    title="10.6.28.C.01."

    tags="Infrastructure,Technical"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="5621"
><![CDATA[<p>All earthing points MUST be equipotentially bonded.</p>]]></paragraph>
<paragraph
    title="10.6.28.C.02."

    tags="Infrastructure,Technical"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="5623"
><![CDATA[<p>All conductive elements of a cabinet, rack or case housing any equipment MUST be earth bonded.</p>]]></paragraph>
</block>
<block title="Cable Management"><paragraph
    title="10.6.29.R.01."

    tags="Infrastructure,Technical,Cable Management"


><![CDATA[<p>Good cable management facilitates maintenance, promotes air flow and cooling, reduces risk of accidental cross-connects or disconnects and supports safe operation.</p>]]></paragraph>
<paragraph
    title="10.6.29.C.01."

    tags="Infrastructure,Technical,Cable Management"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="5626"
><![CDATA[<p>Cabinet rails MUST be installed to:</p><ul>
<li>provide adequate room for patch cables and wire managers;</li>
<li>provide adequate space for cable management at front, sides, and rear; and</li>
<li>arrange switches and patch panels to minimize patching between cabinets &amp; racks.</li>
</ul>]]></paragraph>
</block>
<block title="Labelling Cables"><paragraph
    title="10.6.30.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p>The labelling principles include the following:</p><ul>
<li>Labelling is logical and consistent, across all locations, matching the project drawings;</li>
<li>The labelling scheme identifies any associated physical locations (building, room, cabinet, rack, port, etc.);</li>
<li>Labelling is easily read, durable, and capable of surviving for the life of the component that was labelled;</li>
<li>The labelling system, and the identifiers used, are agreed upon by all stakeholders; and</li>
<li>Labelling is all-encompassing and include cables, connecting hardware, conduits, firestops, grounding and bonding locations, racks, cabinets, ports, and telecommunications spaces.</li>
</ul>]]></paragraph>
<paragraph
    title="10.6.30.R.02."

    tags="Infrastructure,Technical"


><![CDATA[<p>Specific labelling requirements include:</p><ul>
<li>All labels use a permanent identifier;</li>
<li>The labelling/numbering scheme is logical in its organisation, using alphanumeric characters for ease of reference;</li>
<li>Each cable and each pathway is labelled on each end, and each label identifies the termination points of both ends of the cable;</li>
<li>All labels are legible, defacement resistance, and have high adhesion characteristics and durability;</li>
<li>Labels are placed so they can be read without disconnecting a cable;</li>
<li>Labels for station connections may appear on the face plate;</li>
<li>All jack, connector, and block hardware are be labelled on either the outlet or panel; and</li>
<li>All labels match with the any installation and maintenance records.</li>
</ul>]]></paragraph>
<paragraph
    title="10.6.30.C.01."

    tags="Infrastructure,Technical"


    classification="Top Secret, Confidential, Secret"
    compliance="Should"
    cid="5627"
><![CDATA[<p>Agencies SHOULD implement the principles and specific cable labelling requirements described above.</p>]]></paragraph>
</block>
<block title="Power Cords"><paragraph
    title="10.6.31.R.01."

    tags="Infrastructure,Technical"


><![CDATA[<p>It is important to separate copper data cables and power cables as all power feeds, line and connectors have the potential to emanate, create magnetic fields and cause interference with copper data cables if laid in close proximity to each other.  Good practice is to:</p><ul>
<li>Label power cords at both ends to minimise the risk inadvertently disconnecting the wrong power cord;</li>
<li>Colour code power cords and power strips;</li>
<li>Use locking power cords, receptacles, or retention clips.</li>
</ul>]]></paragraph>
<paragraph
    title="10.6.31.C.01."

    tags="Infrastructure,Technical"


    classification="Confidential, Secret, Top Secret"
    compliance="Should"
    cid="5619"
><![CDATA[<p>Agencies SHOULD follow best practice described above for the installation of power cables.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="10.7. Emanation Security Threat Assessments"><subsection title="Objective"><paragraph
    title="10.7.1."


><![CDATA[<p>In order to minimise compromising emanations or the opportunity for a technical attack, a threat assessment is used to determine appropriate countermeasures.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="10.7.2."


><![CDATA[<p>This section relates to emanation security threat assessment advice and identification of appropriate countermeasures to minimise the loss of classified information through compromising emanations or a technical attack.</p>]]></paragraph>
<paragraph
    title="10.7.3."


><![CDATA[<p>This section is applicable to:</p><ul>
<li>agencies located outside New Zealand;</li>
<li>secure facilities within New Zealand; and</li>
<li>mobile platforms and deployable assets that process classified information.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="10.7.4."


><![CDATA[<p>Information on conducting an emanation security threat assessment and additional information on cabling and separation standards, as well as the potential dangers of operating RF transmitters in proximity to classified systems, is documented in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>NZCSS 400 </strong></p>
</td>
<td>
<p><strong>Installation Engineering</strong></p>
</td>
<td style="text-align: center;">GCSB</td>
<td>
<p>CONFIDENTIAL document available on application to authorised personnel</p>
</td>
</tr>
<tr>
<td>
<p><strong>NZCSI 403B </strong></p>
</td>
<td>
<p><strong>TEMPEST Threat and Countermeasures Assessment</strong></p>
</td>
<td style="text-align: center;">GCSB</td>
<td>
<p>CONFIDENTIAL document available on application to authorised personnel</p>
</td>
</tr>
<tr>
<td>
<p><strong>NZCSI 420</strong></p>
</td>
<td>
<p><strong>Laboratory Tempest Test Standard for Equipment in Controlled Environments</strong></p>
</td>
<td style="text-align: center;">GCSB</td>
<td>
<p>CONFIDENTIAL document available on application to authorised personnel</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="10.7.5."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 100%;">
<tbody>
<tr>
<td style="width: 19.4715%;"><strong>Reference</strong></td>
<td style="width: 18.9499%;"><strong>Title</strong></td>
<td style="width: 61.7177%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 19.4715%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 18.9499%;">INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td style="width: 61.7177%;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Emanation security threat assessments within New Zealand"><paragraph
    title="10.7.6.R.01."

    tags="Emanation Security,Infrastructure,Technical"


><![CDATA[<p>Obtaining the current threat advice from GCSB on potential adversaries and threats and applying the appropriate countermeasures is vital in maintaining the confidentiality of classified systems from an emanation security attack.</p>]]></paragraph>
<paragraph
    title="10.7.6.R.02."

    tags="Emanation Security,Infrastructure,Technical"


><![CDATA[<p>Failing to implement recommended countermeasures against an emanation security attack can lead to compromise. Having a good cable infrastructure and installation methodology will provide a strong backbone that will not need updating if the threat increases. Infrastructure is very expensive and time consuming to retro-fit.</p>]]></paragraph>
<paragraph
    title="10.7.6.C.01."

    tags="Emanation Security,Infrastructure,Technical"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2454"
><![CDATA[<p>Agencies designing and installing systems with RF transmitters within or co-located with their facility MUST:</p><ul>
<li>contact GCSB for guidance on conducting an emanation security threat assessment; and</li>
<li>install cabling and equipment in accordance with this manual plus any specific installation criteria derived from the emanation security threat assessment.</li>
</ul>]]></paragraph>
<paragraph
    title="10.7.6.C.02."

    tags="Emanation Security,Infrastructure,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2455"
><![CDATA[<p>Agencies designing and installing systems with RF transmitters that co-locate with systems of a classification CONFIDENTIAL and above MUST:</p><ul>
<li>contact GCSB for guidance on conducting an emanation security threat assessment; and</li>
<li>install cabling and equipment in accordance with this manual plus any specific installation criteria derived from the emanation security threat assessment.</li>
</ul><p> </p>]]></paragraph>
</block>
<block title="Emanation security threat assessment outside New Zealand"><paragraph
    title="10.7.7.R.01."

    tags="Emanation Security,Infrastructure,Technical"


><![CDATA[<p>Fixed sites and deployed military platforms are more vulnerable to emanation security attack and require a current threat assessment and countermeasure implementation. Failing to implement recommended countermeasures and standard operating procedures to reduce threats could result in the platform emanating compromising signals which, if intercepted and analysed, could lead to platform compromise with serious consequences.</p>]]></paragraph>
<paragraph
    title="10.7.7.C.01."

    tags="Emanation Security,Infrastructure,Technical"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2458"
><![CDATA[<p>Agencies deploying systems overseas in temporary, mobile or fixed locations MUST:</p><ul>
<li>contact GCSB for assistance with conducting an emanation security threat assessment; and</li>
<li>install cabling and equipment in accordance with this manual plus any specific installation criteria derived from the emanation security threat assessment.</li>
</ul>]]></paragraph>
<paragraph
    title="10.7.7.C.02."

    tags="Emanation Security,Infrastructure,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2459"
><![CDATA[<p>Agencies deploying systems overseas SHOULD:</p><ul>
<li>contact GCSB for assistance with conducting an emanation security threat advice; and</li>
<li>install cabling and equipment in accordance with this document plus any specific installation criteria derived from the emanation security threat assessment.</li>
</ul>]]></paragraph>
</block>
<block title="Early identification of emanation security issues"><paragraph
    title="10.7.8.R.01."

    tags="Emanation Security,Infrastructure,Technical"


><![CDATA[<p>The identification of emanation security controls that need to be implemented for a system at an early stage in the project lifecycle. This can significantly affect project costs. Costs are invariably greater where changes are necessary once the system had been designed or has been implemented.</p>]]></paragraph>
<paragraph
    title="10.7.8.C.01."

    tags="Emanation Security,Infrastructure,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2463"
><![CDATA[<p>Agencies SHOULD conduct an emanation security threat assessment as early as possible in project lifecycles.</p>]]></paragraph>
</block>
<block title="IT equipment in SECURE areas"><paragraph
    title="10.7.9.R.01."

    tags="Emanation Security,Infrastructure,Technical,Secure Area"


><![CDATA[<p>All equipment must conform to applicable industry and government standards, including NZCSI 420; Laboratory Tempest Test Standard for Equipment in Controlled Environments. Not all equipment within a secure facility in New Zealand requires testing against TEMPEST standards.</p>]]></paragraph>
<paragraph
    title="10.7.9.C.01."

    tags="Emanation Security,Infrastructure,Technical,Secure Area"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="2465"
><![CDATA[<p>Agencies MUST ensure that IT equipment within secure areas meet industry and government standards relating to electromagnetic interference/electromagnetic compatibility. </p>]]></paragraph>
</block>
</subsection>
</section>
<section title="10.8. Network Design, Architecture and IP Address Management"><subsection title="Objective"><paragraph
    title="10.8.1."


><![CDATA[<p>IP Address architecture, allocation and addressing schemes enable and support system security and data protection.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="10.8.2."


><![CDATA[<p>This section includes discussion of the principles of separation and segregation as network design and network architecture characteristics.  It also discusses how IP addresses can be used to support these principles for improved security of larger or multi-classification agency systems.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="10.8.3."


><![CDATA[<p>The larger the network, the more difficult it is to protect.  A large, unsegmented network presents a large attack surface with greater susceptibility to the rapid spread and dissemination of system faults, weaknesses, vulnerabilities and attacks.  In a non-segmented network, traffic and applications generally have access to the entire network. If a fault occurs or an attacker gains entry, the fault or attacker can move laterally through the network causing disruption, network outages and enabling access to critical operational or classified data.</p>]]></paragraph>
<paragraph
    title="10.8.4."


><![CDATA[<p>A large network is also more difficult to monitor and control.  Segmenting the network limits an attacker’s ability to move through the network by preventing lateral movement between zones.  Segmentation also enhances the ability to detect, monitor, control, isolate and correct faults.</p>]]></paragraph>
<paragraph
    title="10.8.5."


><![CDATA[<p>A fundamental construct in the management of risk in networks is that of Trust Zones and Trust Boundaries. &nbsp;A Trust Zone is a zoning construct based on levels of trust, classification, information asset value and essential information security. &nbsp;A Trust Boundary is the interface between two or more Trust Zones. Trust Zones use the principles of separation and segregation to manage sensitive information assets and ensure security policies are consistently applied to all assets in a particular Trust Zone. &nbsp;Refer also to <a title="Cloud computing" href="http://nzism.gcsb.govt.nz/ism-document#Section-17217">Section 22.1 – Cloud Computing</a> and <a title="Virtualisation" href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation</a>.</p>]]></paragraph>
</block>
<block title="Separation and Segregation"><paragraph
    title="10.8.6."


><![CDATA[<p>Separation and Segregation are determined by system function and the sensitivity of the data the system stores, processes and transmits.  One common example is placing systems that require a connection to the Internet into a demilitarized zone (DMZ) that is separated and segregated (isolated) from more sensitive systems. Another example is the use of compartments.</p>]]></paragraph>
<paragraph
    title="10.8.7."


><![CDATA[<p>Separation and Segregation limits the ability of an intruder to exploit a vulnerability with the intent of elevating privileges to gain access to more sensitive systems on the internal network.  VLANs may be used to further separate systems by controlling access and providing segregation thus giving additional protection.</p>]]></paragraph>
<paragraph
    title="10.8.8."


><![CDATA[<p>Network segmentation is an effective strategy for protecting access to key data assets, and impeding the lateral movement of system faults, threats and malicious activity.  Segregation has the following benefits:</p><ul>
<li>Enhanced performance: with fewer hosts per subnet, there is a reduced signalling and traffic overhead allowing more bandwidth for data communication.</li>
<li>Improved security: with less signalling traffic going through all network segments, it is more difficult for an attacker to analyse the addressing scheme and network structure.  Failures in one segment are less likely to propagate and more robust access control can be established and enforced.</li>
</ul>]]></paragraph>
<paragraph
    title="10.8.9."


><![CDATA[<p>Effective segregation also requires:</p><ul>
<li>Specialised knowledge: networks may support many devices with complex policies and rule sets.  Support staff must be properly educated and trained to ensure the network segmentation is maintained.</li>
<li>Administrative effort: changes in infrastructure, such as new applications and new technologies, can extend the time required to make changes and ensure the integrity of network segments.</li>
<li>Infrastructure Investment: segregation may require more equipment, new equipment with advanced functionalities, or specific software to deal with multiple segments.  These requirements should be considered during budget planning.</li>
</ul>]]></paragraph>
</block>
<block title="ISO 27001 and ISO 27002 implementation recommendations for network segregation"><paragraph
    title="10.8.10."


><![CDATA[<p>These ISO Standards require the implementation of network segregation.  In particular they recommend that groups of information services, users, and information systems are segregated on networks.  Specific recommendations are summarised below:</p><ul>
<li>Divide large networks into separate network domains (segments);</li>
<li>Consider physical and logical segregation;</li>
<li>Define domain perimeters;</li>
<li>Define traffic rules between domains;</li>
<li>Use authentication, encryption, and user-level network access control technologies;</li>
<li>Consider integration of the organisation’s network and segments with those of business partners.</li>
</ul>]]></paragraph>
<paragraph
    title="10.8.11."


><![CDATA[<p>The following structures and techniques should be considered:</p><ul>
<li><strong>Criteria-based segmentation</strong>: Pre-define rules to establish perimeters and create new segments in order to reduce unnecessary redesign and future administrative overheads. &nbsp;Examples of criteria are trust level (e.g., external public segment, staff segment, server segment, database segment, suppliers segment, etc.), organisational unit (e.g., Operations, Service Desk, Outreach, etc.), and combinations (e.g., external public access).</li>
<li><strong>Use of physical and logical segmentation:</strong> Depending upon the risk level identified in the risk assessment, it may be necessary to use physically separated infrastructures to protect the organisation’s information and assets (e.g., classified data flowing through a dedicated fibre), or you may use solutions based on logical segmentation like Virtual Private Network (VPN).</li>
<li><strong>Access rules for traffic flowing</strong>: Traffic between segments, including those of permitted external parties, should be controlled according to the need to access information. &nbsp;Gateways should be configured based on information classification and risk assessment. A specific case of access control applies to wireless networks, since they have poor perimeter definition. &nbsp;The recommendation is to treat wireless communication as an external connection until the traffic can reach a proper wired gateway before granting access to internal network segments. Refer also to <a title="Gateway Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 – Gateway Security</a>.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="Network Design"><paragraph
    title="10.8.12"


><![CDATA[<p>A poorly designed network has increased support costs, reduced availability, security risks, and limited support for new applications and solutions. &nbsp;Less-than-optimal performance affects end users and access to central resources. Some of the issues that stem from a poorly designed network may include the following:</p><ul>
<li><strong>Failure domains</strong>: One of the most important reasons to implement an effective network design is to minimise the spread and extent of faults. &nbsp;When Layer 2 and Layer 3 boundaries are not clearly deﬁned, failure in one network area can have a far-reaching effect.</li>
<li><strong>Broadcast domains</strong>: Broadcasts exist in every network. &nbsp;Many applications and network operations require broadcasts to function correctly; therefore, it is not possible to eliminate them completely. &nbsp;In the same way that avoiding failure domains involves clearly deﬁning boundaries, broadcast domains should have clear boundaries and include an optimal number of devices to minimise the negative impact of broadcasts.</li>
<li><strong>MAC unicast ﬂooding</strong>: Some switches limit unicast frame forwarding to ports that are associated with the speciﬁc unicast address. &nbsp;However, when frames arrive at a destination MAC address that is not recorded in the MAC table, they are ﬂooded out of the switch ports in the same VLAN except for the port that received the frame. &nbsp;This behaviour is called unknown MAC unicast ﬂooding.</li>
<li>Because this type of ﬂooding causes excessive trafﬁc on all the switch ports, network interface cards (NIC) must contend with a larger number of frames on the wire. &nbsp;When data is propagated on a connection or network segment for which it was not intended, security can be compromised.</li>
<li><strong>Multicast trafﬁc on ports where it is not intended</strong>: IP multicast is a technique that allows IP trafﬁc to be propagated from one source to a multicast group that is identiﬁed by a single IP and MAC destination-group address pair. &nbsp;Similar to unicast ﬂooding and broadcasting, multicast frames are ﬂooded out all the switch ports. A robust design allows for the containment of multicast frames while allowing them to be functional.</li>
<li><strong>Difﬁculty in management and support</strong>: Trafﬁc ﬂows can be difficult to identify in a poorly designed network. &nbsp;This can make support, maintenance, and problem resolution time-consuming and difficult as well as creating security risks.</li>
<li><strong>Possible security vulnerabilities</strong>: A switched network that has been designed with little attention to security requirements at the access layer can compromise the integrity of the entire network.</li>
<li><strong>Criteria-based segmentation</strong>: Pre-define rules to establish perimeters and create new segments in order to reduce unnecessary redesign and future administrative overheads. &nbsp;Examples of criteria are trust level (e.g., external public segment, staff segment, server segment, database segment, suppliers segment, etc.), organisational unit (e.g., Operations, Service Desk, Outreach, etc.), and combinations (e.g., external public access).</li>
</ul>]]></paragraph>
 <block title="Design Implementation"><paragraph
    title="10.8.13."


><![CDATA[<p>To assist in the implementation of separation and segregation as network design and architectural principles, the following aspects should be considered:</p><ul>
<li>Classification;</li>
<li>Security Zones;</li>
<li>IP Address Management;</li>
<li>Central Information Repository;</li>
<li>Private Use of Reserved Addresses;</li>
<li>Devices with Default IP Addresses; and</li>
<li>Connector types and cable colours.</li>
</ul>]]></paragraph>
</block>
<block title="Classification"><paragraph
    title="10.8.14."


><![CDATA[<p>Classified systems should, by definition, be segregated.  This is particularly important where network elements have access to compartments and compartmented data.</p>]]></paragraph>
<paragraph
    title="10.8.15."


><![CDATA[<p>Ideally compartmented elements of systems should be segregated and separated from the main network.  This may include the use of a reserved address space, monitored to detect violations or unauthorised attempts to connect to compartments or to access compartmented data.</p>]]></paragraph>
</block>
<block title="Security Zones"><paragraph
    title="10.8.16."


><![CDATA[<p>A security zone is a group of one or more physical or virtual firewall interfaces and the network segments connected to the zone’s interfaces.  Protection for each zone is individually specified and controlled so that each zone receives the specific protections it requires according to classification, endorsement, compartment and sensitivity of data.</p>]]></paragraph>
</block>
<block title="IP Address Management"><paragraph
    title="10.8.17."


><![CDATA[<p>The fundamental goal of an IP addressing scheme is to ensure network devices are uniquely addressed.  IP Address Schemes are a fundamental part of any network’s security architecture and should support network separation and segregation.  There are a number of techniques to assist in separating and segregating network elements. It is also useful to consider how to segregate and control network traffic through:</p><ul>
<li>Defined network perimeters and boundaries; and</li>
<li>Defined network traffic rules.</li>
</ul>]]></paragraph>
<paragraph
    title="10.8.18."


><![CDATA[<p>A well-structured IP addressing scheme promotes the ability to quickly identify node properties from an IP address which assist in network management and fault finding and rectification.</p>]]></paragraph>
</block>
<block title="Address Block Allocation"><paragraph
    title="10.8.19."


><![CDATA[<p>There are two main difficulties when assigning address blocks for types of devices.  First is that over time there is insufficient provision for additional devices and network growth.  When the allocated address block is exhausted, the addressing scheme is compromised (broken). The second is that you have a small number of devices in an address block, but are running out of addresses in other parts of the network.  If you “borrow” from a pre-assigned address range, the addressing scheme is also compromised.</p>]]></paragraph>
<paragraph
    title="10.8.20."


><![CDATA[<p>Internal IP address ranges are defined by the IETF. &nbsp;Commonly known as RFC 1918 addresses, the most recent RFC is 6761. &nbsp;These RFC’s define private IP address ranges which cannot be used for external (Internet) IP addressing. &nbsp;Three address ranges (blocks) are defined:</p>
<table class="table-main">
<tbody>
<tr>
<td><strong>IPv4 Address Range</strong></td>
<td><strong>Network IPv4 address Block</strong></td>
<td><strong>Directed Broadcast IPv4 address</strong></td>
<td><strong>IPv4 Addresses</strong></td>
</tr>
<tr>
<td><strong>10.0.0.0 to 10.255.255.255</strong></td>
<td>10.0.0.0/8</td>
<td>10.255.255.255</td>
<td>16,777,216</td>
</tr>
<tr>
<td><strong>172.16.0.0 to 172.31.255.255</strong></td>
<td>172.16.0.0/12</td>
<td>172.31.255.255</td>
<td>1,048,576</td>
</tr>
<tr>
<td><strong>192.168.0.0 to 192.168.255.255</strong></td>
<td>192.168.0.0/16</td>
<td>192.168.255.255</td>
<td>65,536</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="10.8.21."


><![CDATA[<p>IPv4 addresses are 32-bit binary addresses, divided into 4-Octets and normally represented in a decimal format.  An example of IPv4 address is 192.168.100.10.  IPv6 addresses are so much larger than IPv4 addresses and impractical to clearly represent in decimals.  IPv6 addresses are usually represented in hexadecimal numbers, separated by a colon.  An example of an IPv6 address is 2001:0DB8:0000:0002:0022:2217:FF3B:118C.  Private IPv6 addresses are specified in RFC 4193</p>]]></paragraph>
<paragraph
    title="10.8.22."


><![CDATA[<p>Private addressing is a means of distinguishing networks, assisting in separation and segregation.</p>]]></paragraph>
</block>
<block title="Private use of reserved addresses"><paragraph
    title="10.8.23."


><![CDATA[<p>Some IP addresses have been reserved in IETF standards.  Despite official warnings, some organisations use parts of the reserved IP address space for their internal networks where address space is exhausted or poorly designed.  This creates conflicts with devices and signalling traffic protocols which can create network faults, anomalies and network outages. This practice is strongly discouraged.</p>]]></paragraph>
</block>
<block title="Devices which have default IP addresses"><paragraph
    title="10.8.24."


><![CDATA[<p>Some devices are supplied with default IP addresses.  If using the IETF RFC 1918 addressing protocol (e.g. 10.0.x.x) some devices may have been allocated the same (duplicate) IP address.</p>]]></paragraph>
<paragraph
    title="10.8.25."


><![CDATA[<p>It is important to change default addresses to new addresses that conform with the addressing scheme selected for the agency.</p>]]></paragraph>
</block>
<block title="DHCP"><paragraph
    title="10.8.26."


><![CDATA[<p>In theory, there is only one network device that absolutely needs a true static address, the DHCP server.  In practice, it is preferable to assign address blocks to major groups of devices for control, fault isolation and security purposes.  Traditionally static devices are provided with a reserved address. These devices may include:</p><ul>
<li>DCHP Server;</li>
<li>Gateway devices;</li>
<li>Firewalls;</li>
<li>Routers; and</li>
<li>Switches.</li>
</ul>]]></paragraph>
<paragraph
    title="10.8.27."


><![CDATA[<p>The majority of other devices can be allocated a DHCP address.</p>]]></paragraph>
<paragraph
    title="10.8.28."


><![CDATA[<p>It is important to identify the essential device groups using a risk assessment, operational characteristics, level of security, system classification and other relevant architectural features, business requirements and operational constraints.</p>]]></paragraph>
</block>
<block title="Connector Types and Cable Colours"><paragraph
    title="10.8.29."


><![CDATA[<p>Cable management is discussed in detail earlier in this chapter. &nbsp;In particular note the discussion (<a href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-13531">10.1.4</a>) of Red/Black concepts which includes separation of electrical and electronic circuits, devices, equipment cables, connectors and systems that transmit store or process national security information (Red) from non-national security information (Black)</p>]]></paragraph>
<paragraph
    title="10.8.30."


><![CDATA[<p>Wherever practical and possible, connectors for systems of different classifications should be distinct and be selected to avoid accidental cross-connection of systems of different classifications.  This can be achieved through the use of colour and keyed connectors where the colour and keying is different for each classification level or compartment (refer also to 10.1.30 and 10.6.6).</p>]]></paragraph>
</block>
<block title="Central Information Repository"><paragraph
    title="10.8.31."


><![CDATA[<p>Creating a central repository of all the information on networks, IP addresses and devices, is critical to maintaining control of the network.  The challenge with traditional tools is that there are often specific tools for each category of devices: one system to track virtual machines, one system to track wireless users, one system to track Windows servers, one system to track Linux machines, etc.</p>]]></paragraph>
<paragraph
    title="10.8.32."


><![CDATA[<p>A single repository where all the data relevant to networks, hosts, servers, dynamic clients, and virtual environments can be tracked and synchronised is essential for larger networks.  The ability to search across all this information will enable network teams to quickly track changing network landscapes and rapidly troubleshoot issues as they arise. In addition, business data related to a network resource helps bind together the logical network construct and the reality of IT resources.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="10.8.33."


><![CDATA[<p>Further references can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Network Segmentation and Segregation</strong></td>
<td style="text-align: center;">ASD</td>
<td><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/implementing-network-segmentation-and-segregation" target="_blank">Implementing Network Segmentation and Segregation | Cyber.gov.au</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Cisco on Cisco Best Practices – Cisco IP Addressing Policy</strong></td>
<td style="text-align: center;">Cisco</td>
<td><a rel="noopener noreferrer" href="https://www.cisco.com/c/dam/en_us/about/ciscoitatwork/downloads/ciscoitatwork/pdf/Cisco_IT_IP_Addressing_Best_Practices.pdf" target="_blank">Cisco IT IP Addressing Best Practices</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>IP Addressing and Subnetting for New Users, Document ID: 13788</strong></td>
<td style="text-align: center;">Cisco</td>
<td><a rel="noopener noreferrer" href="https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13788-3.pdf" target="_blank">Configure IP Addresses and Unique Subnets for New Users (cisco.com)</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>IP Addressing: IPv4 Addressing Configuration Guide, Cisco IOS Release 15S</strong></td>
<td style="text-align: center;">Cisco</td>
<td><a href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_ipv4/configuration/15-s/ipv4-15-s-book.html"></a><a rel="noopener noreferrer" href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_ipv4/configuration/15-s/ipv4-15-s-book.html" target="_blank">IP Addressing: IPv4 Addressing Configuration Guide, Cisco IOS Release 15S - Cisco</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Introduction to Server and Domain Isolation</strong></td>
<td style="text-align: center;">Microsoft</td>
<td><a rel="noopener noreferrer" href="https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc725770(v=ws.10)?redirectedfrom=MSDN" target="_blank">Introduction to Server and Domain Isolation | Microsoft Learn</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 27001:2013&nbsp;</strong></td>
<td><strong>Information technology -- Security techniques -- Information security management systems -- Requirements</strong></td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27001:2013" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 27002:2022</strong></td>
<td>
<p class="no-uppercase"><strong>Information security, cybersecurity and privacy protection — Information security controls</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27002:2022" rel="noopener noreferrer" href="https://www.iso.org/standard/75652.html" target="_blank">https://www.iso.org/standard/75652.html</a></td>
</tr>
<tr>
<td><strong>RFC 1518</strong></td>
<td><strong>An Architecture for IP Address Allocation with CIDR</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="An Architecture for IP Address Allocation with CIDR" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc1518" target="_blank">https://datatracker.ietf.org/doc/html/rfc1518</a></td>
</tr>
<tr>
<td><strong>RFC 1918</strong></td>
<td><strong>Address Allocation for Private Internets</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="Address Allocation for Private Internets" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc1918" target="_blank">https://datatracker.ietf.org/doc/html/rfc1918</a></td>
</tr>
<tr>
<td><strong>RFC 2036</strong></td>
<td><strong>Observations on the use of Components of the Class A Address Space within the Internet</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="Observations on the use of Components of the Class A Address Space within the Internet" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2036" target="_blank">https://datatracker.ietf.org/doc/html/rfc2036</a></td>
</tr>
<tr>
<td><strong>RFC 2050</strong></td>
<td><strong>Internet Registry IP Allocation Guidelines</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="rfc 2050" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2050" target="_blank">https://datatracker.ietf.org/doc/html/rfc2050</a></td>
</tr>
<tr>
<td><strong>RFC 2101</strong></td>
<td><strong>IPv4 Address Behaviour Today</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="rfc 2101" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2101" target="_blank">https://datatracker.ietf.org/doc/html/rfc2101</a></td>
</tr>
<tr>
<td><strong>RFC 2401</strong></td>
<td><strong>Security Architecture for the Internet Protocol</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="rfc 2401" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2401" target="_blank">https://datatracker.ietf.org/doc/html/rfc2401</a></td>
</tr>
<tr>
<td><strong>RFC 2663</strong></td>
<td><strong>IP Network Address Translator (NAT) Terminology and Considerations</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2663" target="_blank">https://datatracker.ietf.org/doc/html/rfc2663</a></td>
</tr>
<tr>
<td><strong>RFC 2894</strong></td>
<td><strong>Router Renumbering for IPv6</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2894" target="_blank">https://datatracker.ietf.org/doc/html/rfc2894</a></td>
</tr>
<tr>
<td><strong>RFC 3022</strong></td>
<td><strong>Traditional IP Network Address Translator (Traditional NAT)</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3022" target="_blank">https://datatracker.ietf.org/doc/html/rfc3022</a></td>
</tr>
<tr>
<td><strong>RFC 3053</strong></td>
<td><strong>IPv6 Tunnel Broker</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3053" target="_blank">https://datatracker.ietf.org/doc/html/rfc3053</a></td>
</tr>
<tr>
<td><strong>RFC 3056</strong></td>
<td><strong>Connection of IPv6 Domains via IPv4 Clouds</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3056" target="_blank">https://datatracker.ietf.org/doc/html/rfc3056</a></td>
</tr>
<tr>
<td><strong>RFC 3232</strong></td>
<td><strong>Assigned Numbers</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3232" target="_blank">https://datatracker.ietf.org/doc/html/rfc3232</a></td>
</tr>
<tr>
<td><strong>RFC 3260</strong></td>
<td><strong>New Terminology and Clarifications for Diffserv</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3260" target="_blank">https://datatracker.ietf.org/doc/html/rfc3260</a></td>
</tr>
<tr>
<td><strong>RFC 3330&nbsp;</strong></td>
<td><strong>Special-Use IPv4 Addresses" (superseded)</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3330" target="_blank">https://datatracker.ietf.org/doc/html/rfc3330</a></td>
</tr>
<tr>
<td><strong>RFC 3879&nbsp;</strong></td>
<td><strong>Deprecating Site Local Addresses&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3879" target="_blank">https://datatracker.ietf.org/doc/html/rfc3879</a></td>
</tr>
<tr>
<td><strong>RFC 3927</strong></td>
<td><strong>Dynamic Configuration of IPv4 Link-Local Addresses</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3927" target="_blank">https://datatracker.ietf.org/doc/html/rfc3927</a></td>
</tr>
<tr>
<td><strong>RFC 3956</strong></td>
<td><strong>Embedding the Rendezvous Point (RP) Address in an IPv6 Multicast Address</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3956" target="_blank">https://datatracker.ietf.org/doc/html/rfc3956</a></td>
</tr>
<tr>
<td><strong>RFC 4193</strong></td>
<td><strong>Unique Local IPv6 Unicast Addresses&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc4193" target="_blank">https://datatracker.ietf.org/doc/html/rfc4193</a></td>
</tr>
<tr>
<td><strong>RFC 4632</strong></td>
<td><strong>Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc4632" target="_blank">https://datatracker.ietf.org/doc/html/rfc4632</a></td>
</tr>
<tr>
<td><strong>RFC 5214&nbsp;</strong></td>
<td><strong>Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc5214" target="_blank">https://datatracker.ietf.org/doc/html/rfc5214</a></td>
</tr>
<tr>
<td><strong>RFC 5737&nbsp;</strong></td>
<td><strong>IPv4 Address Blocks Reserved for Documentation&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc5737" target="_blank">https://datatracker.ietf.org/doc/html/rfc5737</a></td>
</tr>
<tr>
<td><strong>RFC 6040</strong></td>
<td><strong>Tunnelling of Explicit Congestion Notification&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6040" target="_blank">https://datatracker.ietf.org/doc/html/rfc6040</a></td>
</tr>
<tr>
<td><strong>RFC 6052</strong></td>
<td><strong>IPv6 Addressing of IPv4/IPv6 Translators&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6052" target="_blank">https://datatracker.ietf.org/doc/html/rfc6052</a></td>
</tr>
<tr>
<td><strong>RFC 6081&nbsp;</strong></td>
<td><strong>Teredo Extensions&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6081" target="_blank">https://datatracker.ietf.org/doc/html/rfc6081</a></td>
</tr>
<tr>
<td><strong>RFC 6434&nbsp;</strong></td>
<td><strong>IPv6 Node Requirements</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6434" target="_blank">https://datatracker.ietf.org/doc/html/rfc6434</a></td>
</tr>
<tr>
<td><strong>RFC 6598&nbsp;</strong></td>
<td><strong>Reserved IPv4 Prefix for Shared Address Space</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6598" target="_blank">https://datatracker.ietf.org/doc/html/rfc6598</a></td>
</tr>
<tr>
<td><strong>RFC 6761&nbsp;</strong></td>
<td><strong>Special-Use Domain Names</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6761" target="_blank">https://datatracker.ietf.org/doc/html/rfc6761</a></td>
</tr>
<tr>
<td><strong>RFC 6890&nbsp;</strong></td>
<td><strong>Special-Purpose IP Address Registries&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6890" target="_blank">https://datatracker.ietf.org/doc/html/rfc6890</a></td>
</tr>
<tr>
<td><strong>RFC 7371</strong></td>
<td><strong>Updates to the IPv6 Multicast Addressing Architecture&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc7371" target="_blank">https://datatracker.ietf.org/doc/html/rfc7371</a></td>
</tr>
<tr>
<td><strong>RFC 7619&nbsp;</strong></td>
<td><strong>The NULL Authentication Method<br class="kix-line-break">in the Internet Key Exchange Protocol Version 2 (IKEv2)&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc7619" target="_blank">https://datatracker.ietf.org/doc/html/rfc7619</a></td>
</tr>
<tr>
<td><strong>RFC 8012&nbsp;</strong></td>
<td><strong>Label Switched Path (LSP) and Pseudowire (PW) Ping/Trace over MPLS Networks Using Entropy Labels (ELs)</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc8012" target="_blank">https://datatracker.ietf.org/doc/html/rfc8012</a></td>
</tr>
<tr>
<td><strong>RFC 8190</strong></td>
<td><strong>Updates to the Special-Purpose IP Address Registries&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc8190" target="_blank">https://datatracker.ietf.org/doc/html/rfc8190</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Risk Assessment"><paragraph
    title="10.8.34.R.01."

    tags="Infrastructure,Technical,Risk Assessment,Network Infrastructure"


><![CDATA[<p>A risk assessment is a fundamental tool in the architecture and design of a network. </p>]]></paragraph>
<paragraph
    title="10.8.34.C.01."

    tags="Infrastructure,Technical,Risk Assessment,Network Infrastructure"


    classification="All Classifications"
    compliance="Must"
    cid="5815"
><![CDATA[<p>Agencies MUST conduct and document a risk assessment before creating an architecture, and designing an agency network.</p>]]></paragraph>
<paragraph
    title="10.8.34.C.02."

    tags="Infrastructure,Technical,Risk Assessment,Network Infrastructure"


    classification="All Classifications"
    compliance="Must"
    cid="5816"
><![CDATA[<p>The principles of separation and segregation as well as the system classification MUST be incorporated into the risk assessment.</p>]]></paragraph>
</block>
<block title="Security Architecture"><paragraph
    title="10.8.35.R.01."

    tags="Infrastructure,Network Security,Technical,Network Infrastructure"


><![CDATA[<p>It is important that the principles of separation and segregation as well as the system classification are incorporated into the overall security architecture to maximise design and operational efficiency and to provide and support essential security to the network design.</p>]]></paragraph>
<paragraph
    title="10.8.35.C.01."

    tags="Infrastructure,Network Security,Technical,Network Infrastructure"


    classification="All Classifications"
    compliance="Must"
    cid="5820"
><![CDATA[<p>Security architectures MUST apply the principles of separation and segregation.</p>]]></paragraph>
</block>
<block title="Identification of major classifications/categories of network segments"><paragraph
    title="10.8.36.R.01."

    tags="Infrastructure,Technical,Network Infrastructure"


><![CDATA[<p>Identified in the risk assessment, it is essential that the classification of systems is clearly identified and is apparent in all architecture and design elements and systems documentation.</p>]]></paragraph>
<paragraph
    title="10.8.36.R.02."

    tags="Infrastructure,Technical,Network Infrastructure"


><![CDATA[<p>Clear distinction of networks of different classifications is reinforced through the use of different IP addressing schemes as well as the application of Red/Black, separation and segregation concepts and principles.&nbsp; Refer also to <a title="Cable Management Fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-13522">section 10.1 - Cable Management fundamentals</a>.</p>]]></paragraph>
<paragraph
    title="10.8.36.C.01."

    tags="Infrastructure,Technical,Network Infrastructure"


    classification="All Classifications"
    compliance="Must"
    cid="5825"
><![CDATA[<p>The classification and other restrictions on the security and control of information MUST be clearly identified for each part of the Agency network.</p>]]></paragraph>
</block>
<block title="Visibility"><paragraph
    title="10.8.37.R.01."

    tags="Infrastructure,Technical,Network Infrastructure"


><![CDATA[<p>Clear identification and visibility of the classifications or category of a network segment is essential in minimising accidental cross-connections, incident management and in limiting the propagation of errors form one segment to others.  This also assists in network maintenance and management.</p>]]></paragraph>
<paragraph
    title="10.8.37.R.02."

    tags="Infrastructure,Technical,Network Infrastructure"


><![CDATA[<p>Clear visual identification is supported by the use of IP addressing and cable colour schemes as well as the use of different types of cable connectors for different network segments.</p>]]></paragraph>
<paragraph
    title="10.8.37.C.01."

    tags="Infrastructure,Technical,Network Infrastructure"


    classification="All Classifications"
    compliance="Must"
    cid="5843"
><![CDATA[<p>Systems of different classifications MUST be visually distinct.</p>]]></paragraph>
</block>
<block title="Information Repository"><paragraph
    title="10.8.38.R.01."

    tags="Infrastructure,Technical,Network Infrastructure"


><![CDATA[<p>Clear documentation and records of changes to the architecture and construct of a network are essential in change management, planning, design of network modifications, incident management and maintenance of a strong security posture.</p>]]></paragraph>
<paragraph
    title="10.8.38.R.02."

    tags="Infrastructure,Technical,Network Infrastructure"


><![CDATA[<p>A single repository where all the data relevant to networks, hosts, servers, dynamic clients, and virtual environments can be tracked and synchronised is essential for larger networks.  The ability to search across all this information will enable network teams to quickly track changing network landscapes and rapidly troubleshoot issues as they arise.</p>]]></paragraph>
<paragraph
    title="10.8.38.R.03."

    tags="Infrastructure,Technical,Network Infrastructure"


><![CDATA[<p>The repository should also contain business data related to a network resource which helps manage necessary changes and upgrades to a network in a fashion that appropriately allocates IT resources and recognises business needs.</p>]]></paragraph>
<paragraph
    title="10.8.38.C.01."

    tags="Infrastructure,Technical,Network Infrastructure"


    classification="All Classifications"
    compliance="Should"
    cid="5831"
><![CDATA[<p>An information repository, containing essential network information, change records and business requirements SHOULD be established and maintained.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="11. Communications Systems and Devices"><section title="11.1. Bluetooth Communications"><subsection title="Objective"><paragraph
    title="11.1.1."


><![CDATA[<p>Bluetooth is used securely and Bluetooth communications are protected.</p>]]></paragraph>
 </subsection>
<subsection title="Context"><paragraph
    title="11.1.2."


><![CDATA[<p>Bluetooth radios are commonly found in end user devices, including laptops, mobile phones, and peripherals such as speakers, headphones, keyboards, and mice. More recently Bluetooth has been integrated into medical devices and personal devices.</p>]]></paragraph>
<paragraph
    title="11.1.3."


><![CDATA[<p>It is important to be aware of all risks associated with Bluetooth technology. The specific threats to Bluetooth communications, that the controls in this section address, relate to are:</p>
<ul>
<li>eavesdropping on the Bluetooth communications between paired devices, and&nbsp;</li>
<li>connection interception attacks that leverage the network communications channel (including during establishment) of Bluetooth devices.</li>
</ul>]]></paragraph>
 </subsection>
<subsection title="Background"><paragraph
    title="11.1.4."


><![CDATA[<p>The Bluetooth specification has evolved over time and is regularly updated. Version 4.0 of the specification introduced Bluetooth Low Energy (LE) which offers a different feature set than the original Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) standard. Version 4.1 and 4.2 of the specification introduced enhanced security features for Bluetooth BR/EDR and LE respectively.&nbsp;</p>]]></paragraph>
<paragraph
    title="11.1.5."


><![CDATA[<p>Determining the security level being provided depends on several factors, including the capabilities and Bluetooth version supported by the devices being paired together. The actual security provided between devices is a combination of:</p>
<p style="padding-left: 40px;">a. &nbsp; &nbsp; &nbsp;the version of the Bluetooth specification supported by each device,</p>
<p style="padding-left: 40px;">b. &nbsp; &nbsp; the capabilities of the devices to accept user input (eg, through a keyboard, or camera) and to display output (eg, through a screen or character display), and</p>
<p style="padding-left: 40px;">c. &nbsp; &nbsp; &nbsp;whether the devices are using Bluetooth BR/EDR or Bluetooth LE.</p>]]></paragraph>
<paragraph
    title="11.1.6."


><![CDATA[<p>The following table summarises the security protections expected based on the pairing Bluetooth device capabilities where devices are Bluetooth BR/EDR using Secure Connections (version 4.1 or later) or Bluetooth LE using Secure Connections (version 4.2 or later) – refer to NIST SP 800-121 REV.2 Guide to Bluetooth.</p>
<table style="border-collapse: collapse; width: 99.9659%; height: 128.8px; border-width: 1px;">
<tbody>
<tr style="height: 55.2px;">
<td class="text-center" style="width: 25.0773%; height: 55.2px; border-width: 1px;"><strong>Display or input capabilities of the devices</strong></td>
<td class="text-center" style="width: 24.5662%; height: 55.2px; border-width: 1px;"><strong>Association mode used</strong></td>
<td class="text-center" style="width: 25.759%; height: 55.2px; border-width: 1px;"><strong>Protected against connection interception</strong></td>
<td class="text-center" style="width: 24.7361%; height: 55.2px; border-width: 1px;"><strong>Protected against eavesdropping</strong></td>
</tr>
<tr style="height: 18.4px;">
<td class="text-center" style="width: 25.0773%; height: 18.4px; border-width: 1px;">Both devices can display and accept input</td>
<td class="text-center" style="width: 24.5662%; height: 18.4px; border-width: 1px;">Numeric Comparison</td>
<td class="text-center" style="width: 25.759%; height: 18.4px; border-width: 1px;">Yes</td>
<td class="text-center" style="width: 24.7361%; height: 18.4px; border-width: 1px;">Yes</td>
</tr>
<tr style="height: 18.4px;">
<td class="text-center" style="width: 25.0773%; height: 18.4px; border-width: 1px;">One device has input, one has display</td>
<td class="text-center" style="width: 24.5662%; height: 18.4px; border-width: 1px;">Passkey Entry</td>
<td class="text-center" style="width: 25.759%; height: 18.4px; border-width: 1px;">Yes</td>
<td class="text-center" style="width: 24.7361%; height: 18.4px; border-width: 1px;">Yes</td>
</tr>
<tr style="height: 18.4px;">
<td class="text-center" style="width: 25.0773%; height: 18.4px; border-width: 1px;">At least one device has no display or input</td>
<td class="text-center" style="width: 24.5662%; height: 18.4px; border-width: 1px;">Just Works</td>
<td class="text-center" style="width: 25.759%; height: 18.4px; border-width: 1px;">No</td>
<td class="text-center" style="width: 24.7361%; height: 18.4px; border-width: 1px;">Yes</td>
</tr>
<tr style="height: 18.4px;">
<td class="text-center" style="width: 25.0773%; height: 18.4px; border-width: 1px;">External channel for matching devices (eg, QR codes or NFC)</td>
<td class="text-center" style="width: 24.5662%; height: 18.4px; border-width: 1px;">Out of Band</td>
<td class="text-center" style="width: 25.759%; height: 18.4px; border-width: 1px;">Yes</td>
<td class="text-center" style="width: 24.7361%; height: 18.4px; border-width: 1px;">Yes</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="11.1.7."


><![CDATA[<p>Particular care is required when associating Bluetooth devices using the Just Works association mode (eg, with headsets) due to the risk of the pairing connection being intercepted, and encryption keys being discovered.</p>]]></paragraph>
<paragraph
    title="11.1.8."


><![CDATA[<p>Since Bluetooth LE v4.2, released in 2014, versions of the Bluetooth protocol have included more advanced security features including authentication, authorisation, and encryption through the Secure Connections functionality. Encryption protocols are used to protect data from interception and authentication protocols ensure that only authorised devices can connect.</p>]]></paragraph>
<paragraph
    title="11.1.9."


><![CDATA[<p>The table below displays the key differences between Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) and Bluetooth Low Energy (LE).</p>
<table class="MsoTableGrid" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0cm 5.4pt 0cm 5.4pt;" cellspacing="0" cellpadding="0">
<tbody>
<tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; background: #0070C0; padding: 0cm 5.4pt 0cm 5.4pt;" rowspan="2" width="200" valign="top">
<p class="MsoNormal" style="text-align: center; line-height: normal; margin: 6.0pt 0cm 6.0pt 0cm;" align="center"><span style="color: white; mso-themecolor: background1;">Characteristic</span></p>
</td>
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; background: #0070C0; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="text-align: center; line-height: normal; margin: 6.0pt 0cm 6.0pt 0cm;" align="center"><span style="color: white; mso-themecolor: background1;">Bluetooth BR/EDR</span></p>
</td>
<td style="width: 150.3pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; background: #0070C0; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="text-align: center; line-height: normal; margin: 6.0pt 0cm 6.0pt 0cm;" align="center"><span style="color: white; mso-themecolor: background1;">Bluetooth Low Energy</span></p>
</td>
</tr>
<tr style="mso-yfti-irow: 1;">
<td style="width: 75.1pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="114" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Prior to 4.1</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">4.1 onwards</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Prior to 4.2</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">4.2 onwards</p>
</td>
</tr>
<tr style="mso-yfti-irow: 2;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">RF Physical Channels</p>
</td>
<td style="width: 150.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">79 channels with 1 MHz channel spacing</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">40 channels with 2 MHz channel spacing</p>
</td>
</tr>
<tr style="mso-yfti-irow: 3;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Discovery / Connect</p>
</td>
<td style="width: 150.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Inquiry / Paging</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Advertising</p>
</td>
</tr>
<tr style="mso-yfti-irow: 4;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Number of Piconet Slaves</p>
</td>
<td style="width: 150.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">7 (active) / 3255 (total)</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Unlimited</p>
</td>
</tr>
<tr style="mso-yfti-irow: 5;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Device Address Privacy</p>
</td>
<td style="width: 150.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">None</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Private device addressing available</p>
</td>
</tr>
<tr style="mso-yfti-irow: 6;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Max Data Rate</p>
</td>
<td style="width: 150.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">1-3 Mbps</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">1 Mbps via GFSK modulation</p>
</td>
</tr>
<tr style="mso-yfti-irow: 7; height: 6.75pt;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; height: 6.75pt;" rowspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Pairing Algorithm</p>
</td>
<td style="width: 75.1pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; height: 6.75pt;" width="114" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Prior to 2.1:</p>
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">E21/E22/SAFER+</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; height: 6.75pt;" rowspan="2" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">P-256 Elliptic Curve, HMAC-SHA-256</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; height: 6.75pt;" rowspan="2" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">AES-128</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; height: 6.75pt;" rowspan="2" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">P-256 Elliptic Curve, AES-CMAC</p>
</td>
</tr>
<tr style="mso-yfti-irow: 8; height: 6.75pt;">
<td style="width: 75.1pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; height: 6.75pt;" width="114" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">2.1-4.0:P-192</p>
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Elliptic Curve<sup>9</sup></p>
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">HMAC-SHA-256</p>
</td>
</tr>
<tr style="mso-yfti-irow: 9;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Device Authentication Algorithm</p>
</td>
<td style="width: 75.1pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="114" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">E1/SAFER</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">HMAC-SHA-256</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">AES-CCM<sup>10</sup></p>
</td>
</tr>
<tr style="mso-yfti-irow: 10;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Encryption Algorithm</p>
</td>
<td style="width: 75.1pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="114" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">E0/SAFER+</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">AES-CCM</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">AES-CCM</p>
</td>
</tr>
<tr style="mso-yfti-irow: 11;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Typical Range</p>
</td>
<td style="width: 150.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">30m</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">50m</p>
</td>
</tr>
<tr style="mso-yfti-irow: 12; mso-yfti-lastrow: yes;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Max Output Power</p>
</td>
<td style="width: 150.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">100mW (20 dBm)</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">10mW (10 dBm)<sup>11</sup></p>
</td>
</tr>
</tbody>
</table>
<p class="MsoNormal text-right">Reference: NIST SP 800-121 REV.2 Guide to Bluetooth Table2-2</p>
<p class="MsoNormal">&nbsp;</p>]]></paragraph>
<paragraph
    title="11.1.10."


><![CDATA[<p>5.x Bluetooth versions have introduced faster data transfers, larger data capacity, greater range and optimised power consumption.</p>]]></paragraph>
 </subsection>
<subsection title="Threats"> <block title="General wireless networking threats"><paragraph
    title="11.1.11."


><![CDATA[<p>Bluetooth is susceptible to general wireless networking threats such as:</p>
<ul>
<li><strong>denial-of-service (DoS) attacks:</strong> is a malicious attempt to overwhelm an online service or network and render it unusable</li>
<li><strong>eavesdropping;</strong> occurs when a hacker intercepts, deletes, or modifies data that is transmitted between two devices.</li>
<li><strong>adversary in the middle attacks:</strong> a threat actor puts themselves in the middle of two parties to intercept data &amp; use it for malicious purposes</li>
<li><strong>message modification:</strong> an intruder alters packet header addresses to direct a message to a different destination or to modify the data on a target machine.&nbsp;</li>
<li><strong>resource misappropriation:</strong> is an attack in which the attacker steals or makes unauthorised use of a service.</li>
</ul>]]></paragraph>
</block>
<block title="Bluetooth specific threats"><paragraph
    title="11.1.12."


><![CDATA[<p><strong>Connection Interception Attacks</strong></p>
<p>Bluetooth connections can be intercepted by a hacker who poses as a legitimate device to gain access to sensitive information.&nbsp;</p>
<ul>
<li><strong>Bluesnarfing:</strong> &nbsp;is a hacking technique in which a hacker accesses a wireless device through a Bluetooth connection. It happens without the device user's permission and often results in the theft of information or some other kind of damage to the device (and user).</li>
<li><strong>Bluebugging:</strong> is a hacking technique that lets someone get into your device through your discoverable Bluetooth connection.</li>
<li><strong>Bluejacking: </strong>is a Bluetooth attack in which a hacker spams your device with unsolicited phishing messages.</li>
<li><strong>Car Whisperer:</strong> &nbsp;is a hacking technique that can be used by attackers to hack a hands-free Bluetooth in-car system.</li>
<li><strong>Fuzzing Attacks:</strong> consist of sending malformed or otherwise non-standard data to a device's Bluetooth radio and observing how the device reacts.</li>
</ul>]]></paragraph>
<paragraph
    title="11.1.13."


><![CDATA[<p><strong>Eavesdropping attacks</strong></p>
<p>When eavesdropping takes place on the Bluetooth communications between paired devices</p>
<ul>
<li><strong>Pairing Eavesdropping:</strong> is an attack where Bluetooth devices are forced to re-pair in the open and this allow the pairing process to be eavesdropped.</li>
<li><strong>Secure Simple Pairing Attacks:</strong> During the Bluetooth pairing process, an attacker with physical proximity can gain unauthorised access via an adjacent network, and intercept traffic and send forged pairing messages between two vulnerable Bluetooth devices.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="11.1.14."


><![CDATA[<p>References are available at the following source:</p>
<table class="table-main" style="width: 99.9659%; height: 105.6px;">
<tbody>
<tr style="height: 18.4px;">
<td style="width: 42.9887%;"><strong>Reference</strong></td>
<td style="text-align: center; width: 15.1825%;"><strong>Publisher</strong></td>
<td style="width: 41.7946%;"><strong>Title</strong></td>
</tr>
<tr style="height: 87.2px;">
<td style="width: 42.9887%;">
<p class="MsoNormal" style="margin-bottom: 9.0pt; line-height: normal;"><span style="mso-fareast-font-family: &#039;Times New Roman&#039;; color: #212529; mso-fareast-language: EN-NZ;">NIST 800-121, Rev.2, May 2017<span style="mso-bidi-font-weight: bold;"> </span></span></p>
<p><strong><span style="font-size: 10.0pt; line-height: 107%; font-family: &#039;Calibri&#039;,sans-serif; mso-fareast-font-family: Calibri; mso-ansi-language: EN-NZ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">(INCLUDES UPDATES AS OF 1-19-2022)</span><span style="font-size: 10.0pt; line-height: 107%; font-family: &#039;Calibri&#039;,sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; color: #212529; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;"> </span></strong></p>
</td>
<td style="text-align: center; width: 15.1825%;">NIST</td>
<td style="width: 41.7946%;"><span style="font-size: 11.0pt; line-height: 107%; font-family: &#039;Calibri&#039;,sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-ansi-language: EN-NZ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-121r2-upd1.pdf"><span style="mso-ascii-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;">Guide to Bluetooth Security (nist.gov)</span></a></span></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Bluetooth within agency environments"><paragraph
    title="11.1.15.R.01."


><![CDATA[<p>Bluetooth provides a convenient method of wirelessly connecting devices and includes support for a wide variety of usage scenarios.&nbsp;</p>]]></paragraph>
<paragraph
    title="11.1.15.R.02."


><![CDATA[<p>Bluetooth is commonly found in low powered consumer devices, medical devices, and peripherals. Bluetooth operates in the same 2.4GHz wireless band as other non-licenced spectrum services such as Wi-Fi.</p>]]></paragraph>
<paragraph
    title="11.1.15.R.03."


><![CDATA[<p>Bluetooth is generally suitable for connectivity between devices in lower classification settings, and where adequate consideration is given to the purpose of the connection, the type of information being transmitted, the security capabilities of the devices, and the environment the devices are operating in.&nbsp;&nbsp;</p>]]></paragraph>
<paragraph
    title="11.1.15.R.04."


><![CDATA[<p>Given the large number of potential situations Bluetooth could be used in, it is essential that agencies develop a considered position on where and where not to permit the use of Bluetooth connections.</p>]]></paragraph>
<paragraph
    title="11.1.15.C.01."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="7524"
><![CDATA[<p>Agencies wishing to permit the use of Bluetooth MUST develop a policy that details the circumstances under which Bluetooth usage is permitted, and situations where it is not to be used.</p>]]></paragraph>
<paragraph
    title="11.1.15.C.02."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="7525"
><![CDATA[<p>The policy position MUST include information about Bluetooth security controls that are to be used, and methods for verifying that the controls are in place and are effective.</p>]]></paragraph>
</block>
<block title="Bluetooth connections"><paragraph
    title="11.1.16.R.01."


><![CDATA[<p>Bluetooth connections between devices of different security protocol levels will result in a degradation of the security level.</p>]]></paragraph>
<paragraph
    title="11.1.16.R.02."


><![CDATA[<p>Bluetooth connections between devices that can revert to weaker protocol options, and that do not support effective security features will increase risk of compromise.</p>]]></paragraph>
<paragraph
    title="11.1.16.C.01."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="7526"
><![CDATA[<p>Agencies MUST ensure that Bluetooth pairing is only established between authorised devices. (Unless a gateway is being used, paired devices are considered to operate at the same security classification level).</p>]]></paragraph>
<paragraph
    title="11.1.16.C.02."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="7527"
><![CDATA[<p>Agencies SHOULD ensure that Bluetooth discovery of devices is disabled unless a new pairing connection is being established.</p>]]></paragraph>
<paragraph
    title="11.1.16.C.03."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="7528"
><![CDATA[<p>Agencies SHOULD ensure that Bluetooth device pairing only occurs at a location where only authorised persons have access.</p>]]></paragraph>
<paragraph
    title="11.1.16.C.04."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="7529"
><![CDATA[<p>Agencies SHOULD ensure that Bluetooth pairings are removed when they are no longer required.</p>]]></paragraph>
</block>
<block title="Bluetooth versions"><paragraph
    title="11.1.17.R.01."


><![CDATA[<p>It is difficult to determine what Bluetooth security features are being used for a connection between devices without capturing and decoding the connection establishment packets.&nbsp;</p>
<p>Since Bluetooth LE v4.2, versions of the Bluetooth protocol have included more advanced security features including authentication, authorisation, and encryption through the Secure Connections functionality.</p>]]></paragraph>
<paragraph
    title="11.1.17.R.02."


><![CDATA[<p>Ensuring some end-user visible features are being used during the device pairing process can provide a level of understanding of the security between Bluetooth connected devices.</p>]]></paragraph>
<paragraph
    title="11.1.17.C.01."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="7530"
><![CDATA[<p>Agencies using Bluetooth MUST use the most secure configuration supported by the paired devices.</p>]]></paragraph>
<paragraph
    title="11.1.17.C.02."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="7531"
><![CDATA[<p>Agencies SHOULD identify the:</p>
<ul>
<li>Bluetooth type (BR/EDR or LE),&nbsp;</li>
<li>version, and</li>
<li>security capabilities;</li>
</ul>
<p>for devices used to form Bluetooth connections, and ensure they are used to inform risk decisions on the use of Bluetooth.</p>]]></paragraph>
<paragraph
    title="11.1.17.C.03."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="7532"
><![CDATA[<p>Agencies SHOULD ensure that new Bluetooth connections between devices are authenticated using explicit user actions, such as entry of a numeric code, confirmation of a matching PIN, or other affirming action, such as challenge-response process.</p>]]></paragraph>
</block>
<block title="Encryption and authentication protocols"><paragraph
    title="11.1.18.R.01."


><![CDATA[<p>When transferring information between Bluetooth devices, encryption protocols are used to protect data from interception and authentication protocols ensure that only authorised devices can connect.</p>]]></paragraph>
<paragraph
    title="11.1.18.R.02."


><![CDATA[<p>Chapter 17 of the NZISM provides approved encryption algorithms. Even in the most secure operating model, Bluetooth specifications are currently unable to support these approved encryption methods. Whilst Bluetooth cannot meet these requirements, there may be organisational requirements to use Bluetooth to transfer Restricted or Sensitive information between devices.</p>]]></paragraph>
<paragraph
    title="11.1.18.C.01."

    tags="Bluetooth,Communications systems,Technical"


    classification="Unclassified/In-Confidence"
    compliance="Should"
    cid="7533"
><![CDATA[<p>Agencies using Bluetooth between devices to transfer UNCLASSIFIED or IN-CONFIDENCE information SHOULD ensure that connections meet NZISM standards for authentication and use Approved Cryptographic Algorithms for encryption and message integrity.&nbsp;</p>]]></paragraph>
<paragraph
    title="11.1.18.C.02."

    tags="Bluetooth,Communications systems,Technical"


    classification="Restricted/Sensitive"
    compliance="Must"
    cid="7534"
><![CDATA[<p>Agencies using Bluetooth between devices to transfer RESTRICTED or SENSITIVE information MUST ensure that connections meet NZISM standards for authentication and use Approved Cryptographic Algorithms for encryption and message integrity.</p>]]></paragraph>
<paragraph
    title="11.1.18.C.03."

    tags="Bluetooth,Communications systems,Technical"


    classification="Restricted/Sensitive"
    compliance="Must"
    cid="7535"
><![CDATA[<p>If Bluetooth specifications do not support these approved encryption methods, organisations MUST do a risk assessment and use the exception or waiver process to accept this risk.</p>]]></paragraph>
</block>
<block title="Bluetooth in secure areas"><paragraph
    title="11.1.19.R.01."


><![CDATA[<p>As with other wireless protocols, the level of security offered by Bluetooth can vary widely depending on the capabilities of the devices being connected.&nbsp;</p>]]></paragraph>
<paragraph
    title="11.1.19.R.02."


><![CDATA[<p>Bluetooth devices will revert to older, less secure versions of the protocol to maintain compatibility, so careful consideration needs to be undertaken before approving the use of the Bluetooth protocol.</p>]]></paragraph>
<paragraph
    title="11.1.19.C.01."

    tags="Bluetooth,Communications systems,Technical,RF Devices"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="2492"
><![CDATA[<p>Agencies MUST complete a technical evaluation of the secure area, consult the relevant technical authority and seek approval from the Accreditation Authority before permitting the use of Bluetooth devices.</p>]]></paragraph>
<paragraph
    title="11.1.19.C.02."

    tags="Bluetooth,Communications systems,Technical,RF Devices"


    classification="Confidential, Top Secret, Secret"
    compliance="Must Not"
    cid="2494"
><![CDATA[<p>Agencies using Bluetooth devices MUST NOT allow:</p>
<ul>
<li>line of sight and reflected communications travelling into an unsecure area.</li>
<li>multiple Bluetooth devices at different classifications in the same area.</li>
</ul>]]></paragraph>
<paragraph
    title="11.1.19.C.03."

    tags="Bluetooth,Communications systems,Technical,RF Devices"


    classification="Top Secret, Confidential, Secret"
    compliance="Must Not"
    cid="2495"
><![CDATA[<p>Agencies MUST NOT allow Bluetooth devices into secure areas unless authorised by the Accreditation Authority.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="11.2. Radio frequency and infrared devices in secure areas"><subsection title="Objective"><paragraph
    title="11.2.1."


><![CDATA[<p>To maintain the integrity of secure areas, only approved radio frequency (RF) and infrared (IR) devices are brought into secure areas.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="11.2.2."


><![CDATA[<p>This section covers information relating to the use of RF and infrared devices in secure areas. Information on the use of RF devices outside secure areas can be found in <a title="Distributed working" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-17003">Chapter 21 - Distributed working</a>.</p>]]></paragraph>
<paragraph
    title="11.2.3."


><![CDATA[<p>RF devices include any transmitter on any frequency, including mobile phones, cordless phones, Bluetooth, Wi-Fi, RFID and other similar devices.<br>Requirements for Bluetooth devices are described in section 11.1</p>]]></paragraph>
<paragraph
    title="11.2.4."


><![CDATA[<p>IR devices transmit data over variable distances using light waves; examples are infrared cameras; night vision devices; infrared computer ports; and remote controls.</p>]]></paragraph>
<paragraph
    title="11.2.5."


><![CDATA[<p>A secure area, in the context of the NZISM, is defined as any area, room, group of rooms, building or installation that processes, stores or communicates information classified CONFIDENTIAL, SECRET, TOP SECRET or any compartmented or caveated information at these classifications. &nbsp;A secure area may include a Sensitive Compartmented Information Facility (SCIF).</p>
<p>The physical security requirements for such areas are specified in the Protective Security Requirements (PSR) Security Zones.</p>]]></paragraph>
</block>
<block title="Exemptions for the use of RF devices"><paragraph
    title="11.2.6."


><![CDATA[<p>At the discretion of the Accreditation Authority, RF devices can be used in a secure area provided they cannot communicate or compromise classified information.</p>]]></paragraph>
</block>
<block title="Exemptions for the use of Medical devices"><paragraph
    title="11.2.7."


><![CDATA[<p>At the discretion of the Accreditation Authority, medical devices with RF transmitters and/or receivers can be used in secure areas provided they cannot communicate or compromise classified information.</p>]]></paragraph>
</block>
<block title="Exemptions for the use of IR and laser devices"><paragraph
    title="11.2.8."


><![CDATA[<p>At the discretion of the Accreditation Authority, IR and laser devices can be used in a secure area provided they cannot communicate or compromise classified information.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="11.2.9."


><![CDATA[<p>References are available at the following source:</p>
<table class="table-main" style="width: 64.0288%;">
<tbody>
<tr>
<td style="width: 43.152%;"><strong>Reference</strong></td>
<td style="text-align: center; width: 14.4465%;"><strong>Publisher</strong></td>
<td style="width: 42.4015%;"><strong>Title</strong></td>
</tr>
<tr>
<td style="width: 43.152%;">
<p>NIST 800-121, Rev.2, May 2017</p>
<p>(INCLUDES UPDATES AS OF 1-19-2022)<strong><span style="font-size: 10.0pt; line-height: 107%; font-family: &#039;Calibri&#039;,sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; color: #212529; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;"> </span></strong></p>
</td>
<td style="text-align: center; width: 14.4465%;">NIST</td>
<td style="width: 42.4015%;"><span style="font-size: 11.0pt; line-height: 107%; font-family: &#039;Calibri&#039;,sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-ansi-language: EN-NZ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-121r2-upd1.pdf"><span style="mso-ascii-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;">Guide to Bluetooth Security (nist.gov)</span></a></span></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="11.2.10."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR Mandatory Requirements</strong></td>
<td>GOV2, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements&nbsp;</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="RF devices in secure areas"><paragraph
    title="11.2.11.R.01."

    tags="Communications systems,Technical,RF Devices,Secure Area"


><![CDATA[<p>RF devices pose security threat as they are capable of picking up and transmitting classified background conversations. Furthermore, many RF devices can connect to IT equipment and act as unauthorised data storage devices or bridge “air gaps”.</p>]]></paragraph>
<paragraph
    title="11.2.11.C.01"

    tags="Communications systems,Technical,RF Devices,Secure Area"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="2497"
><![CDATA[<p>Agencies MUST prevent RF devices from being brought into secure areas unless authorised by the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="11.2.11.C.02"

    tags="Communications systems,Technical,RF Devices,Secure Area"


    classification="All Classifications"
    compliance="Should"
    cid="2498"
><![CDATA[<p>Agencies SHOULD prevent RF devices from being brought into secure areas unless authorised by the Accreditation Authority.</p>]]></paragraph>
</block>
<block title="RF controls in secure areas"><paragraph
    title="11.2.12.R.01."

    tags="Communications systems,Technical,RF Devices,RFID"


><![CDATA[<p>Minimising the output power of wireless devices and using RF shielding on facilities will assist in limiting the wireless communications to areas under the control of the agency.</p>]]></paragraph>
<paragraph
    title="11.2.12.C.01."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="All Classifications"
    compliance="Should"
    cid="2504"
><![CDATA[<p>Agencies SHOULD limit the effective range of communications outside the agency’s area of control by:</p>
<ul>
<li>minimising the output power level of wireless devices;&nbsp;</li>
<li>RF shielding; and</li>
<li>Physical layout and separation.</li>
</ul>
<p>&nbsp;</p>]]></paragraph>
</block>
<block title="Detecting RF devices in secure areas"><paragraph
    title="11.2.13.R.01."

    tags="Communications systems,Technical,RF Devices,Secure Area"


><![CDATA[<p>As RF devices are prohibited in secure areas, agencies should deploy technical measures to detect and respond to the unauthorised use of such devices.</p>]]></paragraph>
<paragraph
    title="11.2.13.C.01"

    tags="Communications systems,Technical,RF Devices,Secure Area"


    classification="Confidential, Secret, Top Secret"
    compliance="Should"
    cid="2501"
><![CDATA[<p>Agencies SHOULD deploy measures to detect and respond to active RF devices within secure areas.</p>]]></paragraph>
</block>
<block title="Pointing devices"><paragraph
    title="11.2.14.R.01."

    tags="Communications systems,Technical,RF Devices,RFID"


><![CDATA[<p>Wireless RF or IR pointing devices can pose an emanation security risk as well as introduce vulnerabilities to classified IT equipment and/or systems.&nbsp;</p>]]></paragraph>
<paragraph
    title="11.2.14.C.01."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="Top Secret, Secret, Confidential"
    compliance="Must Not"
    cid="2483"
><![CDATA[<p>Wireless RF or IR pointing devices MUST NOT be used in secure areas unless approved by the Accreditation Authority and appropriate RF or IR mitigations are implemented.&nbsp;</p>]]></paragraph>
</block>
<block title="IR devices in secure areas"><paragraph
    title="11.2.15.R.01."

    tags="Communications systems,Technical,RF Devices,RFID"


><![CDATA[<p>When using IR devices with CONFIDENTIAL, SECRET or TOP SECRET systems, IR mitigations including opaque curtains and/or IR window films are acceptable. Line of sight must be managed for direct and reflected transmissions. While infrared transmissions are generally designed for short range (5 to 10 metres) manufacturing and design variations and some environmental conditions can amplify and reflect infrared over much greater distances.</p>]]></paragraph>
<paragraph
    title="11.2.15.R.02."

    tags="Communications systems,Technical,RF Devices,RFID"


><![CDATA[<p>When using infrared keyboards with a TOP SECRET system, windows with curtains that can be opened are NOT acceptable as a method of permanently blocking infrared transmissions. While infrared transmissions are generally designed for short range (5 to 10 metres) manufacturing and design variations and some environmental conditions can amplify and reflect infrared over much greater distances.</p>]]></paragraph>
<paragraph
    title="11.2.15.C.01."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="Secret, Confidential"
    compliance="Must Not"
    cid="2487"
><![CDATA[<p>Agencies using infrared keyboards MUST NOT allow:</p>
<ul>
<li>line of sight and reflected communications travelling into an unsecure area;</li>
<li>multiple infrared keyboards at different classifications in the same area;</li>
<li>other infrared devices to be brought into line of sight of the keyboard or its receiving device/port; and</li>
<li>infrared keyboards to be operated in areas with unprotected windows.</li>
</ul>]]></paragraph>
<paragraph
    title="11.2.15.C.02."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="Top Secret"
    compliance="Must Not"
    cid="2488"
><![CDATA[<p>Agencies using infrared keyboards MUST NOT allow:</p>
<ul>
<li>line of sight and reflected communications travelling into an unsecure area;</li>
<li>multiple infrared keyboards at different classifications in the same area;</li>
<li>other infrared devices within the same area; and</li>
<li>infrared keyboards in areas with windows that have not had a permanent method of blocking infrared transmissions applied to them.</li>
</ul>]]></paragraph>
<paragraph
    title="11.2.15.C.03."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="All Classifications"
    compliance="Should"
    cid="2489"
><![CDATA[<p>Agencies using IR devices SHOULD ensure that the IR receiver/port is positioned to prevent line of sight from the secure area boundary.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="11.3. Telephones and Telephone Systems"><subsection title="Objective"><paragraph
    title="11.3.1."


><![CDATA[<p>Telephone systems are prevented from communicating unauthorised classified information.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="11.3.2."


><![CDATA[<p>This section covers information relating to the secure use of fixed, including cordless, telephones, as well as the systems they use to communicate information.</p>]]></paragraph>
<paragraph
    title="11.3.3."


><![CDATA[<p>Information regarding Voice over Internet Protocol (VoIP) and encryption of data in transit is covered in <a title="Video &amp; telephony conferencing and internet protocol telephony" href="http://nzism.gcsb.govt.nz/ism-document#Section-16369">Section 18.3 – Video &amp; Telephony Conferencing and Internet Protocol Telephony</a> and <a title="Cryptographic fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-15746">Section 17.1 - Cryptographic Fundamentals</a>.</p>]]></paragraph>
<paragraph
    title="11.3.4."


><![CDATA[<p>It MUST be noted that VOIP and cellular phones have some of the same vulnerabilities as wired and cordless phones.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Telephones and telephone systems usage policy"><paragraph
    title="11.3.5.R.01."

    tags="Communications systems,Governance,Telephony"


><![CDATA[<p>All unsecure telephone networks are subject to interception. The level of expertise needed to do this varies greatly. Accidentally or maliciously revealing classified information over a public telephone networks can lead to interception.</p>]]></paragraph>
<paragraph
    title="11.3.5.C.01."

    tags="Communications systems,Governance,Telephony"


    classification="All Classifications"
    compliance="Must"
    cid="2627"
><![CDATA[<p>Agencies MUST develop a policy governing the use of telephones and telephone systems.</p>]]></paragraph>
</block>
<block title="Personnel awareness"><paragraph
    title="11.3.6.R.01."

    tags="Communications systems,Governance,Telephony"


><![CDATA[<p>There is a high risk of unintended disclosure of classified information when using telephones. It is important that personnel are made aware of what levels of classified information they discuss on particular telephone systems as well as the audio security risk associated with the use of telephones.</p>]]></paragraph>
<paragraph
    title="11.3.6.C.01."

    tags="Communications systems,Governance,Mobile Telephony"


    classification="All Classifications"
    compliance="Must"
    cid="2630"
><![CDATA[<p>Agencies MUST advise personnel of the maximum permitted classification for conversations using both internal and external telephone connections.</p>]]></paragraph>
<paragraph
    title="11.3.6.C.02."

    tags="Communications systems,Governance,Telephony"


    classification="All Classifications"
    compliance="Should"
    cid="2631"
><![CDATA[<p>Agencies SHOULD advise personnel of the audio security risk posed by using telephones in areas where classified conversations can occur.</p>]]></paragraph>
</block>
<block title="Visual indication"><paragraph
    title="11.3.7.R.01."

    tags="Communications systems,Governance,Telephony"


><![CDATA[<p>When single telephone systems are approved to hold conversations at different classifications, alerting the user to the classification level they can speak at when using their phone will assist in the reducing the risk of unintended disclosure of classified information.</p>]]></paragraph>
<paragraph
    title="11.3.7.C.01."

    tags="Communications systems,Governance,Telephony"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2637"
><![CDATA[<p>Agencies permitting different levels of conversation for different types of connections MUST use telephones that give a visual indication of the classification of the connection made.</p>]]></paragraph>
</block>
<block title="Use of telephone systems"><paragraph
    title="11.3.8.R.01."

    tags="Communications systems,Encryption,Technical,Telephony"


><![CDATA[<p>When classified conversations are to be held using telephone systems, the conversation needs to be appropriately protected through the use of encryption measures.</p>]]></paragraph>
<paragraph
    title="11.3.8.C.01."

    tags="Communications systems,Encryption,Technical,Telephony"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2643"
><![CDATA[<p>Agencies intending to use telephone systems for the transmission of classified information MUST ensure that:</p><ul>
<li>the system has been accredited for the purpose; and</li>
<li>all classified traffic that passes over external systems is appropriately encrypted.</li>
</ul>]]></paragraph>
</block>
<block title="Cordless telephones"><paragraph
    title="11.3.9.R.01."

    tags="Communications systems,Technical,Telephony,Mobile Telephony"


><![CDATA[<p>Cordless telephones have little or no effective transmission security, therefore should not be used for classified or sensitive communications. They also operate in an unlicensed part of the radio spectrum used for a wide range of other devices.</p>]]></paragraph>
<paragraph
    title="11.3.9.C.01."

    tags="Communications systems,Technical,Telephony,Mobile Telephony"


    classification="Top Secret, Secret, Confidential"
    compliance="Must Not"
    cid="2648"
><![CDATA[<p>Agencies MUST NOT use cordless telephones for classified conversations.</p>]]></paragraph>
<paragraph
    title="11.3.9.C.02."

    tags="Communications systems,Technical,Telephony,Mobile Telephony"


    classification="All Classifications"
    compliance="Should"
    cid="2649"
><![CDATA[<p>Agencies SHOULD NOT use cordless telephones for classified or sensitive conversations.</p>]]></paragraph>
</block>
<block title="Cordless telephones with secure telephony devices"><paragraph
    title="11.3.10.R.01."

    tags="Communications systems,Technical,Telephony,Mobile Telephony"


><![CDATA[<p>As the data between cordless handsets and base stations is not secure, cordless telephones MUST NOT be used for classified communications even if the device is connected to a secure telephony device.</p>]]></paragraph>
<paragraph
    title="11.3.10.C.01."

    tags="Communications systems,Technical,Telephony,Mobile Telephony"


    classification="All Classifications"
    compliance="Must Not"
    cid="2652"
><![CDATA[<p>Agencies MUST NOT use cordless telephones in conjunction with secure telephony devices.</p>]]></paragraph>
</block>
<block title="Speakerphones"><paragraph
    title="11.3.11.R.01."

    tags="Communications systems,Technical,Telephony"


><![CDATA[<p>Speakerphones are designed to pick up and transmit conversations in the vicinity of the device they should not be used in secure areas as the audio security risk is extremely high.</p>]]></paragraph>
<paragraph
    title="11.3.11.R.02."

    tags="Communications systems,Technical,Telephony"


><![CDATA[<p>If the agency is able to reduce the audio security risk through the use of appropriate countermeasures then an exception may be approved by the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="11.3.11.C.01."

    tags="Communications systems,Technical,Telephony"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2656"
><![CDATA[<p>If a speakerphone is to be used on a secure telephone system within a secure area, agencies MUST apply the following controls:</p><ul>
<li>it is located in a room rated as audio secure;</li>
<li>the room is audio secure during any conversations; </li>
<li>only cleared personnel involved in discussions are present in the room; and</li>
<li>ensure approval for this exception is granted by the Accreditation Authority.</li>
</ul>]]></paragraph>
</block>
<block title="Off-hook audio protection"><paragraph
    title="11.3.12.R.01."

    tags="Communications systems,Technical,Mobile Telephony"


><![CDATA[<p>Providing off-hook security minimises the chance of accidental classified conversation being coupled into handsets and speakerphones. Limiting the time an active microphone is open limits this threat. This is normally achieved with push-to-talk (PTT) mechanisms.</p>]]></paragraph>
<paragraph
    title="11.3.12.R.02."

    tags="Communications systems,Technical,Telephony"


><![CDATA[<p>Simply providing an off-hook audio protection feature is not, in itself, sufficient. To ensure that the protection feature is used appropriately personnel will need to be made aware of the protection feature and trained in its proper use. Where PTT or some other similar functionality is installed, the activation mechanism (such as a button or switch) must be clearly labelled.</p>]]></paragraph>
<paragraph
    title="11.3.12.R.03."

    tags="Communications systems,Technical,Telephony"


><![CDATA[<p>Many new digital desk phones control these functions through software, rather than a mechanical switch.</p>]]></paragraph>
<paragraph
    title="11.3.12.C.01."

    tags="Communications systems,Technical,Telephony"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="2661"
><![CDATA[<p>Agencies MUST ensure that off-hook audio protection features are used on all telephones that are not accredited for the transmission of classified information in areas where such information could be discussed.</p>]]></paragraph>
<paragraph
    title="11.3.12.C.02."

    tags="Communications systems,Technical,Telephony"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2662"
><![CDATA[<p>Agencies MUST use push-to-talk mechanisms to meet the requirement for off-hook audio protection. PTT activation MUST be clearly labelled.</p>]]></paragraph>
<paragraph
    title="11.3.12.C.03."

    tags="Communications systems,Technical,Telephony"


    classification="All Classifications"
    compliance="Should"
    cid="2663"
><![CDATA[<p>Agencies SHOULD ensure that off-hook audio protection features are used on all telephones that are not accredited for the transmission of classified information in areas where such information could be discussed.</p>]]></paragraph>
</block>
<block title="Electronic Records Retention and Voicemail"><paragraph
    title="11.3.13.R.01."

    tags="Communications systems,Technical,Telephony"


><![CDATA[<p>Voicemail and other messages and communications may fall within the legal definition of electronic records. If so retention and archive requirements are prescribed.</p>]]></paragraph>
<paragraph
    title="11.3.13.C.01."

    tags="Communications systems,Technical,Telephony"


    classification="All Classifications"
    compliance="Must"
    cid="2666"
><![CDATA[<p>Agencies MUST remove unused voice mailboxes.</p>]]></paragraph>
<paragraph
    title="11.3.13.C.02."

    tags="Communications systems,Technical,Telephony"


    classification="All Classifications"
    compliance="Must"
    cid="2667"
><![CDATA[<p>Agencies MUST expire and archive or delete voicemail messages after the retention period determined by the agency’s electronic records retention policy.</p>]]></paragraph>
<paragraph
    title="11.3.13.C.03."

    tags="Communications systems,Technical,Telephony"


    classification="All Classifications"
    compliance="Should"
    cid="2669"
><![CDATA[<p>Agencies SHOULD develop and implement a policy to manage the retention and disposal of such electronic records, including voicemail, email and other electronic records.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="11.4. Mobile Telephony"><subsection title="Objective"><paragraph
    title="11.4.1."


><![CDATA[<p>Mobile telephone systems and devices are prevented from communicating unauthorised classified information.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="11.4.2."


><![CDATA[<p>This section covers information relating to the secure use of mobile telephones, tablets and other mobile, voice communication capable devices, as well as the systems they use to communicate information.</p>]]></paragraph>
<paragraph
    title="11.4.3."


><![CDATA[<p>Mobile devices use RF in various parts of the spectrum to communicate including Wi-Fi, cellular, satellite, RFID, and NFC frequencies. All such mobile devices are considered to be transmitters.</p>]]></paragraph>
<paragraph
    title="11.4.4."


><![CDATA[<p>Mobile devices with cellular capability will regularly “poll” for the strongest signal and base or relay station. Monitoring such activity can be used for later interception of transmissions.</p>]]></paragraph>
<paragraph
    title="11.4.5."


><![CDATA[<p>Information regarding Voice over Internet Protocol (VoIP) and encryption of data in transit is covered in <a title="Video &amp; Telephony Conferencing and Internet Protocol Telephony" href="http://nzism.gcsb.govt.nz/ism-document#Section-16369">Section 18.3 – Video &amp; Telephony Conferencing and Internet Protocol Telephony</a> and <a title="Cryptographic fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-15746">Section 17.1 - Cryptographic Fundamentals</a>.</p>]]></paragraph>
<paragraph
    title="11.4.6."


><![CDATA[<p>It is important to note that VoIP phones have some of the same vulnerabilities as the mobile devices discussed in this section.</p>]]></paragraph>
<paragraph
    title="11.4.7."


><![CDATA[<p>Mobile devices can be equipped with a variety of capabilities including internet connectivity, cameras, speakerphones, recording and remote control. Such devices are also susceptible to Internet malware and exploits. All risks related to the use of the Internet will apply to mobile devices with 3g/4g/5g capability.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="11.4.8."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR Mandatory Requirements</strong></td>
<td>GOV2, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Mobile device usage policy"><paragraph
    title="11.4.9.R.01."

    tags="Communications systems,Governance,Mobile Devices,Mobile Telephony"


><![CDATA[<p>All mobile devices are subject to interception. The required level of expertise needed varies greatly. Accidentally or maliciously revealing classified information over mobile devices can be intercepted leading to a security breach.</p>]]></paragraph>
<paragraph
    title="11.4.9.C.01."

    tags="Communications systems,Governance,Mobile Devices,Mobile Telephony"


    classification="All Classifications"
    compliance="Must"
    cid="2691"
><![CDATA[<p>Agencies MUST develop a policy governing the use of mobile devices.</p>]]></paragraph>
</block>
<block title="Personnel awareness"><paragraph
    title="11.4.10.R.01."

    tags="Communications systems,Governance,Mobile Devices,Mobile Telephony"


><![CDATA[<p>There is a high risk of unintended disclosure of classified information when using mobile devices. It is important that personnel are aware of what levels of classified information they discuss as well as the wide range of security risks associated with the use of mobile devices.</p>]]></paragraph>
<paragraph
    title="11.4.10.C.01."

    tags="Communications systems,Governance,Mobile Devices,Mobile Telephony"


    classification="All Classifications"
    compliance="Must"
    cid="2694"
><![CDATA[<p>Agencies MUST advise personnel of the maximum permitted classification for conversations using both internal and external mobile devices.</p>]]></paragraph>
<paragraph
    title="11.4.10.C.02."

    tags="Communications systems,Governance,Mobile Devices,Mobile Telephony"


    classification="All Classifications"
    compliance="Should"
    cid="2695"
><![CDATA[<p>Agencies SHOULD advise personnel of all known security risks posed by using mobile devices in areas where classified conversations can occur.</p>]]></paragraph>
</block>
<block title="Use of mobile devices"><paragraph
    title="11.4.11.R.01."

    tags="Communications systems,Encryption,Technical,Mobile Devices,Mobile Telephony"


><![CDATA[<p>When classified conversations are to be held using mobile devices the conversation needs to be appropriately protected through the use of encryption measures and a secure network.</p>]]></paragraph>
<paragraph
    title="11.4.11.C.01."

    tags="Communications systems,Encryption,Technical,Mobile Devices,Mobile Telephony"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="2698"
><![CDATA[<p>Agencies intending to use mobile devices for the transmission of classified information MUST ensure that:</p><ul>
<li>the network has been certified and accredited for the purpose; </li>
<li>all classified traffic that passes over mobile devices is appropriately encrypted; and</li>
<li>users are aware of the area, surroundings, potential for overhearing and potential for oversight when using the device.</li>
</ul>]]></paragraph>
</block>
<block title="Mobile Device Physical Security"><paragraph
    title="11.4.12.R.01."

    tags="Communications systems,Technical,Mobile Devices,Mobile Telephony,Physical Security"


><![CDATA[<p>Mobile devices are invariably software controlled and are subject to malware or other means of compromise. No “off-hook” or “power off” security can be effectively provided, creating vulnerabilities for secure areas. Secure areas are defined in <a title="Secure area" href="http://nzism.gcsb.govt.nz/ism-document#Block-12020">Chapter 1 at 1.1.36</a>.</p>]]></paragraph>
<paragraph
    title="11.4.12.C.01."

    tags="Communications systems,Technical,Mobile Devices,Mobile Telephony,Physical Security"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="2701"
><![CDATA[<p>Mobile devices MUST be prevented from entering secure areas.</p>]]></paragraph>
<paragraph
    title="11.4.12.C.02."

    tags="Communications systems,Technical,Mobile Devices,Mobile Telephony,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="2702"
><![CDATA[<p>Agencies SHOULD provide a storage area or lockers where mobile devices can be stored before personnel enter secure or protected areas.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="11.5. Personal Wearable Devices"><subsection title="Objective"><paragraph
    title="11.5.1."


><![CDATA[<p>Wearable devices are prevented from unauthorised communication or from compromising secure areas.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="11.5.2."


><![CDATA[<p>This section covers information relating to the use of personal wearable devices, fitness devices, smart watches, devices embedding in clothing and similar wearable devices.</p>]]></paragraph>
<paragraph
    title="11.5.3."


><![CDATA[<p>These devices can use RF in various parts of the spectrum to communicate including Wi-Fi, cellular, satellite, RFID, NFC and Bluetooth frequencies as well as providing data storage capability, audio and video recording and USB connectivity. All such wearable or mobile devices are considered to be transmitters.</p>]]></paragraph>
<paragraph
    title="11.5.4."


><![CDATA[<p>Personal wearable devices can be equipped with a variety of capabilities including smart phone pairing, internet connectivity, cameras, speakerphones, audio and video recording and remote control. Some devices (for example Narrative and Autographer) will automatically take snapshots at intervals during the day. In some cases the snapshots are geotagged.</p>]]></paragraph>
<paragraph
    title="11.5.5."


><![CDATA[<p>Such devices are also susceptible to Internet malware and exploits. All risks related to the use of the Internet will apply to these devices.</p>]]></paragraph>
<paragraph
    title="11.5.6."


><![CDATA[<p>Merely disabling the capabilities described above is not a sufficient mitigation and is not acceptable, posing a high risk of compromise, whether intentional or accidental. The device MUST NOT have such capabilities installed if the device is to enter a secure area.</p>]]></paragraph>
<paragraph
    title="11.5.7."


><![CDATA[<p>There is a wide variety of devices now available with upgrades and new models appearing frequently. There are many hundreds of models with a variety of custom operating systems and programmes and other applications. Some industry surveys and predications are forecasting explosive growth in the use of wearable devices, reaching over 100 million devices by 2020. Checking the capabilities and vulnerabilities of each device and subsequent security testing or validation will be an onerous task for agencies and may be infeasible.</p>]]></paragraph>
</block>
<block title="Key Risk Areas"><paragraph
    title="11.5.8."


><![CDATA[<p>Personal wearable devices are not only about the technological aspects, the human factor is equally important. Users often forget about personal information security and their own safety, which enables social engineering attacks on the devices. The main protective measure for users is awareness, but even the <em>trust-but-verify</em> rule is not completely reliable in this situation. Accordingly, the information gathered by wearable devices should be appropriately secured to maintain privacy and personal security.</p>]]></paragraph>
<paragraph
    title="11.5.9."


><![CDATA[<p>There are four important risk groups to be considered when managing personal wearable devices:</p>
<ol>
<li>Data leaks and breaches;</li>
<li>Network security compromises;</li>
<li>Personal information leaks; and</li>
<li>Privacy violations.</li>
</ol>]]></paragraph>
</block>
<block title="Personal Information"><paragraph
    title="11.5.10."


><![CDATA[<p>In most cases, the protection of personal information will be the responsibility of the individual. In cases where the use of devices is permitted under a medical exemption, agencies MAY be required to ensure that devices that collect and store data comply with relevant regulation and guidance, such as the Privacy Act.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="11.5.11."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR Mandatory Requirements</strong></td>
<td>GOV2, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="References"><paragraph
    title="11.5.12."


><![CDATA[<p class="NormS10C2">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>ITL bulletin for April 2010</strong></p>
</td>
<td>
<p><strong>Guide to protecting personally identifiable information</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td><a title="ITL Bulletin" rel="noopener noreferrer" href="https://csrc.nist.gov/csrc/media/publications/shared/documents/itl-bulletin/itlbul2010-04.pdf" target="_blank">https://csrc.nist.gov/csrc/media/publications/shared/documents/itl-bulletin/itlbul2010-04.pdf [PDF, 50 KB]</a></td>
</tr>
<tr>
<td>
<p><strong>SP&nbsp;800-122</strong></p>
</td>
<td>
<p><strong>Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) - Recommendations of the National Institute of Standards and Technology</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td><a title="SP 800-122" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf [PDF, 800 KB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Privacy Act 2020&nbsp;</strong></td>
<td style="text-align: center;"><span>Office of The Privacy Commissioner</span>&nbsp;</td>
<td>
<p><a title="Privacy commission" rel="noopener noreferrer" href="https://privacy.org.nz/" target="_blank">https://privacy.org.nz/</a></p>
<p><a title="Legislation NZ" rel="noopener noreferrer" href="https://legislation.govt.nz/" target="_blank">https://legislation.govt.nz/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>The Health Insurance Portability and Accountability Act of 1996 (USA)</strong></td>
<td style="text-align: center;">
<p>US Congress</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.gpo.gov/fdsys/pkg/PLAW-104publ191/html/PLAW-104publ191.htm" target="_blank">https://www.gpo.gov/fdsys/pkg/PLAW-104publ191/html/PLAW-104publ191.htm</a></p>
<p><a rel="noopener noreferrer" href="https://www.hhs.gov/hipaa/index.html" target="_blank">https://www.hhs.gov/hipaa/index.html</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Health Information Technology for Economic and Clinical Health Act (HITECH Act) (USA)</strong></td>
<td style="text-align: center;">
<p>US Congress</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073.pdf" target="_blank">https://www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073.pdf [PDF, 881 KB]</a></p>
<p><a rel="noopener noreferrer" href="http://www.hhs.gov/hipaa/for-professionals/special-topics/HITECH-act-enforcement-interim-final-rule/index.html%20" target="_blank">http://www.hhs.gov/hipaa/for-professionals/special-topics/HITECH-act-enforcement-interim-final-rule/index.html&nbsp;</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Technology, Media and Telecommunications Predictions, 2014</strong></td>
<td style="text-align: center;">Deloitte</td>
<td><a rel="noopener noreferrer" href="https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Technology-Media-Telecommunications/gx-tmt-predictions-2014-interactive.pdf" target="_blank">https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Technology-Media-Telecommunications/gx-tmt-predictions-2014-interactive.pdf [PDF, 1.05 MB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Technology, Media and Telecommunications Predictions, 2015</strong></td>
<td style="text-align: center;">Deloitte</td>
<td><a rel="noopener noreferrer" href="https://www2.deloitte.com/au/en/pages/technology-media-and-telecommunications/articles/tmt-predictions.html" target="_blank">https://www2.deloitte.com/au/en/pages/technology-media-and-telecommunications/articles/tmt-predictions.html</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Study: Wearable Technology &amp; Preventative Healthcare</strong></td>
<td style="text-align: center;">
<p>Technology Advice Research</p>
</td>
<td><a rel="noopener noreferrer" href="http://technologyadvice.com/" target="_blank">http://technologyadvice.com/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Security Analysis of Wearable Fitness Devices (Fitbit)</strong></td>
<td style="text-align: center;">
<p>Massachusetts Institute of Technology</p>
</td>
<td><a rel="noopener noreferrer" href="https://courses.csail.mit.edu/6.857/2014/files/17-cyrbritt-webbhorn-specter-dmiao-hacking-fitbit.pdf" target="_blank">https://courses.csail.mit.edu/6.857/2014/files/17-cyrbritt-webbhorn-specter-dmiao-hacking-fitbit.pdf [PDF, 630 KB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Fit and Vulnerable: Attacks and Defenses for a Health Monitoring Device</strong></td>
<td style="text-align: center;">
<p>School of Computing and Information Sciences, Florida International University</p>
</td>
<td><a rel="noopener noreferrer" href="https://arxiv.org/pdf/1304.5672.pdf" target="_blank">https://arxiv.org/pdf/1304.5672.pdf [PDF, 541 KB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Survey of Security and Privacy Issues of Internet of Things</strong></p>
</td>
<td style="text-align: center;">&nbsp;</td>
<td>&nbsp;<a rel="noopener noreferrer" href="http://arxiv.org/ftp/arxiv/papers/1501/1501.02211.pdf" target="_blank">http://arxiv.org/ftp/arxiv/papers/1501/1501.02211.pdf [PDF, 548 KB]</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Personal Wearable Device usage policy"><paragraph
    title="11.5.13.R.01."

    tags="Communications systems,Governance,Personal Wearable Devices"


><![CDATA[<p>Any device that uses part of the RF spectrum to communicate is subject to interception. The required level of expertise to conduct intercepts needed varies greatly. Other capabilities of Personal Wearable Devices can be used for malicious purposes, including the theft of classified information and revealing the identities of personnel. Accidentally or maliciously revealing classified information through Personal Wearable Devices can lead to a security breach.</p>]]></paragraph>
<paragraph
    title="11.5.13.C.01."

    tags="Communications systems,Governance,Personal Wearable Devices"


    classification="All Classifications"
    compliance="Must"
    cid="2736"
><![CDATA[<p>Agencies MUST develop a policy governing the use of personal wearable devices, including fitness devices.</p>]]></paragraph>
</block>
<block title="Personnel awareness"><paragraph
    title="11.5.14.R.01."

    tags="Communications systems,Governance,Personal Wearable Devices"


><![CDATA[<p>There is a high risk of unintended disclosure of classified information when using personal wearable devices. It is important that personnel are aware of the level of classified information they discuss, the environment in which they are operating as well as the wide range of security risks associated with the use of mobile and personal wearable devices.</p>]]></paragraph>
<paragraph
    title="11.5.14.C.01."

    tags="Communications systems,Governance,Personal Wearable Devices"


    classification="All Classifications"
    compliance="Must"
    cid="2750"
><![CDATA[<p>Agencies MUST advise personnel of the maximum permitted classification for conversations where any personal wearable or mobile device may be present.</p>]]></paragraph>
<paragraph
    title="11.5.14.C.02."

    tags="Communications systems,Governance,Personal Wearable Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2752"
><![CDATA[<p>Agencies SHOULD advise personnel of all known security risks posed by using personal wearable devices in secure areas or other areas where classified conversations can occur.</p>]]></paragraph>
</block>
<block title="Mobile Device Physical Security"><paragraph
    title="11.5.15.R.01."

    tags="Communications systems,Technical,Mobile Devices,Personal Wearable Devices,Physical Security,Secure Area"


><![CDATA[<p>Personal wearable devices are invariably software controlled and can be infected with malware or other means of compromise. No “off-hook” or “power off” security can be effectively provided, creating vulnerabilities for secure areas. Secure areas are defined in <a title="Secure areas" href="http://nzism.gcsb.govt.nz/ism-document#Block-12020">Chapter 1 at 1.1.36</a>.</p>]]></paragraph>
<paragraph
    title="11.5.15.C.01."

    tags="Communications systems,Technical,Mobile Devices,Personal Wearable Devices,Physical Security,Secure Area"


    classification="Confidential, Secret, Top Secret"
    compliance="Must Not"
    cid="2758"
><![CDATA[<p>Personal wearable devices MUST NOT be allowed to enter secure areas.</p>]]></paragraph>
<paragraph
    title="11.5.15.C.02."

    tags="Communications systems,Technical,Mobile Devices,Personal Wearable Devices,Physical Security,Secure Area"


    classification="All Classifications"
    compliance="Should"
    cid="2759"
><![CDATA[<p>Agencies SHOULD provide a storage area or lockers where personal wearable devices can be stored before personnel enter secure or protected areas.</p>]]></paragraph>
</block>
<block title="Medical Exemptions"><paragraph
    title="11.5.16.R.01."

    tags="Communications systems,Technical,Personal Wearable Devices,Secure Area"


><![CDATA[<p>In some isolated cases personal wearable devices are necessary for the medical well-being of the individual. In such cases personal wearable devices MAY be permitted with the written authority of the Agency’s Accreditation Authority. Such devices MUST NOT have any of the following capabilities:</p><ul>
<li>Camera;</li>
<li>Microphone;</li>
<li>Voice/video/still photograph recording; </li>
<li>Cellular, Wi-Fi or other RF.</li>
</ul><p>Merely disabling such capabilities is not acceptable. The device MUST NOT have such capabilities installed. Permitted device capabilities are:</p><ul>
<li>Accelerometer;</li>
<li>Altimeter;</li>
<li>Gyroscope; </li>
<li>Heart Activity monitor;</li>
<li>Vibration feature for the personal notification purposes.</li>
</ul>]]></paragraph>
<paragraph
    title="11.5.16.R.02."

    tags="Communications systems,Technical,Personal Wearable Devices,Secure Area"


><![CDATA[<p>Personal wearable devices may contain personal information of the individual using the device.&nbsp; This may be on the device itself in printed or electronic form, and also in the registers of tested, permitted or rejected devices in use within the agency.&nbsp; It is important that relevant legislation and regulation pertaining to the protection of personal information is followed.</p>]]></paragraph>
<paragraph
    title="11.5.16.C.01."

    tags="Communications systems,Technical,Personal Wearable Devices,Secure Area"


    classification="Confidential, Secret, Top Secret"
    compliance="Must Not"
    cid="2763"
><![CDATA[<p>Any personal wearable devices approved on medical grounds MUST NOT have any of the following capabilities:<br>Camera;<br>Microphone;<br>Voice/video/still photograph recording; <br>Cellular, Wi-Fi or other RF means of transmission.</p>]]></paragraph>
<paragraph
    title="11.5.16.C.02."

    tags="Communications systems,Technical,Personal Wearable Devices,Secure Area"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="2765"
><![CDATA[<p>Where personal wearable devices are exempted on medical grounds and used in secure areas agencies MUST ensure that:</p><ul>
<li>the agency networks in secure areas have been certified and accredited for the purpose; and</li>
<li>users are aware of the area, surroundings, potential for overhearing and potential for oversight.</li>
</ul>]]></paragraph>
<paragraph
    title="11.5.16.C.03."

    tags="Communications systems,Technical,Personal Wearable Devices,Secure Area"


    classification="All Classifications"
    compliance="Must"
    cid="2767"
><![CDATA[<p>Where the use of personal wearable devices is permitted on medical grounds and used within a corporate or agency environment, agencies MUST ensure any relevant legislation and regulation pertaining to the protection of personal information is followed.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="11.6. Radio Frequency Identification Devices"><subsection title="Objective"><paragraph
    title="11.6.1."


><![CDATA[<p>To ensure Radio Frequency Identification (RFID) devices are used safely and securely in order to protect privacy, prevent unauthorised access and to prevent the compromise of secure spaces.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope "><paragraph
    title="11.6.2."


><![CDATA[<p>This section provides information relating to the risks, security and secure use of RFID devices. Card access control systems incorporating RFID or smart cards are discussed in more detail in <a title="Card access control systems" href="http://nzism.gcsb.govt.nz/ism-document#Section-14321">Section 11.7 - Card Access Control Systems</a>.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="11.6.3."


><![CDATA[<p>This section contains a short description of the history, formats, operating frequencies, risks, controls and countermeasures related to the use of RFID.</p>]]></paragraph>
<paragraph
    title="11.6.4."


><![CDATA[<p>In practical use since the 1970’s, RFID is now widely used for product identification, stock control, as anti-theft in manufacturing and retail organisations, payment cards (smart ATM and paywave cards) and access control systems. They are useful tools in improving logistics, profoundly changing cost structures for business, and improving levels of safety and authenticity in a wide range of applications such as access control, passports, payment cards, vehicle immobilisers, toll roads, pharmaceuticals tracking, management of high value items and weapons control. RFID tags are now produced in a wide variety of types and sizes, from the size of a grain of rice or printed on paper to much larger devices incorporating a battery or other power supply.</p>]]></paragraph>
<paragraph
    title="11.6.5."


><![CDATA[<p>Unlike bar coding systems, RFID devices can communicate without requiring line of sight and over distances ranging from a few centimetres to kilometres. They can be equipped with sensors to collect data on temperature changes, sudden shocks, humidity or other factors affecting product safety and quality.</p>]]></paragraph>
<paragraph
    title="11.6.6."


><![CDATA[<p>RFID devices typically use radio signals to transmit identifying information such as product or serial numbers, manufacture date, origin and batch number. This identifying information is invariably in the form of an Electronic Product Code (EPC) following the standards and conventions published by GS1. GS1 is a global group that also develops standards for other identifiers such as barcodes. The GS1 standards and conventions are now incorporated into ISO standards, see references table&nbsp;at <a href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-14247">11.6.57</a>.</p>]]></paragraph>
</block>
<block title="Basic Formats"><paragraph
    title="11.6.7."


><![CDATA[<p>The basic format of an Electronic Product Code (EPC) is illustrated below:</p>
<p><img class="leftAlone" title="" src="assets/NZISM/ElectronicProductCodeType1.png" alt="Diagram of Electronic Product Code Type 1: 96-bit" width="600" height="335"></p>]]></paragraph>
<paragraph
    title="11.6.8."


><![CDATA[<p>RFID devices are often referred to as “tags”. Passive tags are unpowered and harvest power from the RFID reader. Active tags incorporate a power supply, usually a battery. Tags are produced in Classes 0 to 5 and are now generally produced to Generation 2 specifications. The EPCGen2 standard for Class 1 tags focuses on reliability and efficiency but supports only very basic security. Features of the Gen 2 specification include:</p><ul>
<li><strong>a 96 bit EPC number</strong> with read/write capability and can be designated used for other data ;</li>
<li><strong>a 32/64 bit tag identifier</strong> (TID) – identifies the manufacturer of the tag, also with read/write capabilities; </li>
<li><strong>32 bit kill password</strong> to permanently disable the tag; </li>
<li><strong>32 bit access password</strong> to lock the read/write characteristics of the tag and also set the tag for disabling ;</li>
<li><strong>User memory</strong> – dependant on the manufacturer and can be as little as 0 bits to 2048 bits. Larger user memory is in development.</li>
</ul>]]></paragraph>
<paragraph
    title="11.6.9."


><![CDATA[<p>The distance from which a tag can be read is termed the read range. A read range will depend on a number of factors, including the radio frequency used for reader/tag/reader communication, the size and orientation of the antennae, the power output of the reader, and whether the tags have a battery or other power supply. Battery-powered tags typically have a read range of 100 meters (approximately 300 feet) although this can extend to kilometres under favourable conditions. It is possible that powered RFID tags, typically used on cargo containers, railway wagons, vehicles and other large assets, could be read from a satellite if there is little background “noise” and the broadcast signal is sufficiently powerful.</p>]]></paragraph>
<paragraph
    title="11.6.10."


><![CDATA[<p>RFID tags are divided into classes 0 to 5:</p><table class="table-main">
<tbody>
<tr>
<td>Class</td>
<td>Description</td>
</tr>
<tr>
<td><strong>0</strong></td>
<td>Read only, passive tags</td>
</tr>
<tr>
<td><strong>1</strong></td>
<td>Write once passive tags.  128-bit memory.</td>
</tr>
<tr>
<td><strong>2</strong></td>
<td>Read/Write with up to 65Kb read/write memory and authenticated access control.  Can monitor temperature, pressure, vibration.</td>
</tr>
<tr>
<td><strong>3</strong></td>
<td>Semi-Passive. Own power source but cannot initiate communication.  Remains passive until activated by a reader.  Up to 65 Kb read/write memory and integrated sensor circuitry.</td>
</tr>
<tr>
<td><strong>4</strong></td>
<td>Active tags (own power source) with integrated transmitter.  Can communicate with readers and other tags operating in the same RF band.  Rewritable memory and ad hoc networking capability.  Read range &gt;100 metres (approx. 300’).</td>
</tr>
<tr>
<td><strong>5</strong></td>
<td>Reader tags, can power class 1 to 3 tags and communicate with all classes.  Includes all the capabilities of class 4 tags.</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Operating Frequencies"><paragraph
    title="11.6.11."


><![CDATA[<p>RFID operates in several parts of the Radio Spectrum. Not all frequencies are authorised for use in all countries and will depend on the radio spectrum allocation authority in each country. It is important to note, however, that some RFID tags designed to operate at frequencies not used in the importing country may be attached to imported goods. This can represent a risk from scanning at frequencies not authorised or normally monitored in the importing country.</p>]]></paragraph>
<paragraph
    title="11.6.12."


><![CDATA[<p>Depending on the design and intended application, RFID tag can operate at different frequencies. It is important to note that longer range RFID tags operate at frequencies close to or within allocated Wi-Fi frequencies. Allocated frequencies are:</p><table class="table-main">
<tbody>
<tr>
<td style="color: black;"><strong>Band</strong></td>
<td style="color: black;"><strong>Frequency</strong></td>
<td style="color: black;">
<p><strong>Typical Range</strong></p>
</td>
</tr>
<tr>
<td><strong>LF</strong></td>
<td>125-134.2 kHz and 140-148.5 kHz </td>
<td>
<p>Up to 1/2 metre</p>
</td>
</tr>
<tr>
<td><strong>HF</strong></td>
<td>
<p>13.553 - 13.567 MHz and 26.957 - 27.283 MHz</p>
</td>
<td>
<p>Up to 1 metre</p>
</td>
</tr>
<tr>
<td><strong>UHF</strong></td>
<td>
<p>433 MHz, 858 - 930 MHz, 2.400 - 2.483 GHz, 2.446 - 2.454GHz</p>
</td>
<td>
<p>1 to 10 metres</p>
</td>
</tr>
<tr>
<td><strong>SHF</strong></td>
<td>
<p>5.725 - 5.875 GHz</p>
</td>
<td>
<p>&gt; 100 metres</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="11.6.13."


><![CDATA[<p>As RFID devices are deployed in more sophisticated applications such as matching hospital patients with laboratory test results or tracking systems for dangerous materials, concerns have been raised about protecting such systems against eavesdropping, unauthorised uses and privacy breaches.</p>]]></paragraph>
</block>
<block title="Smart Cards"><paragraph
    title="11.6.14."


><![CDATA[<p>Smart cards typically comprise an embedded integrated circuit incorporating a microchip with internal memory, a read-only CSN (Card Serial Number) or a UID (User Identification). The card connects to a reader with direct physical contact or a contactless radio frequency (RFID) interface. With an embedded microchip, smart cards can store large amounts of data, carry out on-card functions (such as encryption and authentication) and interact intelligently with a smart card reader. Smart card technology can be found in a variety of form factors, including plastic cards, key fobs, watches, subscriber identification modules used in mobile phones, and USB-based tokens. Smart cards are widely used in payment card (debit and credit cards and electronic wallets) and access control systems.</p>]]></paragraph>
<paragraph
    title="11.6.15."


><![CDATA[<p>The <a title="ISO/IEC 14443" rel="noopener noreferrer" href="https://www.iso.org/search.html?q=14443" target="_blank">ISO/IEC 14443</a>&nbsp;standard for contactless smart card communications defines two types of contactless cards ("A" and "B") and allows for communications at distances up to 10 cm operating at 13.56 MHz. The alternative <a title="ISO/IEC 15693" rel="noopener noreferrer" href="https://www.iso.org/search.html?q=15693" target="_blank">ISO/IEC 15693</a> standard allows communications at distances up to 50 cm. The <a title="ISO/IEC 7816" rel="noopener noreferrer" href="https://www.iso.org/search.html?q=7816" target="_blank">ISO/IEC 7816</a> standard (in 15 parts) defines the physical, electrical interface and operating characteristics of these cards.</p>]]></paragraph>
<paragraph
    title="11.6.16."


><![CDATA[<p>In common with other RFID devices, smart cards incorporate an antenna embedded in the body of the card (or key fob, watch or token). When the card is brought within range of the reader, the chip in the card is powered on. Once powered on, an RF communication protocol is initiated and communication established between the card and the reader for data transfer.</p>]]></paragraph>
<paragraph
    title="11.6.17."


><![CDATA[<p>Smart cards typically incorporate protective mechanisms including authentication, secure data storage, encryption, tamper-resistance and secure communication. Support for biometric authentication may also be incorporated.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Threats and Vulnerabilities"><paragraph
    title="11.6.18"


><![CDATA[<p>Some important characteristics of RFID, inherent in the design and properties of the technology are:</p><ul>
<li>RFID tags are powered by the field emitted by an RFID reader, so whenever a tag is placed in a reader field it is activated and available. In general terms, class 0 and class 1 tags cannot be powered off, only permanently deactivated;</li>
<li>RFID tags automatically respond to reader interactions without explicit control of the tag owner, so RFID tags can be operated without their owner’s consent;</li>
<li>It is trivial to establish a communication with an RFID tag and there is no visual confirmation of a tag/reader interaction (i.e., no physical connection or manual operation is required), so it is possible to interact with an RFID tag without being detected.</li>
</ul>]]></paragraph>
<paragraph
    title="11.6.19"


><![CDATA[<p>Specific threats and vulnerabilities in the use of RFID technologies include:</p><ul>
<li><strong>Legitimate data-mining</strong>: This risk predates the use of RFID technology, but the volume of data provided by RFID tags, loyalty cards, Near Field Communication (NFC) for bank cards and for electronic wallets increases the risk. Some data collection methods keep to ethical use of data-mining techniques to discover the characteristics and habits of an individual or an organisation. This can pose a business intelligence risk. At times, however, this may challenge the bounds of privacy and data ownership. For example, customer loyalty card data used to discover medical information about an individual or RFID tags to track shipments or deliveries to an organisation by a competitor.&nbsp;</li>
<li><strong>Eavesdropping and Data theft</strong>: This risk is similar to the data-mining risk but employs unethical and possibly illegal methods of data collection or obtaining data for nefarious or malicious purposes. RFID tags are designed to broadcast information and data theft by easily concealable RFID scanners is technically trivial. Data theft can pose a risk to business processes.</li>
<li><strong>Skimming</strong>: Occurs when an unauthorised reader gains access to data stored on a token. This type of attack is particularly dangerous where contactless access or payment cards are used.</li>
<li><strong>Relay Attacks</strong>: Relay attacks use eavesdropping to intercept legitimate tag/reader transmissions and relay these to a device at some distance from the legitimate tag. The device can then behave as the genuine tag. Again this type of attack is particularly dangerous where contactless access or payment cards are used.</li>
<li><strong>Insert Attacks</strong>: Insert attacks insert system commands where normal data is expected and relies on a lack of data validation. It is possible that a tag can have legitimate data replaced by a malicious command.</li>
<li><strong>Tag Cloning</strong>: Clones replicate the functionality of legitimate tags and can be used to access controlled areas, abuse private data, or make an unauthorised electronic transaction. Tag authentication using a challenge-response protocol is a defence against cloning as the information that attackers can obtain through the air interface (such as by eavesdropping) is insufficient to provide a legitimate response. The design of the tag can also incorporate measures at the circuit manufacturing stage to protect tags from duplication by reverse engineering.</li>
<li><strong>Data corruption</strong>: Most RFID tags are rewritable by design. This feature may be locked (turning the tag into a write-once, read-many device) or left active, depending on application and security sensitivity. For example, in libraries, the RFID tags are frequently left unlocked for the convenience of librarians in reusing the tags on different books or to track check-ins and check-outs. If tags are not protected, it creates an opportunity for malicious users to overwrite data, typically in the theft of high-value goods by marking them as low-value items or in the case of weapons monitoring, changing the weapon identification.</li>
<li><strong>Shipment or People tracking</strong>: While RFID tags are designed to assist in stock control and supply chain management, unauthorised tracking of shipments or of people is undesirable and may even be dangerous. It is possible to follow individuals carrying tags using several techniques, including placing fake readers at building access points, deploying unauthorised readers near legitimate readers and creating relay points along expected routes.</li>
<li><strong>Tag Blocking</strong>: This is a form of denial of service by introducing a blocker tag which is designed to simulate all possible tags in an allocated range. This causes readers to continually perform multiple reads on non-existent and non-responsive tags. Blocker tags are sometimes used where privacy or confidentiality are required.</li>
<li><strong>Denial of Service (DOS)</strong>: Also known as flooding attacks where a signal is flooded with more data than it is designed to handle. Similar in many respects to RF Jamming.</li>
</ul>]]></paragraph>
 <block title="Attack Vectors"><paragraph
    title="11.6.20."


><![CDATA[<p>Attack vectors for RFID devices include:</p><ul>
<li>interception of legitimate transmissions;</li>
<li>interception of authorised reader data by an unauthorised device;</li>
<li>unauthorised access to tags and readers;</li>
<li>rogue/cloned tags;</li>
<li>rogue and unauthorised RFID readers; </li>
<li>side-channel attacks (timing measurements, electromagnetic radiations etc.); </li>
<li>attacks on back-end systems;</li>
<li>jamming of legitimate signals.</li>
</ul>]]></paragraph>
<paragraph
    title="11.6.21."


><![CDATA[<p>Because RFID devices incorporate antennas, there is a possibility of radiation hazards from high –powered devices, particularly active tags and readers. It is important to note however that these cases are rare, occur in high powered devices only and that the vast majority of RFID devices do not pose radiation hazards. Related hazards include electromagnetic radiation hazards to personnel (HERP), fuel (HERF) and ordnance (HERO).</p>]]></paragraph>
<paragraph
    title="11.6.22."


><![CDATA[<p>Threats and Vulnerabilities of RFID systems are summarised in the table below:</p><table class="table-main">
<tbody>
<tr>
<td>
<p>Threat/Vulnerability</p>
</td>
<td>Tag</td>
<td>RF</td>
<td>Reader</td>
<td>Network</td>
<td>
<p>Back-End</p>
</td>
<td>
<p>People</p>
</td>
</tr>
<tr>
<td><strong>Eavesdropping</strong></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Relay Attack</strong></p>
</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Unauthorised Tag Reading (skimming)</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>People Tracking</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
</tr>
<tr>
<td>
<p><strong>Shipment Tracking</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Tag Cloning</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Replay Attack</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Insert Attack</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Tag Content Modification</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Malware</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>RFID System Failure</strong></p>
</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
</tr>
<tr>
<td><strong>Tag Destruction</strong></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Tag Blocking</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td><strong>Denial of Service (DoS)</strong></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>RF Jamming</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
</tr>
<tr>
<td><strong>Back-End Attacks</strong></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td><strong>Radiation Hazard&nbsp;</strong></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="11.6.23."


><![CDATA[<p>It is important to note that attacks are often used in combination creating blended attacks. Blended attacks may be a combination of attack types, use of multiple attack vectors, the targeting of individual sub-systems or combinations of all three elements.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Good Practices and Countermeasures"><paragraph
    title="11.6.24"


><![CDATA[<p>Good practice for ensuring the security and privacy of RFID systems includes:</p><ul>
<li>a risk assessment to determine the nature and extent of risk and threat in the proposed use of RFID;</li>
<li>strong security architecture to protect RFID databases and communication systems;</li>
<li>authentication of approved users of RFID systems;</li>
<li>encryption of radio signals when feasible;</li>
<li>temporarily or permanently disabling tags when not required;</li>
<li>shielding RFID tags and tag reading areas to prevent unauthorised access or modification;</li>
<li>incident management, audit procedures, logging and time stamping to help detect and manage security breaches; and</li>
<li>tag disposal and recycling procedures that permanently disable or destroy sensitive data.</li>
</ul>]]></paragraph>
 <block title="Authentication"><paragraph
    title="11.6.25."


><![CDATA[<p>By design and usage, RFID technologies are item, product or shipment identification <strong>but</strong> not authentication technologies. Authentication of a reader or tag requires a common secret (key) shared when establishing communication, and before data is exchanged. Currently, only RFID tags with microprocessors have sufficient computation resources to use authentication techniques. These can be found in such applications as e-passports, or payment or ticketing applications (public transport, for example).</p>]]></paragraph>
<paragraph
    title="11.6.26."


><![CDATA[<p>With a challenge/response authentication mechanism the reader issues an enquiry to the tag which results in a response. The secret tag information is computed information from internal cryptographic algorithms by both the tag and reader and the results are sent. Correct responses are required for a successful information exchange. The system is essentially the same as encrypting data over a standard radio link.</p>]]></paragraph>
<paragraph
    title="11.6.27."


><![CDATA[<p>The ISO/JTC1/SC31 committee is in the process of establishing new standards to support the use of simple RFID authentication and encryption protocols.</p>]]></paragraph>
</block>
<block title="Keyed-Hash Message Authentication Code (HMAC)"><paragraph
    title="11.6.28."


><![CDATA[<p>HMAC is a protocol where both an RFID reader and RFID tag share a common secret key that can be used in combination with a hash algorithm to provide one-way or mutual authentication between tag and reader. When HMAC is applied to messages, it also assures the integrity of data in the messages.</p>]]></paragraph>
<paragraph
    title="11.6.29."


><![CDATA[<p>HMAC is not specified in any RFID standard, but the capability is generally available in vendor products. HMAC is often used where the risk of eavesdropping is high and passwords alone are considered to offer an inadequate authentication mechanism. This will be determined by the risk assessment. HMAC is also used where applications require evidence of a tag’s authenticity.</p>]]></paragraph>
</block>
<block title="Digital Signatures"><paragraph
    title="11.6.30."


><![CDATA[<p>Digital signatures are compatible with existing RFID tag standards. In authenticated RFID systems, tags can receive, store, and transmit digital signatures with existing read and write commands because the complexity is managed by readers or back-end systems. However, the use of digital signatures to support authentication of readers to tags would require tags to support relatively complex cryptographic functions, beyond the capacity of common tag designs.</p>]]></paragraph>
<paragraph
    title="11.6.31."

    tags="Evaluated Products"


><![CDATA[<p>In addition, digital signatures that are not generated by the tag itself are subject to replay attacks. An adversary could query a tag to obtain its evidence of authenticity (i.e., the digital signature created by a previous reader) and then replicate that data on a cloned tag. Consequently, password or symmetric key authentication systems likely will support tag access control, as opposed to tag authenticity verification, for the immediate future.</p>]]></paragraph>
</block>
<block title="Encryption"><paragraph
    title="11.6.32."


><![CDATA[<p>Data stored in the memory of an RFID tag is intended to be freely shared with the various tag users (manufacturers, stock controllers, shipping agents, etc.). Only an RFID reader is required to access the data which raises the question of data security. Memory and computational power of an RFID tag is limited, but data elements can be password-protected or reserved for nominated usage. Several levels of authorisation (read-only, read and write, delete, etc.) can be determined. It is also advisable to encrypt the data entered onto the tag, the encryption/decryption taking place at the RFID reader or back-end system.</p>]]></paragraph>
</block>
<block title="Cover-Coding"><paragraph
    title="11.6.33."


><![CDATA[<p>Cover-coding is a method of hiding information from eavesdroppers. In the EPCglobal Class-1 Generation-2 standard, cover-coding is used to obscure passwords and information written to a tag using the write command. Some proprietary technologies also support similar features. Cover-coding is an example of minimalist cryptography because it operates within the challenging power and memory constraints of passive RFID tags.</p>]]></paragraph>
<paragraph
    title="11.6.34."


><![CDATA[<p>Cover-coding is a useful mitigation where eavesdropping is a risk, but adversaries are expected to be at a greater distance from the tags than readers. Cover-coding helps prevent the execution of unauthorised commands that could disable a tag or modify the tag’s data. Cover-coding mitigates business process, business intelligence, and privacy risks.</p>]]></paragraph>
</block>
<block title="Rolling Code"><paragraph
    title="11.6.35."


><![CDATA[<p>A rolling code approach is a scheme where the identifier given by the RFID tag changes after each read action. It requires the RFID reader and RFID tag to use identical algorithms. If multiple readers are used, they must be linked so that tracking of code changes can be monitored. This scheme reduces the usefulness of any responses that may be observed unless the pattern of change can be detected or deduced.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Other Defensive Measures"><paragraph
    title="11.6.36"


><![CDATA[<p><span>Other defensive measures, sometimes described as palliative techniques, include shielding, blocker tags, tag “kill” commands, tamper resistance and temporary deactivation. It is important to note these techniques do not use encryption.</span></p>]]></paragraph>
 <block title="Shielding"><paragraph
    title="11.6.37."


><![CDATA[<p>RF shielding is designed to limit the propagation of RF signals outside of the shielded area. Shielding helps to prevent unauthorised reading, access to or modification of the RFID tag data or interfering with RFID readers. Shielding can be applied to small, individual items, such as passports and credit cards or to large elements such as shipping containers.</p>]]></paragraph>
<paragraph
    title="11.6.38."


><![CDATA[<p>Shielding is also important where interference is present or detected. This may be caused by environmental conditions, such as operating in a port area, or by deliberate attempts to access readers or tags.</p>]]></paragraph>
<paragraph
    title="11.6.39."


><![CDATA[<p>Engineering assessments will determine the requirement for shielding from adverse environmental conditions and the risk assessment will determine the likelihood and threat from unauthorised and deliberate attempts to access readers, tags and data.</p>]]></paragraph>
<paragraph
    title="11.6.40."


><![CDATA[<p>RFID blocking wallets and<strong> RFID card sleeves</strong> are available to block RFID frequencies. These are typically used for credit and other payment, access and transit cards and e-passports, as a countermeasure for skimming attacks or unauthorised tracking.</p>]]></paragraph>
</block>
<block title="Blocker Tags"><paragraph
    title="11.6.41."


><![CDATA[<p>A special tag, called a “blocker” tag, blocks an RFID reader by simultaneously answering with 0 and 1 to every reader’s request during the identification protocol. The reader is then incapable of distinguishing individual tags. The blocker tag may block a reader universally or within ranges.</p>]]></paragraph>
<paragraph
    title="11.6.42."


><![CDATA[<p>This furnishes privacy by shielding consumers from the unwanted scanning of RFID tags that they may carry or wear. It also protects against unauthorised readers and eavesdroppers. The blocker tag is an alternative to more simple solutions such as the kill command, shielding and active jamming. It is important to note that active jamming may be illegal (<a href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-14239">see 11.6.53</a>).</p>]]></paragraph>
<paragraph
    title="11.6.43."


><![CDATA[<p>Blocker tags can also implement one or more privacy policies and multiple blocker tags may cover multiple zones.  The blocker tag has a very low-cost of implementation and standard tags need no modification and little support for password-protected bit flipping.  A threat is that blocker tags can be used to mount DoS attacks in which a malicious blocker tag universally blocks readers.</p>]]></paragraph>
</block>
<block title="Tag “Kill” Command "><paragraph
    title="11.6.44."


><![CDATA[<p>The “kill” command is a password-protected command specified in the EPC Gen-1 and EPC Gen-2 standards intended to make a tag non-operational. A typical application is anti-theft where the kill command is activated at a point-of-sale terminal, after goods have been paid for. Kill commands can be password protected.</p>]]></paragraph>
<paragraph
    title="11.6.45."


><![CDATA[<p>Kill commands function by fusing a ROM component or antenna connection by applying a large amount of power to the tag at the point of sale reader/terminal. It is important to note that the antenna deactivation method does not completely kill the tag but rather disable its RF interface. Once in the disabled state, the tag still retains data and can still function.</p>]]></paragraph>
<paragraph
    title="11.6.46."


><![CDATA[<p>The kill feature can represent a threat to an RFID system if the password is compromised. This risk is particularly apparent where the same password is used for multiple tags. If a weak (e.g., short or easily guessed) password is assigned to the kill command, tags can be disabled at will. Also important is the longer a tag uses the same password, the more likely it is that the password will be compromised.</p>]]></paragraph>
<paragraph
    title="11.6.47."


><![CDATA[<p>Data stored on the tag is still present in the tag’s memory after it is disabled (although it can no longer be accessed wirelessly), and, therefore, still may be accessible with physical access to the tag.</p>]]></paragraph>
</block>
<block title="Tamper Resistance"><paragraph
    title="11.6.48."


><![CDATA[<p>Some RFID tags are designed with tamper resistant or tamper-evident features to help prevent unauthorised alteration of removal of tags from the objects to which they are attached. A simple type of tamper resistance is the use of a frangible, or easily broken, antenna. If this tag is removed, the connection with the antenna is severed, rendering the tag inoperable. Other, more complex types of RFID systems monitor the integrity of objects associated with the tags to ensure that the objects have not been compromised, altered, or subjected to extreme conditions.</p>]]></paragraph>
<paragraph
    title="11.6.49."


><![CDATA[<p>Simple forms of tamper resistance may leave data intact and subject to the same threats described above. In addition it is possible to circumvent tamper resistance mechanisms by repairing a frangible antenna. It is important to note that tamper-resistance and tamper-evidence technologies do not prevent the theft or destruction of the tag or its associated items.</p>]]></paragraph>
</block>
<block title="Temporary Deactivation"><paragraph
    title="11.6.50."


><![CDATA[<p>Some tags allow the RF interface to be temporarily deactivated.  Methods vary amongst manufacturers with some methods requiring physical intervention.  Typically tags would be activated inside a designated area and deactivated when shipped, preventing eavesdropping or other unauthorised transactions during shipment.  When the tags arrive at their destination, they can be reactivated, for example for inventory management.  Conversely, tags can be used for tracking during shipment and may be deactivated on delivery.</p>]]></paragraph>
</block>
</subsection>
<subsection title="RFID Risks and Controls Summary"><paragraph
    title="11.6.51."


><![CDATA[<p>A summary of RFID Risks and Controls is presented in the Table below:</p><table class="table-main">
<tbody>
<tr>
<td>
<p>Risk Control</p>
</td>
<td>
<p>Business Process</p>
</td>
<td>
<p>Business Intelligence</p>
</td>
<td>
<p>Privacy</p>
</td>
<td>
<p>Electro-Magnetic Radiation</p>
</td>
<td>
<p>Back-End System Attack</p>
</td>
</tr>
<tr>
<td>
<p>Tag Access Controls</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
</tr>
<tr>
<td>
<p>Password Authentication</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
</tr>
<tr>
<td>
<p>HMAC</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
</tr>
<tr>
<td>
<p>Digital Signature</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
</tr>
<tr>
<td>
<p>Cover-Coding</p>
</td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
</tr>
<tr>
<td>
<p>Encryption – Data in Transit</p>
</td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
</tr>
<tr>
<td>
<p>Encryption – Data at Rest</p>
</td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
</tr>
<tr>
<td>
<p>Encryption – Data on Tag</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
</tr>
<tr>
<td>Shielding</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
</tr>
<tr>
<td>
<p>Blocker Tags</p>
</td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
</tr>
<tr>
<td>
<p>Tag Kill Feature</p>
</td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
</tr>
<tr>
<td>
<p>Tamper Resistance</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
</tr>
<tr>
<td>
<p>Temporary Deactivation</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
</tr>
<tr>
<td>
<p>RF Engineering and Frequency Selection</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Relevant Legislation"><paragraph
    title="11.6.52"


><![CDATA[<p><span>In New Zealand, operation of radio and other equipment in the RF spectrum is controlled Radiocommunications Act 1989, Reprint as at 5 December 2013 and administered by the Ministry of Business Innovation and Employment.</span></p>]]></paragraph>
 <block title="RF Jammers"><paragraph
    title="11.6.53."


><![CDATA[<p>It is illegal to import, manufacture, sell or use a radio jammer in New Zealand except with a licence issued by the Radio Spectrum Management unit of the Ministry of Business, Innovation and Employment. The use and management of RF jammers is governed by the Radiocommunications Regulations (Prohibited Equipment – Radio Jammer Equipment) Notice 2011 under the Regulation 32(1)(i) [a notice in the Gazette] of the Radiocommunications Regulations 2001.</p>]]></paragraph>
</block>
<block title="Secure Spaces"><paragraph
    title="11.6.54."


><![CDATA[<p>The use of RFID technology in secure areas must be carefully considered, recognising that an RFID tag or system incorporates antennae and transmitting capabilities which may compromise the security of such areas. Passive tags (classes 0 and 1) pose little risk in themselves as they require a reader to activate and have little on-board capability. Read/write tags (class 2) pose a higher risk as they have the capability to store data. Other tags (classes 3 to 5) can pose a significant risk to secure spaces.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="11.6.55."


><![CDATA[<p>The relevant PSR Mandatory Requirements are:</p>
<table class="table-grey" style="width: 101.042%; height: 265.097px;">
<tbody>
<tr style="height: 59.1944px;">
<td style="width: 18.3333%; height: 59.1944px;"><strong>References</strong></td>
<td style="width: 19.1%; height: 59.1944px;"><strong>Title</strong></td>
<td style="width: 60.9129%; height: 59.1944px;"><strong>Source</strong></td>
</tr>
<tr style="height: 205.903px;">
<td style="width: 18.3333%; height: 205.903px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 19.1%; height: 205.903px;">GOV2, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td style="width: 60.9129%; height: 205.903px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="References - Guidance"><paragraph
    title="11.6.56."


><![CDATA[<p class="NormS10C2">Further references on Guidance can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>SP 800-98</strong></p>
</td>
<td>
<p><strong>Guidelines for Securing Radio Frequency Identification (RFID) Systems</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;"><a title="SP 800-98" rel="noopener noreferrer" href="https://www.nist.gov/publications/guidelines-securing-radio-frequency-identification-rfid-systems" target="_blank">https://www.nist.gov/publications/guidelines-securing-radio-frequency-identification-rfid-systems</a></td>
</tr>
<tr>
<td>
<p><strong><strong>FIPS PUB 198-1</strong></strong></p>
</td>
<td>
<p><strong>The Keyed-Hash Message Authentication Code (HMAC), July 2008</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;"><a title="FIPS Publication 198-1" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.198-1.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.198-1.pdf [PDF, 126 KB]</a></td>
</tr>
<tr>
<td>
<p><strong><strong>FIPS PUB 180-4</strong></strong></p>
</td>
<td>
<p><strong>Secure Hash Standard (SHS)</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;"><a title="FIPS Publication 180-4" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf [PDF, 814 KB]</a></td>
</tr>
<tr>
<td>
<p class="page-header"><strong>EPC/RFID</strong></p>
</td>
<td>
<p><strong>Implementation Guide for the use of GS1 EPCglobal Standards in the Consumer Electronics Supply Chain</strong></p>
</td>
<td style="text-align: center;">
<p>GS1/EPCglobal</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.gs1.org/standards/epc-rfid" target="_blank">https://www.gs1.org/standards/epc-rfid</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Smart Border Alliance RFID Feasibility Study Final Report Attachment D – RFID Technology Overview</strong></p>
</td>
<td style="text-align: center;">
<p>US Department of Homeland Security</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.dhs.gov/xlibrary/assets/foia/US-VISIT_RFIDattachD.pdf" target="_blank">https://www.dhs.gov/xlibrary/assets/foia/US-VISIT_RFIDattachD.pdf [PDF, 1.49 MB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Smart Border Alliance RFID Feasibility Study Final Report Attachment E – RFID Security And Privacy White Paper</strong></p>
</td>
<td style="text-align: center;">
<p>US Department of Homeland Security</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.dhs.gov/xlibrary/assets/foia/US-VISIT_RFIDattachE.pdf" target="_blank">https://www.dhs.gov/xlibrary/assets/foia/US-VISIT_RFIDattachE.pdf [PDF, 1.8 MB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Test Operations Procedure (TOP) 03-2-616A Electromagnetic Radiation Hazards Testing For Non-Ionizing Radio Frequency Transmitting Equipment</strong></p>
</td>
<td style="text-align: center;">
<p>US Defense Technical Information Center (DTIC),</p>
</td>
<td style="width: 33%;">&nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Electromagnetic Environmental Effects Requirements for Systems – MIL-STD-46C</strong></p>
</td>
<td style="text-align: center;">
<p>US Department of Defense Interface Standard</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="http://everyspec.com/MIL-STD/MIL-STD-0300-0499/MIL-STD-464C_28312/" target="_blank">http://everyspec.com/MIL-STD/MIL-STD-0300-0499/MIL-STD-464C_28312/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>OECD Policy Guidance – A Focus on Information Security and Privacy Applications, Impacts and Country Initiatives.</strong></p>
</td>
<td style="text-align: center;">
<p>OECD Directorate for Science, Technology and Industry</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="http://www.oecd.org/sti/ieconomy/40892347.pdf" target="_blank">http://www.oecd.org/sti/ieconomy/40892347.pdf [PDF, 1.78 MB]</a></td>
</tr>
<tr>
<td>&nbsp;<strong>TR-03126-5</strong></td>
<td>
<p><strong>Technical Guidelines for the Secure Use of RFID (TG RFID) Subdocument 5: Application area “Electronic Employee ID Card” Version 1.0</strong></p>
</td>
<td style="text-align: center;">
<p>BSI – The German Federal Office for Information Security</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG03126/TG_03126_5_Application_area_Electronic_Employee_ID_Card.pdf?__blob=publicationFile" target="_blank">https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG03126/TG_03126_5_Application_area_Electronic_Employee_ID_Card.pdf?__blob=publicationFile</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="References - Standards"><paragraph
    title="11.6.57."


><![CDATA[<p class="NormS10C2">Further references on standards can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>EPC Tag Data Standard Version 1.9, Ratified, Nov-2014</strong></p>
</td>
<td style="text-align: center;">GS1/EPCglobal</td>
<td><a rel="noopener noreferrer" href="http://www.gs1.org/epcrfid-epcis-id-keys/epc-rfid-tds/1-9" target="_blank">http://www.gs1.org/epcrfid-epcis-id-keys/epc-rfid-tds/1-9</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID Specification for RFID Air Interface Protocol for Communications at 860 MHz – 960 MHz Version 2.0.1</strong></p>
</td>
<td style="text-align: center;">GS1/EPCglobal</td>
<td><a rel="noopener noreferrer" href="https://www.icao.int/publications/pages/publication.aspx?docnum=9303" target="_blank">https://www.icao.int/publications/pages/publication.aspx?docnum=9303</a></td>
</tr>
<tr>
<td><strong>ICAO Doc 9303&nbsp;</strong></td>
<td>
<p><strong>Machine Readable Travel Documents Parts 1-12</strong></p>
</td>
<td style="text-align: center;">International Civil Aviation Organization (ICAO)</td>
<td><a title="Machine Readable Travel Documents Part 3: Specifications Common to all MRTDs" rel="noopener noreferrer" href="https://www.icao.int/publications/Documents/9303_p3_cons_en.pdf" target="_blank">https://www.icao.int/publications/Documents/9303_p3_cons_en.pdf [PDF, 2.24 MB]</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-1:2011</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 1: Cards with contacts -- Physical characteristics</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 1: Cards with contacts — Physical characteristics" rel="noopener noreferrer" href="https://www.iso.org/standard/54089.html" target="_blank">https://www.iso.org/standard/54089.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-2:2007&nbsp;</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 2: Cards with contacts -- Dimensions and location of the contacts</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 2: Cards with contacts — Dimensions and location of the contacts" rel="noopener noreferrer" href="https://www.iso.org/standard/45989.html" target="_blank">https://www.iso.org/standard/45989.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-3:2006</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 3: Cards with contacts -- Electrical interface and transmission protocols</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols" rel="noopener noreferrer" href="https://www.iso.org/standard/38770.html" target="_blank">https://www.iso.org/standard/38770.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-4:2020</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 4: Organization, security and commands for interchange</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 4: Organization, security and commands for interchange" rel="noopener noreferrer" href="https://www.iso.org/standard/77180.html" target="_blank">https://www.iso.org/standard/77180.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-5:2004&nbsp;</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 5: Registration of application providers</strong></p>
</td>
<td style="text-align: center;">ISO&nbsp;</td>
<td><a title="Identification cards — Integrated circuit cards — Part 5: Registration of application providers" rel="noopener noreferrer" href="https://www.iso.org/standard/34259.html" target="_blank">https://www.iso.org/standard/34259.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-6:2016</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 6: Interindustry data elements for interchange</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange" rel="noopener noreferrer" href="https://www.iso.org/standard/64598.html" target="_blank">https://www.iso.org/standard/64598.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-7:1999</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit(s) cards with contacts -- Part 7: Interindustry commands for Structured Card Query Language (SCQL)</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit(s) cards with contacts — Part 7: Interindustry commands for Structured Card Query Language (SCQL)" rel="noopener noreferrer" href="https://www.iso.org/standard/28869.html" target="_blank">https://www.iso.org/standard/28869.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-8:2004&nbsp;</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 8: Commands for security operations</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 8: Commands for security operations" rel="noopener noreferrer" href="https://www.iso.org/standard/37989.html" target="_blank">https://www.iso.org/standard/37989.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-9:2017&nbsp;</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 9: Commands for card management</strong></p>
</td>
<td style="text-align: center;">ISO&nbsp;</td>
<td><a title="Identification cards — Integrated circuit cards — Part 9: Commands for card management" rel="noopener noreferrer" href="https://www.iso.org/standard/67802.html" target="_blank">https://www.iso.org/standard/67802.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-10:1999</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit(s) cards with contacts -- Part 10: Electronic signals and answer to reset for synchronous cards</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit(s) cards with contacts — Part 10: Electronic signals and answer to reset for synchronous cards" rel="noopener noreferrer" href="https://www.iso.org/standard/30558.html" target="_blank">https://www.iso.org/standard/30558.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-11:2017&nbsp;</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 11: Personal verification through biometric methods</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 11: Personal verification through biometric methods" rel="noopener noreferrer" href="https://www.iso.org/standard/67799.html" target="_blank">https://www.iso.org/standard/67799.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-12:2005&nbsp;</strong></td>
<td>
<p><strong>Identification cards - Integrated circuit cards -- Part 12: Cards with contacts -- USB electrical interface and operating procedures</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards - Integrated circuit cards — Part 12: Cards with contacts — USB electrical interface and operating procedures" rel="noopener noreferrer" href="https://www.iso.org/standard/40604.html" target="_blank">https://www.iso.org/standard/40604.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-13:2007&nbsp;</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 13: Commands for application management in a multi-application environment</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 13: Commands for application management in a multi-application environment" rel="noopener noreferrer" href="https://www.iso.org/standard/40605.html" target="_blank">https://www.iso.org/standard/40605.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-15:2016&nbsp;</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 15: Cryptographic information application</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 15: Cryptographic information application" rel="noopener noreferrer" href="https://www.iso.org/standard/65250.html" target="_blank">https://www.iso.org/standard/65250.html</a></td>
</tr>
<tr>
<td><strong>ISO 14443-1:2008&nbsp;</strong></td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 1: Physical characteristics</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 1: Physical characteristics" rel="noopener noreferrer" href="https://www.iso.org/standard/39693.html" target="_blank">https://www.iso.org/standard/39693.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 14443-2:2010</strong></td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 2: Radio frequency power and signal interface</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 2: Radio frequency power and signal interface" rel="noopener noreferrer" href="https://www.iso.org/standard/50941.html" target="_blank">https://www.iso.org/standard/50941.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 14443-3:2011&nbsp;</strong></td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 3: Initialization and anticollision</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 3: Initialization and anticollision" rel="noopener noreferrer" href="https://www.iso.org/standard/50942.html" target="_blank">https://www.iso.org/standard/50942.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 14443-4:2008&nbsp;</strong></td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 4: Transmission protocol</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 4: Transmission protocol" rel="noopener noreferrer" href="https://www.iso.org/standard/50648.html" target="_blank">https://www.iso.org/standard/50648.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 15961-1:2013&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Radio frequency identification (RFID) for item management: Data protocol -- Part 1: Application interface</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">https://www.iso.org/home.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 15963:2009&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information technology – Radio frequency identification for item management – Unique identification for RF tags</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">https://www.iso.org/home.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 18000-1:2008&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Radio frequency identification for item management -- Part 1: Reference architecture and definition of parameters to be standardized</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">https://www.iso.org/home.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 18000-2:2009&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Radio frequency identification for item management -- Part 2: Parameters for air interface communications below 135 kHz</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">https://www.iso.org/home.html</a><br><a rel="noopener noreferrer" href="http://www.iso.org" target="_blank"></a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Legislation and Regulation"><paragraph
    title="11.6.58."


><![CDATA[<p class="NormS10C2">Further references on Legislation and Regulation can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>References&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Radiocommunications Act 1989</strong></p>
</td>
<td>
<p>Parliamentary Counsel Office</p>
</td>
<td><a title="Legislation NZ" rel="noopener noreferrer" href="https://legislation.govt.nz" target="_blank">https://legislation.govt.nz</a></td>
</tr>
<tr>
<td>
<p><strong><strong>SR 2001/240</strong></strong></p>
</td>
<td>
<p><strong>Radiocommunications Regulations 2001, Reprint as at 1 February 2015</strong></p>
</td>
<td>
<p>Parliamentary Counsel Office</p>
</td>
<td><a title="Legislation NZ " rel="noopener noreferrer" href="https://legislation.govt.nz" target="_blank">https://legislation.govt.nz</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Radiocommunications Regulations (Prohibited Equipment - Radio Jammer Equipment) Notice 2011</strong></p>
</td>
<td>
<p>New Zealand Gazette Office, Government Information Services, Department of Internal Affairs</p>
</td>
<td><a rel="noopener noreferrer" href="https://gazette.govt.nz/notice/id/2011-go4051" target="_blank">https://gazette.govt.nz/notice/id/2011-go4051</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Radio Spectrum Management</strong></p>
</td>
<td>
<p>Ministry of Business, Innovation and Employment</p>
</td>
<td><a title="Radio spectrum management" rel="noopener noreferrer" href="https://rsm.govt.nz/" target="_blank">https://rsm.govt.nz/</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Risk Assessment"><paragraph
    title="11.6.59.R.01."

    tags="Communications systems,Governance,RF Devices,RFID,Risk Assessment"


><![CDATA[<p>As with many technologies, adoption of RFID has the potential to introduce a wide range of risks in addition to the risks that already exist for agency systems. This may include privacy risks, depending on the use, information held and implementation of the RFID system. A risk assessment is an essential tool in determining and assessing the range and extent of risk and threat in the use of RFID devices.</p>]]></paragraph>
<paragraph
    title="11.6.59.R.02."

    tags="Communications systems,Governance,RF Devices,RFID,Risk Assessment"


><![CDATA[<p>Risks to RFID system vary according to the technology used, system engineering, the systems architecture, application, context and deployment scenario. A holistic approach to risk at each stage of the system life cycle and each for system component is essential if a robust security strategy is to be developed.</p>]]></paragraph>
<paragraph
    title="11.6.59.R.03."

    tags="Communications systems,Governance,RF Devices,RFID,Risk Assessment"


><![CDATA[<p>The identification of classes of tags is fundamental to managing the risks of RFID devices in secure spaces. Classes 0 and 1 pose little risk. Other classes of tag (2 to 5), however, have limited data storage capability and active tags include transmitter functionality which introduces higher levels of risk. RFID readers are, by definition, transmitters and are not permitted in secure spaces.</p>]]></paragraph>
<paragraph
    title="11.6.59.C.01."

    tags="Communications systems,Governance,RF Devices,RFID,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="2956"
><![CDATA[<p>Agencies MUST conduct and document a risk assessment <em>before</em> implementing or adopting an RFID solution.</p>]]></paragraph>
<paragraph
    title="11.6.59.C.02."

    tags="Communications systems,Governance,RF Devices,RFID,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="2957"
><![CDATA[<p>This risk assessment MUST be the basis of a security architecture design.</p>]]></paragraph>
</block>
<block title="Security Architecture"><paragraph
    title="11.6.60.R.01."

    tags="Communications systems,Governance,RF Devices,RFID"


><![CDATA[<p>The foundation of strong security architecture in RFID follows three important principles:</p><ul>
<li><strong>Controlled access to the data</strong> – only authorised entities (people, systems, devices) can read and write information to and from the RFID tags (EPC number, tag identifier, kill password, access password and user memory) and RFID databases;</li>
<li><strong>Control over access to the system</strong> – only authorised entities can configure or add devices to the system, and all devices on the system are authentic and trustworthy;</li>
<li><strong>Confidence and trust</strong> – back-end systems are designed and implemented in accordance with the current version of the NZISM.</li>
</ul>]]></paragraph>
<paragraph
    title="11.6.60.R.02."

    tags="Communications systems,Technical,RF Devices,RFID"


><![CDATA[<p>Sensitive data should be held in a secure RFID Enterprise Subsystem and retrieved using the tag’s unique identifier with only an identifier stored on the tag itself. The Enterprise RFID subsystem should be established as a separate domain where data can be more adequately protected. This structure makes it more difficult for adversaries to obtain information from the tag through scanning or eavesdropping. Data encryption and access control is often more cost-effectively performed in the enterprise subsystem than in the RF subsystem.</p>]]></paragraph>
<paragraph
    title="11.6.60.R.03."

    tags="Communications systems,Technical,RF Devices,RFID"


><![CDATA[<p>Some RFID systems may cover several organisations, for example in supply chains. In such cases, multiple organisations may require access to databases that contain tag identifiers and passwords. The security architecture should incorporate strong security controls including the authentication of external entities, incident management, audit logging and other essential security controls.</p>]]></paragraph>
<paragraph
    title="11.6.60.C.01."

    tags="Communications systems,Governance,RF Devices,RFID"


    classification="All Classifications"
    compliance="Must"
    cid="2962"
><![CDATA[<p>Agencies MUST develop a strong security architecture to protect RFID databases and RFID systems.</p>]]></paragraph>
<paragraph
    title="11.6.60.C.02."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="All Classifications"
    compliance="Must"
    cid="2963"
><![CDATA[<p>Agencies MUST minimise the information stored on RFID tags and in the RFID subsystem.</p>]]></paragraph>
<paragraph
    title="11.6.60.C.03."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="All Classifications"
    compliance="Should"
    cid="2964"
><![CDATA[<p>Agencies SHOULD disable any rewrite functions on RFID devices.</p>]]></paragraph>
<paragraph
    title="11.6.60.C.04."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="All Classifications"
    compliance="Should"
    cid="2965"
><![CDATA[<p>Agencies SHOULD apply the access control requirements of the NZISM (<a title="Communcations systems and devices" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13958">Chapter 11 - Communications Systems and Devices</a>) to RFID systems.</p>]]></paragraph>
</block>
<block title="Policy"><paragraph
    title="11.6.61.R.01."

    tags="Communications systems,Governance,RF Devices,RFID"


><![CDATA[<p>An RFID Usage Policy is an essential component of an agency’s privacy policy, addressing topics such as how personal information is stored and shared. The RFID usage policy should also address privacy issues associated with the tag identifier formats and the potential disclosure of information based solely on the tag identifier format selected. Agencies MAY be required to ensure that devices that collect and store data comply with relevant regulation and guidance, such as the Privacy Act. Refer also to&nbsp;<a title="Data management" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16835">Chapter&nbsp;20 – Data Management</a>.</p>]]></paragraph>
<paragraph
    title="11.6.61.R.02."

    tags="Communications systems,Governance,Information Security Documentation,RF Devices,RFID"


><![CDATA[<p>Any RFID implementation should also be incorporated into the agency’s security policies. Refer also to<a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682"> Chapter 5 – Information Security Documentation</a>.</p>]]></paragraph>
<paragraph
    title="11.6.61.C.01."

    tags="Communications systems,Governance,RF Devices,RFID"


    classification="All Classifications"
    compliance="Should"
    cid="2969"
><![CDATA[<p>Agencies SHOULD develop, implement and maintain an RFID Usage Policy.</p>]]></paragraph>
<paragraph
    title="11.6.61.C.02."

    tags="Communications systems,Governance,Information Security Documentation,RF Devices,RFID"


    classification="All Classifications"
    compliance="Should"
    cid="2970"
><![CDATA[<p>Agencies SHOULD incorporate RFID into the agency’s security policies and information security documentation.</p>]]></paragraph>
</block>
<block title="Inspections "><paragraph
    title="11.6.62.R.01."

    tags="Communications systems,Technical,RF Devices"


><![CDATA[<p>Many system component manufacturers use RFID tags to track shipments. RFID tags may be embedded in the packaging, printed on the reverse of labels, attached to or embedded in the device itself. The ability to identify and track devices may pose a security concern for secure areas or equipment deployed in high security applications.</p>]]></paragraph>
<paragraph
    title="11.6.62.C.01."

    tags="Communications systems,Technical,RF Devices"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="2973"
><![CDATA[<p>Agencies MUST conduct visual and technical inspections of packaging and devices to determine if RFID devices have been attached and either permanently disable or remove such devices.</p>]]></paragraph>
<paragraph
    title="11.6.62.C.02."

    tags="Communications systems,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2974"
><![CDATA[<p>Agencies SHOULD conduct visual inspections of packaging and devices to determine if RFID devices have been attached and if these RFID devices pose a security concern.</p>]]></paragraph>
<paragraph
    title="11.6.62.C.03."

    tags="Communications systems,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2975"
><![CDATA[<p>Agencies SHOULD conduct visual inspections of packaging and devices to determine if RFID devices or labelling have been tampered with and whether this is a security concern.</p>]]></paragraph>
</block>
<block title="Shielding"><paragraph
    title="11.6.63.R.01."

    tags="Communications systems,Technical,RF Devices"


><![CDATA[<p>RF shielding is designed to limit the propagation of RF signals outside of the shielded area. Shielding helps to prevent unauthorised reading, access to or modification of the RFID tag data or interfering with RFID readers. Shielding can be applied to small, individual items, such as passports and credit cards or to large elements such as shipping containers. The requirement for shielding is determined by the risk assessment and an engineering assessment.</p>]]></paragraph>
<paragraph
    title="11.6.63.C.01."

    tags="Communications systems,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2978"
><![CDATA[<p>Agencies SHOULD consider undertaking an RF engineering assessment where security concerns exist or where the RFID systems are to be used in areas with high levels of RF activity.</p>]]></paragraph>
<paragraph
    title="11.6.63.C.02."

    tags="Communications systems,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2979"
><![CDATA[<p>Shielding SHOULD be considered where eavesdropping or RF radiation is a concern, as determined by the risk assessment.</p>]]></paragraph>
</block>
<block title="Positioning of Tags and Readers "><paragraph
    title="11.6.64.R.01."

    tags="Communications systems,Technical,RF Devices"


><![CDATA[<p>In order to minimise unnecessary electromagnetic radiation tags and readers should be carefully positioned. Care should be taken in use of RFID readers in proximity to:</p><ul>
<li>Fuel, ordnance, and other hazardous materials, </li>
<li>Humans and sensitive products (e.g., blood, medicine) that may be harmed by sustained exposure to RF radiation, </li>
<li>Metal and reflective objects that can modify and amplify signals in unintended and potentially harmful ways, and </li>
<li>Legitimate radio and Wi-Fi systems to avoid interference.</li>
</ul>]]></paragraph>
<paragraph
    title="11.6.64.R.02."

    tags="Communications systems,Technical,RF Devices"


><![CDATA[<p>Tag location cannot always be controlled, such as when tags are used to track mobile items or goods in transit. Other difficulties occur with persistent radio interference. In these situations, relocation of readers and tags may provide a solution. Consideration should be given to alternative but cost-effective RF protection measures, such as grounded wire fencing. The engineering assessment undertaken to determine the shielding requirements will assist in determining such measures.</p>]]></paragraph>
<paragraph
    title="11.6.64.C.01."

    tags="Communications systems,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2983"
><![CDATA[<p>Agencies SHOULD consider placement of tags and location of readers to avoid unnecessary electromagnetic radiation.</p>]]></paragraph>
</block>
<block title="Encoding and Encryption"><paragraph
    title="11.6.65.R.01."

    tags="Communications systems,Encryption,Technical,RF Devices"


><![CDATA[<p>If an adversary reads an identifier that is encoded with a published format, such as in the EPC standard, an adversary may be able to obtain useful information such as the manufacturer or issuer of the item, as well as the type of item. Because RFID tags hold limited information and identifier formats are published in standards, it may be important to use identifier formats that do not reveal any information about tagged items or the agency using the RFID system. This will be determined in the risk assessment. Encoding schemes to limit information revealed from unauthorised scanning may include serially or randomly assigning identifiers.</p>]]></paragraph>
<paragraph
    title="11.6.65.R.02."

    tags="Communications systems,Encryption,Technical,RF Devices"


><![CDATA[<p>Adversaries can often obtain valuable information from the identifier alone. For example, knowledge of the EPC manager ID and object class bits may reveal the make and model of tagged objects in a container. If individual items or boxes of items are tagged, the quantities may also be discernible. An adversary might target containers based on their contents.</p>]]></paragraph>
<paragraph
    title="11.6.65.R.03."

    tags="Communications systems,Cryptography,Technical,RF Devices"


><![CDATA[<p>The smallest tags generally used for consumer items, such as clothing, do not have enough computing power to support data encryption. At best these tags can cater for PIN-style or password-based protection. Data can, however, be encrypted before it is stored on a tag. In these designs, encryption is undertaken by the RFID subsystem or the RFID reader. This is an effective means of protecting the data on a tag. Refer also to <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a>.</p>]]></paragraph>
<paragraph
    title="11.6.65.R.04."

    tags="Communications systems,Encryption,Technical,RF Devices"


><![CDATA[<p>The current Gen 2 standard provides for an on-chip 16-bit Pseudo-Random Number Generator (RNG) and a 16-bit Cyclic Redundancy Code (CRC-16) to protect tag/reader channels. Neither of these encryption methods is strong because of the short bit length in the RNG and because CRCs are not suitable for protection against malicious alteration of data.</p>]]></paragraph>
<paragraph
    title="11.6.65.C.01."

    tags="Communications systems,Encryption,Technical,RF Devices"


    classification="All Classifications"
    compliance="Must"
    cid="2989"
><![CDATA[<p>Agencies MUST follow the requirements of the NZISM in the selection and implementation of cryptographic protocols and algorithms, and in key management, detailed in <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 - Cryptography</a>.</p>]]></paragraph>
<paragraph
    title="11.6.65.C.02."

    tags="Communications systems,Encryption,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2990"
><![CDATA[<p>Agencies SHOULD encrypt data before it is written to RFID tags.</p>]]></paragraph>
<paragraph
    title="11.6.65.C.03."

    tags="Communications systems,Encryption,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2991"
><![CDATA[<p>Agencies SHOULD assign RFID identifiers using formats that limit information about tagged items or about the agency operating the RFID system.</p>]]></paragraph>
</block>
<block title="Authentication"><paragraph
    title="11.6.66.R.01."

    tags="Communications systems,Technical,RF Devices"


><![CDATA[<p>Both an RFID reader and RFID tag share a common secret key that can be used in combination with a hash algorithm to provide one-way or mutual authentication between tag and reader. This is known as a<strong> Keyed-Hash Message Authentication Code (HMAC)</strong>. When HMAC is applied to messages, it also assures the integrity of data in the messages. HMAC is not specified in any RFID standard, but the capability is generally available in vendor products. HMAC is often used where the risk of eavesdropping is high and passwords alone are considered to offer an inadequate authentication mechanism. This will be determined by the risk assessment. HMAC is also used where applications require evidence of a tag’s authenticity.</p>]]></paragraph>
<paragraph
    title="11.6.66.C.01."

    tags="Communications systems,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2994"
><![CDATA[<p>Agencies SHOULD consider the use of HMAC when tag authenticity is required.</p>]]></paragraph>
</block>
<block title="Password Management"><paragraph
    title="11.6.67.R.01."

    tags="Communications systems,Technical,RF Devices,Passwords"


><![CDATA[<p>RFID tags generally require passwords before execution of commands such as reading and writing of tag data, memory access control, and the tag kill feature. Passwords are an important control in maintaining the security and integrity of the RFID system. Refer also to <a title="Access control and passwords" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access Control and passwords</a>.</p>]]></paragraph>
<paragraph
    title="11.6.67.R.02."

    tags="Communications systems,Technical,RF Devices,Passwords"


><![CDATA[<p>Tags should not share passwords, although this may not be practical in all cases. In applications such as supply chains, multiple organisations may require access to databases that contain tag identifiers and passwords. In such cases external entities must be authenticated and incident management, audit logging and other security controls are essential. While in traditional IT systems, passwords are often changed on a periodic basis, in RFID systems, such changes may be impractical, especially if the tags are not always accessible to the agency assigning the passwords.</p>]]></paragraph>
<paragraph
    title="11.6.67.C.01."

    tags="Communications systems,Technical,RF Devices,Passwords"


    classification="All Classifications"
    compliance="Must"
    cid="2998"
><![CDATA[<p>Agencies MUST assign passwords for critical RFID functions.</p>]]></paragraph>
<paragraph
    title="11.6.67.C.02."

    tags="Communications systems,Technical,RF Devices,Passwords"


    classification="All Classifications"
    compliance="Should"
    cid="2999"
><![CDATA[<p>Agencies SHOULD follow the guidance for passwords management in the NZISM (<a title="Access control and passwords" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access control and passwords</a>).</p>]]></paragraph>
</block>
<block title="Temporary Deactivation of Tags"><paragraph
    title="11.6.68.R.01."

    tags="Communications systems,Technical,RF Devices"


><![CDATA[<p>The RF interface on some tags can be temporarily deactivated. In a supply chain application, for example, tags may be turned off to prevent unauthorised access to the tags during shipment. This feature is useful when communication between readers and a tag is infrequent allowing the tag to be activated when required but limiting vulnerability to rogue transactions if left operational for extended periods with no authorised activity. Temporary deactivation can also extend battery life in powered tags.</p>]]></paragraph>
<paragraph
    title="11.6.68.C.01."

    tags="Communications systems,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="3002"
><![CDATA[<p>Agencies SHOULD consider temporary deactivation of RFID tags where the tag is likely to be inactive for extended periods.</p>]]></paragraph>
</block>
<block title="Incident Management"><paragraph
    title="11.6.69.R.01."

    tags="Communications systems,Technical,Incident Management,RF Devices"


><![CDATA[<p>Incident management and audit procedures, logging and time stamps help detect and manage security breaches. These are important tools in protecting systems and managing security breaches.</p>]]></paragraph>
<paragraph
    title="11.6.69.C.01."

    tags="Communications systems,Technical,Incident Management,RF Devices"


    classification="All Classifications"
    compliance="Must"
    cid="3006"
><![CDATA[<p>Agencies MUST develop and implement incident identification and management processes in accordance with this manual (See <a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a>, <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13001">Chapter 6 – Information Security Monitoring</a>, <a title="Information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information Security Incidents</a>, <a title="Personnel security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 – Personnel Security </a>and <a title="Access control and passwords" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access Control and passwords</a>).</p>]]></paragraph>
</block>
<block title="Disposal"><paragraph
    title="11.6.70.R.01."

    tags="Communications systems,Technical,Disposal,RF Devices"


><![CDATA[<p>Tag disposal and recycling procedures that permanently disable or destroy sensitive data reduces the possibility that they could be used later for tracking or targeting, and prevents access to sensitive data stored on tags. In addition the continued operating presence of a tag after it has performed its intended function can pose a business intelligence or privacy risk, including tracking, targeting or access to sensitive data on the tag.</p>]]></paragraph>
<paragraph
    title="11.6.70.R.02."

    tags="Communications systems,Technical,Disposal,RF Devices"


><![CDATA[<p>Disposal may be undertaken electronically by using a tag’s “kill” feature or using a strong electromagnetic field to permanently deactivate a tag’s circuitry. Alternatively physical destruction can be achieved by tearing or shredding. Where a tag supports an electronic deactivation mechanism, tags should be electronically deactivated before physical destruction.</p>]]></paragraph>
<paragraph
    title="11.6.70.C.01."

    tags="Communications systems,Technical,Disposal,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="3010"
><![CDATA[<p>Agencies SHOULD consider secure disposal procedures and incorporate these into the RFID Usage Policy. Refer also to <a title="Media and IT equipment management, decommissioning and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 – Media and IT equipment management, decommissioning and disposal</a>.</p>]]></paragraph>
</block>
<block title="Operator Training and User Awareness"><paragraph
    title="11.6.71.R.01."

    tags="Communications systems,Governance,RF Devices"


><![CDATA[<p>Operator training can help ensure that personnel using the RFID system have the necessary skills and knowledge follow appropriate guidelines and policies. If HERF/HERO/HERP risks are present, appropriate security training covers mitigation techniques, such as safe handling distances.</p>]]></paragraph>
<paragraph
    title="11.6.71.C.01."

    tags="Communications systems,Governance,RF Devices"


    classification="All Classifications"
    compliance="Must"
    cid="3047"
><![CDATA[<p>Agencies MUST develop and implement user awareness and training programmes to support and enable safe use of RFID services (See <a title="Information security awareness and training" href="http://nzism.gcsb.govt.nz/ism-document#Section-13361">Section 9.1 – Information Security Awareness and Training</a>).</p>]]></paragraph>
</block>
</subsection>
<subsection title="Abbreviations"><paragraph
    title="11.6.72."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td><strong>Term</strong></td>
<td><strong>Meaning</strong></td>
</tr>
<tr>
<td><strong>EMV</strong></td>
<td>
<p>Europay, MasterCard, and Visa technical standard</p>
</td>
</tr>
<tr>
<td><strong>EPC</strong></td>
<td>
<p>Electronic Product Code</p>
</td>
</tr>
<tr>
<td><strong>HERF</strong></td>
<td>
<p>Hazards of Electromagnetic Radiation to Fuel</p>
</td>
</tr>
<tr>
<td><strong>HERO</strong></td>
<td>
<p>Hazards of Electromagnetic Radiation to Ordnance</p>
</td>
</tr>
<tr>
<td><strong>HERP</strong></td>
<td>
<p>Hazards of Electromagnetic Radiation to Personnel</p>
</td>
</tr>
<tr>
<td><strong>HMAC</strong></td>
<td>
<p>Keyed-Hash Message Authentication Code</p>
</td>
</tr>
<tr>
<td><strong>RFID</strong></td>
<td>
<p>Radio Frequency Identification</p>
</td>
</tr>
<tr>
<td><strong>SAM</strong></td>
<td>
<p>Secure Access Module/ Secure Application Module</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Terms"><paragraph
    title="11.6.73."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td><strong>Term</strong></td>
<td><strong>Meaning</strong></td>
</tr>
<tr>
<td><strong>EMV</strong></td>
<td>
<p>Europay, MasterCard, and Visa technical standard for payment cards, payment terminals and automated teller machines (ATMs)</p>
</td>
</tr>
<tr>
<td><strong>EPC</strong></td>
<td>
<p>An Electronic Product Code (EPC) is a universal identifier that gives a unique identity to a specific physical object. In most instances, EPCs are encoded on RFID tags attached to the object and used for stock tracking and management purposes. Many types of assets can be tagged including fixed assets, documents, transport containers and clothing items.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Radio Frequency Identification (RFID)</strong></p>
</td>
<td>
<p>RFID is technology utilising electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum to uniquely identify an object, item, animal, or person. RFID is increasingly used as replacement for bar codes. An RFID system consists of three components: an antenna, transceiver (usually the RFID reader) and a transponder (also known as a tag).</p>
</td>
</tr>
<tr>
<td>
<p><strong>Secure Access Module</strong></p>
</td>
<td>
<p>A <strong>Secure Access Module</strong> (or Secure Application Module) is used to enhance the security and cryptographic performance of devices. SAMs are commonly found in devices needing to perform secure transactions, such as payment terminals. It can be used for cryptographic computation and secure authentication against smart cards or contactless EMV cards.</p>
<p>Physically a SAM card can either be a separate component and plugged into a device when required or incorporated into an integrated circuit.</p>
</td>
</tr>
<tr>
<td><strong>Tag</strong></td>
<td>
<p>The transponder in an RFID system, frequently found attached to an item or object to provide electronic identification.</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
</section>
<section title="11.7. Card Access Control Systems"><subsection title="Objective"><paragraph
    title="11.7.1."


><![CDATA[<p>To ensure Access Control Systems incorporating contactless RFID or smart cards are used safely and securely in order to protect privacy, prevent unauthorised access and to prevent the compromise of secure spaces.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope "><paragraph
    title="11.7.2."


><![CDATA[<p>This section provides information relating to the risks, security and secure use of RFID or smart cards in access control systems. This section does not discuss biometric access control systems.</p>]]></paragraph>
<paragraph
    title="11.7.3."


><![CDATA[<p>The previous section (<a title="RFIDs" href="http://nzism.gcsb.govt.nz/ism-document#Section-14166">11.6. Radio Frequency Identification Devices</a>) provides background information and technical detail of the RFID aspects and should be read in conjunction with this section.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="11.7.4."


><![CDATA[<p>Contactless access control systems based on RFID (Radio Frequency Identification) has largely replaced earlier technologies such as magnetic swipe cards in almost all security-critical applications. Two generations of RFID access cards exist:</p><ul>
<li>an earlier generation of cards, which use only basic proprietary security mechanisms; and </li>
<li>a more recent generation that incorporates advances in CMOS and smart card technology to implement cryptography and other protective measures.</li>
</ul>]]></paragraph>
<paragraph
    title="11.7.5."


><![CDATA[<p>Older access control systems often incorporated a magnetic strip and were easily cloned. More recent systems support the use of PINs in addition to RFID. Unfortunately PINs are also sometimes stored on the cards, often unencrypted and unprotected, and thus facilitating attacks on both the card and the PIN.</p>]]></paragraph>
<paragraph
    title="11.7.6."


><![CDATA[<p>Access control systems typically comprise four components:</p><ul>
<li>A reader that programmes the access cards for particular employees and their permitted access to parts of the site, building to secure areas.</li>
<li>A transceiver at each control point to communicate with cards.</li>
<li>A controller to control the locks of access points (doors).</li>
<li>The backend system that hosts all permissions and authorised data and interfaces with the reader, transceiver and controllers.</li>
</ul>]]></paragraph>
<paragraph
    title="11.7.7."


><![CDATA[<p>Traditionally access control systems were hosted by stand-alone equipment. Modern access control system may be hosted on standard computer equipment and hosted in the organisation’s datacentre. It is possible that a system intrusion can target access control systems, making the switches, gates and locks remotely accessible.</p>]]></paragraph>
<paragraph
    title="11.7.8."


><![CDATA[<p>Low frequency RFID badge systems use 125KHz, (ISO 11784/5 and ISO 14223). Newer high frequency RFID cards use 13.56MHz (ISO 15693, ISO 14443 and ISO 18000-3).</p>]]></paragraph>
<paragraph
    title="11.7.9."


><![CDATA[<p>Some cards also operate at UHF frequencies of 850-960Mhz (ISO 18000-6). Some cards are designed to operate at low and high frequencies by embedding multiple antennae in the cards.</p>]]></paragraph>
<paragraph
    title="11.7.10."


><![CDATA[<p>The <a title="ISO/IEC 14443" rel="noopener noreferrer" href="https://www.iso.org/search.html?q=14443" target="_blank">ISO/IEC 14443</a> standard for contactless smart card communications defines two types of contactless cards ("A" and "B") and allows for communications at distances up to 10 cm operating at 13.56 MHz.</p>]]></paragraph>
<paragraph
    title="11.7.11."


><![CDATA[<p>The alternative <a title="ISO/IEC 15693" rel="noopener noreferrer" href="https://www.iso.org/search.html?q=15693" target="_blank">ISO/IEC 15693</a> standard allows communications at distances up to 50 cm. The <a title="ISO/IEC 7816" rel="noopener noreferrer" href="https://www.iso.org/search.html?q=7816" target="_blank">ISO/IEC 7816</a> standard (in 15 parts) defines the physical, electrical interface and operating characteristics of these cards.</p>]]></paragraph>
<paragraph
    title="11.7.12."


><![CDATA[<p>UHF cards follow the <a title="EPC Global Gen2" rel="noopener noreferrer" href="https://www.gs1.org/sites/default/files/docs/epc/uhfc1g2_2_0_0_standard_20131101.pdf" target="_blank">EPC Global Gen2</a> standard and the <a title="ISO/IEC 18000-6" rel="noopener noreferrer" href="https://www.iso.org/search.html?q=18000-6" target="_blank">ISO 18000-6</a> standards and are designed to operate at distances of up to 10 metres.</p>]]></paragraph>
</block>
<block title="Smart Cards"><paragraph
    title="11.7.13."


><![CDATA[<p>Smart cards typically incorporate an embedded integrated circuit typically incorporating a microchip with internal memory, a read-only CSN (Card Serial Number) or a UID (User Identification). The card connects to a reader with direct physical contact or a contactless radio frequency (RFID) interface. With an embedded microchip, smart cards can store large amounts of data, carry out on-card functions (such as encryption and authentication) and interact intelligently with a smart card reader. Smart card technology can be found in a variety of form factors, including plastic cards, key fobs, watches, subscriber identification modules used in mobile phones, and USB-based tokens. Smart cards are widely used in payment card (debit and credit cards and electronic wallets) and access control systems.</p>]]></paragraph>
<paragraph
    title="11.7.14."


><![CDATA[<p>In common with other RFID devices, smart cards incorporate an antenna embedded in the body of the card (or key fob, watch or token). When the card is brought within range of the reader, the chip in the card is powered on. Once powered on, an RF communication protocol is initiated and communication established between the card and the reader for data transfer.</p>]]></paragraph>
<paragraph
    title="11.7.15."


><![CDATA[<p>Smart cards typically incorporate protective mechanisms including authentication, secure data storage, encryption, tamper-resistance and secure communication. Support for biometric authentication may also be incorporated.</p>]]></paragraph>
</block>
<block title="Near Field Communication (NFC)"><paragraph
    title="11.7.16."


><![CDATA[<p>NFC is an RFID technology that enables two electronic devices to establish communication by bringing them within 4 cm of each other. As with other "proximity" technologies, NFC employs electromagnetic induction between two loop antennae when NFC devices exchange information. NFC operates in the globally available unlicensed radio frequency band of 13.56 MHz conforming to the ISO/IEC 18000-3 standard. In access control applications these devices are sometimes known as “prox cards”.</p>]]></paragraph>
</block>
<block title="Attacks"><paragraph
    title="11.7.17."


><![CDATA[<p>In addition to attacks on RFID components described in the previous section, access control cards can be susceptible to relay and chip hacking attacks.</p>]]></paragraph>
<paragraph
    title="11.7.18."


><![CDATA[<p>Relay attacks rely on rogue readers to activate the tag even when not in proximity to a legitimate reader. The card holder will be unaware that such an attack is underway. An effective defence is to incorporate distance-to-reader verification although few RFID systems incorporate this mechanism.</p>]]></paragraph>
<paragraph
    title="11.7.19."


><![CDATA[<p>Signals between cards and a legitimate reader can be intercepted at distances of up to a metre. Greater distances are possible with higher powered equipment, special antennae and in low interference environments. The signals and data, including card credentials, are captured off-line and used to clone access cards. Again the card holder will be unaware that such an attack is underway.</p>]]></paragraph>
<paragraph
    title="11.7.20."


><![CDATA[<p>Chip hacking is facilitated by physical access to the card but can be mitigated by second factor authentication, encryption of data on the card and card tamper detection.</p>]]></paragraph>
<paragraph
    title="11.7.21."


><![CDATA[<p>Threats, vulnerabilities and mitigations of RFID access control systems are summarised in the table below:</p><table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Threat/Vulnerability</strong></p>
</td>
<td><strong>Mitigation </strong></td>
</tr>
<tr>
<td>
<p><strong>Interception of the RFID signals</strong></p>
</td>
<td>
<p>Encryption of RF links</p>
<p>Harden RFID elements</p>
</td>
</tr>
<tr>
<td><strong>Implants</strong></td>
<td>
<p>Physical security</p>
<p>CCTV</p>
<p>Tamper resistant readers</p>
</td>
</tr>
<tr>
<td>
<p><strong>Cryptographic attacks</strong></p>
</td>
<td>
<p>Use of approved cryptographic algorithms and protocols</p>
<p>Strong key management</p>
<p>Incident detection and management</p>
<p>Use of evaluated products</p>
</td>
</tr>
<tr>
<td>
<p><strong>Replay Authentications</strong></p>
</td>
<td>Robust Random Number Generation on readers</td>
</tr>
<tr>
<td>
<p><strong>Key extraction reader attacks through side channel analysis or fault injection</strong></p>
</td>
<td>
<p>Use of evaluated products with SAM chips</p>
<p>Incident detection and management</p>
</td>
</tr>
<tr>
<td>
<p><strong>Attack on authentication keys on the card</strong></p>
</td>
<td>
<p>Key diversification</p>
<p>Strong key management</p>
<p>Incident detection and management</p>
</td>
</tr>
<tr>
<td>
<p><strong>Chip Hacking</strong></p>
</td>
<td>
<p>Use of approved cryptographic algorithms and protocols on the card</p>
<p>Tamper protection</p>
<p>Incident detection and management</p>
</td>
</tr>
<tr>
<td>
<p><strong>Malware</strong></p>
</td>
<td>
<p>Update and patching for all system components</p>
<p>Incident detection and management</p>
</td>
</tr>
<tr>
<td>
<p><strong>Backend systems</strong></p>
</td>
<td>
<p>System hardening</p>
<p>Update and patching for all system components</p>
<p>Intrusion detection</p>
<p>Incident detection and management</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Product Selection"><paragraph
    title="11.7.22."


><![CDATA[<p>A number of protection profiles related to smartcards and related devices and systems are provided on the Common Criteria website. Refer also to <a title="Product Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>.</p>]]></paragraph>
</block>
<block title="Secure Access Module"><paragraph
    title="11.7.23."


><![CDATA[<p>A Secure Access Module (or Secure Application Module - SAM) is used to enhance the security and cryptographic performance of devices. SAMs are commonly found in devices needing to perform secure transactions, such as payment terminals. It can be used for cryptographic computation and secure authentication against smart cards or contactless payment cards.</p>]]></paragraph>
<paragraph
    title="11.7.24."


><![CDATA[<p>Physically a SAM card can either be a separate component and plugged into a device when required or incorporated into an integrated circuit. A typically use is for the secure storage of cryptographic keys or other sensitive data. SAM hardware and software are designed to prevent information leakage and incorporates countermeasures against electromagnetic radiation, timing measurements, and other side channel attacks. These properties mean that SAMs offer a much higher level of protection than the terminals and readers, which often utilise general-purpose computers.</p>]]></paragraph>
<paragraph
    title="11.7.25."


><![CDATA[<p>SAM’s typically support 3DES and AES cryptographic algorithms and SHA hashing algorithms in their hardware cryptographic co-processor implementations. Refer to Chapter 17 for information on approved cryptographic algorithms and protocols. It is important to note that 3DES is approved for use on legacy systems only and SHA-1 is not an approved hashing algorithm.</p>]]></paragraph>
</block>
<block title="Card Protection"><paragraph
    title="11.7.26."


><![CDATA[<p>RFID blocking wallets and RFID card sleeves are available to block RFID frequencies. These are typically used for the protection of credit and other payment, access, transit cards and e-passports as a countermeasure for skimming attacks.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References - Guidance"><paragraph
    title="11.7.27."


><![CDATA[<p class="NormS10C2">Further references on Guidance can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Common Criteria Protection Profiles</strong></p>
</td>
<td>
<p>Common Criteria</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.commoncriteriaportal.org/pps/" target="_blank">https://www.commoncriteriaportal.org/pps/</a></td>
</tr>
<tr>
<td><strong>SP 800-82</strong></td>
<td>
<p><strong>NIST Special Publication 800-82 rev.2 Guide to Industrial Control&nbsp;</strong><strong>Systems (ICS) Security, May 2015</strong></p>
</td>
<td>NIST</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-82r2.pdf" target="_blank">Guide to Industrial Control Systems (ICS) Security (nist.gov)</a></td>
</tr>
</tbody>
</table><p class="NormS10C2">&nbsp;</p><p class="NormS10C2">&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="References - Standards"><paragraph
    title="11.7.28."


><![CDATA[<p class="NormS10C2">Further references on standards can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td>&nbsp;<strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-1:2011</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 1: Cards with contacts -- Physical characteristics</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td>
<p><a rel="noopener noreferrer" href="https://www.iso.org/standard/54089.html" target="_blank">https://www.iso.org/standard/54089.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-2:2007</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 2: Cards with contacts -- Dimensions and location of the contacts</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 2: Cards with contacts — Dimensions and location of the contacts" rel="noopener noreferrer" href="https://www.iso.org/standard/45989.html" target="_blank">https://www.iso.org/standard/45989.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-3:2006</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 3: Cards with contacts -- Electrical interface and transmission protocols</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/standard/38770.html" target="_blank">https://www.iso.org/standard/38770.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-4:2013</strong>&nbsp;</td>
<td><strong>Identification cards -- Integrated circuit cards -- Part 4: Organization, security and commands for interchange</strong></td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 4: Organization, security and commands for interchange" rel="noopener noreferrer" href="https://www.iso.org/standard/54550.html" target="_blank">https://www.iso.org/standard/54550.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-5:2004</strong>&nbsp;</td>
<td><strong>Identification cards -- Integrated circuit cards -- Part 5: Registration of application providers</strong></td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 5: Registration of application providers" rel="noopener noreferrer" href="https://www.iso.org/standard/34259.html" target="_blank">https://www.iso.org/standard/34259.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-6:2004</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 6: Interindustry data elements for interchange</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange" rel="noopener noreferrer" href="https://www.iso.org/standard/38780.html" target="_blank">https://www.iso.org/standard/38780.html</a>&nbsp;</td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-7:1999</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit(s) cards with contacts -- Part 7: Interindustry commands for Structured Card Query Language (SCQL)</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit(s) cards with contacts — Part 7: Interindustry commands for Structured Card Query Language (SCQL)" rel="noopener noreferrer" href="https://www.iso.org/standard/28869.html" target="_blank">https://www.iso.org/standard/28869.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-8:2019</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 8:&nbsp;Commands and mechanisms for security operations</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 8: Commands and mechanisms for security operations" rel="noopener noreferrer" href="https://www.iso.org/standard/75844.html" target="_blank">https://www.iso.org/standard/75844.html&nbsp;</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-9:2017</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 9: Commands for card management</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 9: Commands for card management" rel="noopener noreferrer" href="https://www.iso.org/standard/67802.html" target="_blank">https://www.iso.org/standard/67802.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-10:1999</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit(s) cards with contacts -- Part 10: Electronic signals and answer to reset for synchronous cards</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit(s) cards with contacts — Part 10: Electronic signals and answer to reset for synchronous cards" rel="noopener noreferrer" href="https://www.iso.org/standard/30558.html" target="_blank">https://www.iso.org/standard/30558.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-11:2017</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 11: Personal verification through biometric methods</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/standard/67799.html" target="_blank">https://www.iso.org/standard/67799.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-12:2005</strong>&nbsp;</td>
<td>
<p><strong>Identification cards - Integrated circuit cards -- Part 12: Cards with contacts -- USB electrical interface and operating procedures</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards - Integrated circuit cards — Part 12: Cards with contacts — USB electrical interface and operating procedures" rel="noopener noreferrer" href="https://www.iso.org/standard/40604.html" target="_blank">https://www.iso.org/standard/40604.html&nbsp;</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-13:2007</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 13: Commands for application management in a multi-application environment</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 13: Commands for application management in a multi-application environment" rel="noopener noreferrer" href="https://www.iso.org/standard/40605.html" target="_blank">https://www.iso.org/standard/40605.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-15:2016</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 15: Cryptographic information application</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 15: Cryptographic information application" rel="noopener noreferrer" href="https://www.iso.org/standard/65250.html" target="_blank">https://www.iso.org/standard/65250.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 10373-7:2019</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Test methods -- Part 7: Vicinity cards</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Cards and security devices for personal identification — Test methods — Part 7: Contactless vicinity objects" rel="noopener noreferrer" href="https://www.iso.org/standard/74958.html" target="_blank">https://www.iso.org/standard/74958.html&nbsp;</a></td>
</tr>
<tr>
<td><strong>ISO 11784:1996 Amdt 2:2010</strong>&nbsp;</td>
<td>
<p class="no-uppercase"><strong>Radio frequency identification of animals — Code structure — Amendment 2: Indication of an advanced transponder</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="Radio frequency identification of animals — Code structure — Amendment 2: Indication of an advanced transponder" rel="noopener noreferrer" href="https://www.iso.org/standard/45365.html" target="_blank">https://www.iso.org/standard/45365.html</a></td>
</tr>
<tr>
<td><strong>ISO 14223-1:2011</strong>&nbsp;</td>
<td>
<p class="no-uppercase"><strong>Radiofrequency identification of animals — Advanced transponders — Part 1: Air interface</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="Radiofrequency identification of animals — Advanced transponders — Part 1: Air interface" rel="noopener noreferrer" href="https://www.iso.org/standard/50979.html" target="_blank">https://www.iso.org/standard/50979.html</a></td>
</tr>
<tr>
<td><strong>ISO 14223-2:2010</strong>&nbsp;</td>
<td>
<p><strong>Radiofrequency identification of animals -- Advanced transponders -- Part 2: Code and command structure</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="Radiofrequency identification of animals — Advanced transponders — Part 2: Code and command structure" rel="noopener noreferrer" href="https://www.iso.org/standard/45364.html" target="_blank">https://www.iso.org/standard/45364.html</a></td>
</tr>
<tr>
<td><strong>ISO 14443-1:2008</strong>&nbsp;</td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 1: Physical characteristics</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 1: Physical characteristics" rel="noopener noreferrer" href="https://www.iso.org/standard/39693.html" target="_blank">https://www.iso.org/standard/39693.html</a>&nbsp;</td>
</tr>
<tr>
<td><strong>ISO/IEC 14443-2:2010</strong>&nbsp;</td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 2: Radio frequency power and signal interface</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 2: Radio frequency power and signal interface" rel="noopener noreferrer" href="https://www.iso.org/standard/50941.html" target="_blank">https://www.iso.org/standard/50941.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 14443-3:2011</strong>&nbsp;</td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 3: Initialization and anticollision</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 3: Initialization and anticollision" rel="noopener noreferrer" href="https://www.iso.org/standard/50942.html" target="_blank">https://www.iso.org/standard/50942.html</a>&nbsp;</td>
</tr>
<tr>
<td><strong>ISO/IEC 14443-4:2008&nbsp;</strong>&nbsp;</td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 4: Transmission protocol</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 4: Transmission protocol" rel="noopener noreferrer" href="https://www.iso.org/standard/50648.html" target="_blank">https://www.iso.org/standard/50648.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 18000-3:2010&nbsp;</strong>&nbsp;</td>
<td>
<p><strong>Information technology -- Radio frequency identification for item management -- Part 3: Parameters for air interface communications at 13,56 MHz</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Information technology — Radio frequency identification for item management — Part 3: Parameters for air interface communications at 13,56 MHz" rel="noopener noreferrer" href="https://www.iso.org/standard/53424.html" target="_blank">https://www.iso.org/standard/53424.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 18000-6:2013&nbsp;</strong>&nbsp;</td>
<td>
<p><strong>Information technology -- Radio frequency identification for item management -- Part 6: Parameters for air interface communications at 860 MHz to 960 MHz General</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Information technology — Radio frequency identification for item management — Part 6: Parameters for air interface communications at 860 MHz to 960 MHz General" rel="noopener noreferrer" href="https://www.iso.org/standard/59644.html" target="_blank">https://www.iso.org/standard/59644.html</a>&nbsp;</td>
</tr>
<tr>
<td><strong>ISO/IEC TR 29123:2007&nbsp;</strong>&nbsp;</td>
<td>
<p><strong>Identification Cards – Proximity Cards – Requirements for the enhancement of interoperability</strong></p>
</td>
<td style="text-align: center;">&nbsp;<span>ISO</span></td>
<td><a title="Identification Cards — Proximity Cards — Requirements for the enhancement of interoperability" rel="noopener noreferrer" href="https://www.iso.org/standard/45146.html" target="_blank">https://www.iso.org/standard/45146.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 15693-1:2010</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Contactless integrated circuit cards -- Vicinity cards -- Part 1: Physical characteristics</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Contactless integrated circuit cards — Vicinity cards — Part 1: Physical characteristics" rel="noopener noreferrer" href="https://www.iso.org/standard/39694.html" target="_blank">https://www.iso.org/standard/39694.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 15693-2:2006</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Contactless integrated circuit cards -- Vicinity cards -- Part 2: Air interface and initialization</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="Identification cards — Contactless integrated circuit cards — Vicinity cards — Part 2: Air interface and initialization" rel="noopener noreferrer" href="https://www.iso.org/standard/39695.html" target="_blank">https://www.iso.org/standard/39695.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 15693-3:2019</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Contactless integrated circuit cards -- Vicinity cards -- Part 3: Anticollision and transmission protocol</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="Cards and security devices for personal identification — Contactless vicinity objects — Part 3: Anticollision and transmission protocol" rel="noopener noreferrer" href="https://www.iso.org/standard/73602.html" target="_blank">https://www.iso.org/standard/73602.html</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale and Controls"> <block title="Risk Assessment"><paragraph
    title="11.7.29.R.01."

    tags="Communications systems,Technical,Access Control,Risk Assessment"


><![CDATA[<p>As with many technologies, adoption of RFID access cards has the potential to introduce a wide range of risks in addition to the risks that already exist for agency systems. This may compromise the cards and enable unauthorised access, in addition to RFID risks discussed in the previous section. A risk assessment is an essential tool in determining and assessing the range and extent of risk and threat in the use of RFID access cards.</p>]]></paragraph>
<paragraph
    title="11.7.29.C.01."

    tags="Communications systems,Technical,Access Control,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="3130"
><![CDATA[<p>Agencies MUST conduct and document a risk assessment before implementing or adopting an RFID access card system.</p>]]></paragraph>
<paragraph
    title="11.7.29.C.02."

    tags="Communications systems,Technical,Access Control,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="3131"
><![CDATA[<p>This risk assessment MUST be the basis of a security architecture design.</p>]]></paragraph>
</block>
<block title="Security Architecture"><paragraph
    title="11.7.30.R.01."

    tags="Communications systems,Technical,Access Control"


><![CDATA[<p>The foundation of strong security architecture in RFID follows these important principles:</p><ol>
<li><strong>Physical Security</strong> - over readers, secure areas, issued and unissued access cards;</li>
<li><strong>Controlled access to the data</strong> – only authorised entities (people, systems, devices) can read and write information to the cards, card databases and backend systems;</li>
<li><strong>Control over access to the system</strong> – only authorised entities can configure or add devices to the system, and all devices on the system are authentic and trustworthy;</li>
<li><strong>Confidence and trust</strong> – back-end systems are designed and implemented in accordance with the current version of the NZISM. This includes intrusion detection and incident management mechanisms and procedures.</li>
</ol>]]></paragraph>
<paragraph
    title="11.7.30.R.02."

    tags="Communications systems,Technical,Access Control"


><![CDATA[<p>Some access systems may cover several organisations or sites. In such cases, multiple organisations or sites may require access to databases that contain personnel identifiers, passwords and access permissions. The security architecture should incorporate strong security controls including the authentication of external entities, incident management, audit logging and other essential security controls.</p>]]></paragraph>
<paragraph
    title="11.7.30.C.01."

    tags="Communications systems,Technical,Access Control"


    classification="All Classifications"
    compliance="Must"
    cid="3138"
><![CDATA[<p>Agencies MUST develop a strong security architecture to protect access to databases and systems.</p>]]></paragraph>
<paragraph
    title="11.7.30.C.02."

    tags="Communications systems,Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="3139"
><![CDATA[<p>Agencies SHOULD apply the NZISM access controls (<a title="Communication systems and devices" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13958">Chapter 11</a>) and cryptographic controls (<a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17</a>) to access card systems.</p>]]></paragraph>
<paragraph
    title="11.7.30.C.03."

    tags="Communications systems,Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="3141"
><![CDATA[<p>Agencies SHOULD consider the application of the following design elements:</p><ul>
<li>Implement a Demilitarized Zone (DMZ) to isolate card systems from other parts of the organisation’s network and from high-risk Internet Protocol (IP) network connections;</li>
<li>Secure or remove connections between the Internet and card system network segments;</li>
<li>Secure or remove vulnerable dialup modem links; </li>
<li>Secure or remove vulnerable wireless radio links and network access points; and</li>
<li>Network activity monitoring for unusual or anomalous access activity and well as intrusion detection.</li>
</ul>]]></paragraph>
</block>
<block title="Policy"><paragraph
    title="11.7.31.R.01."

    tags="Communications systems,Governance,Access Control"


><![CDATA[<p>An Access Card Usage Policy is an essential component addressing topics such as how personal information is stored and shared, card holder responsibilities and procedures to manage card loss or damage. Refer also to <a title="Data management" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16835">Chapter&nbsp;20 – Data Management</a>.</p>]]></paragraph>
<paragraph
    title="11.7.31.R.02."

    tags="Communications systems,Governance,Access Control"


><![CDATA[<p>Any access card implementation should also be incorporated into the agency’s security policies. Refer also to <a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a>.</p>]]></paragraph>
<paragraph
    title="11.7.31.C.01."

    tags="Communications systems,Governance,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="3156"
><![CDATA[<p>Agencies SHOULD develop, implement and maintain an Access Card Usage Policy.</p>]]></paragraph>
<paragraph
    title="11.7.31.C.02."

    tags="Communications systems,Governance,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="3157"
><![CDATA[<p>Agencies SHOULD incorporate access cards into the agency’s security policies and information security documentation.</p>]]></paragraph>
</block>
<block title="Physical Security"><paragraph
    title="11.7.32.R.01."

    tags="Communications systems,Technical,Access Control,Physical Security"


><![CDATA[<p>Physical security over readers, door controls, cables and control systems, as well as the cards themselves is fundamental to the operation of a secure system.</p>]]></paragraph>
<paragraph
    title="11.7.32.R.02."

    tags="Communications systems,Technical,Access Control,Physical Security"


><![CDATA[<p>In order to minimise unnecessary electromagnetic radiation readers and control equipment should be carefully positioned. Care should be taken with the use of card readers in proximity to:</p><ul>
<li>Fuel, ordnance, and other hazardous materials, </li>
<li>Metal and reflective objects that can modify and amplify signals in unintended and potentially harmful ways, and </li>
<li>Legitimate radio systems to avoid interference.</li>
</ul>]]></paragraph>
<paragraph
    title="11.7.32.C.01."

    tags="Communications systems,Technical,Access Control,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="3162"
><![CDATA[<p>Agencies SHOULD select systems that provide resistance to physical or electronic tampering.</p>]]></paragraph>
<paragraph
    title="11.7.32.C.02."

    tags="Communications systems,Technical,Access Control,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="3163"
><![CDATA[<p>Agencies SHOULD implement systems to minimise the risk of physical or electronic tampering.</p>]]></paragraph>
<paragraph
    title="11.7.32.C.03."

    tags="Communications systems,Technical,Access Control,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="3165"
><![CDATA[<p>Agencies SHOULD consider placement of tags and location of readers to avoid unnecessary electromagnetic radiation.</p>]]></paragraph>
<paragraph
    title="11.7.32.C.04."

    tags="Communications systems,Technical,Access Control,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="3166"
><![CDATA[<p>Agencies SHOULD consider and select other physical controls in accordance with the <a title="PSR Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>.</p>]]></paragraph>
</block>
<block title="Card Data Protection"><paragraph
    title="11.7.33.R.01."

    tags="Communications systems,Governance,Access Control"


><![CDATA[<p>Cards are invariably retained by the card holder and subject to loss, theft or being misplaced. Cards are also not always within the control of the card holder outside of normal office hours. Measures to protect cards in these situations are fundamental to the maintenance of the integrity and security of the access control system.</p>]]></paragraph>
<paragraph
    title="11.7.33.C.01."

    tags="Communications systems,Cryptography,Technical,Access Control"


    classification="All Classifications"
    compliance="Must"
    cid="3171"
><![CDATA[<p>Agencies MUST follow the requirements of the NZISM in the selection and implementation of cryptographic protocols and algorithms, and in key management, detailed in <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 - Cryptography</a>.</p>]]></paragraph>
<paragraph
    title="11.7.33.C.02."

    tags="Communications systems,Encryption,Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="3173"
><![CDATA[<p>Agencies SHOULD encrypt data before it is written to cards.</p>]]></paragraph>
<paragraph
    title="11.7.33.C.03."

    tags="Communications systems,Encryption,Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="3175"
><![CDATA[<p>Agencies SHOULD consider the use of cards systems incorporating Secure Access Modules (SAMs).</p>]]></paragraph>
</block>
<block title="Incident Management"><paragraph
    title="11.7.34.R.01."

    tags="Communications systems,Technical,Access Control,Incident Management"


><![CDATA[<p>Incident management and audit procedures, logging and time stamps help detect and manage security breaches. These are important tools in protecting systems and managing security breaches.</p>]]></paragraph>
<paragraph
    title="11.7.34.C.01."

    tags="Communications systems,Technical,Access Control,Incident Management"


    classification="All Classifications"
    compliance="Must"
    cid="3180"
><![CDATA[<p>Agencies MUST develop and implement incident identification and management processes in accordance with this manual (See <a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a>, <a title="Information security monitoring" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13001">Chapter 6 – Information Security Monitoring</a>, <a title="Information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information Security Incidents</a>, <a title="Personnel security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 – Personnel Security</a> and <a title="Access control and passwords" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access control and passwords</a>).</p>]]></paragraph>
</block>
<block title="Disposal"><paragraph
    title="11.7.35.R.01."

    tags="Communications systems,Technical,Access Control,Disposal"


><![CDATA[<p>Card disposal and recycling procedures that permanently disable or destroy sensitive data reduces the possibility that they could be used later for tracking or targeting, and prevents access to sensitive data stored on cards. In addition the continued operating presence of a card after it has performed its intended function can pose an unauthorised access, business intelligence or privacy risk, including tracking and targeting of personnel or access to sensitive data on the access card.</p>]]></paragraph>
<paragraph
    title="11.7.35.R.02."

    tags="Communications systems,Technical,Access Control,Disposal"


><![CDATA[<p>Disposal may be undertaken by electronically by using a card’s wipe feature or using a strong electromagnetic field to permanently deactivate a tag’s circuitry. Alternatively physical destruction can be achieved by tearing or shredding. Where a tag supports an electronic deactivation mechanism, tags should be electronically deactivated before physical destruction.</p>]]></paragraph>
<paragraph
    title="11.7.35.C.01."

    tags="Communications systems,Technical,Access Control,Disposal"


    classification="All Classifications"
    compliance="Should"
    cid="3189"
><![CDATA[<p>Agencies SHOULD consider secure disposal procedures and incorporate these into the Access Card Usage Policy. Refer also to <a title="Media and IT equipment management, decommissioning and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Media and IT equipment management, decommissioning and disposal</a>.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="11.8. Multifunction Devices, Network Printers and Fax Machines"><subsection title="Objective"><paragraph
    title="11.8.1."


><![CDATA[<p>Multifunction devices (MFD’s), network printers and fax machines are used in a secure manner.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="11.8.2."


><![CDATA[<p>This section covers information relating to MFDs, network printers and fax machines connected to either the ISDN, PSTN, HACE or other networks. Further information on MFDs communicating via network gateways can be found in&nbsp;<a title="Data import and export" href="http://nzism.gcsb.govt.nz/ism-document#Section-16876">Section 20.2 - Data Import and Export</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="MFD, network printer and fax machine usage policy"><paragraph
    title="11.8.3.R.01."

    tags="Communications systems,Governance,MFDs"


><![CDATA[<p>MFDs, network printers and fax machines, are capable of communicating classified information, and are a potential source of information security incidents. It is therefore essential that agencies develop a policy governing their use.</p>]]></paragraph>
<paragraph
    title="11.8.3.C.01."

    tags="Communications systems,Governance,MFDs"


    classification="All Classifications"
    compliance="Must"
    cid="2537"
><![CDATA[<p>Agencies MUST develop a policy governing the use of MFDs, network printers and fax machines,</p>]]></paragraph>
</block>
<block title="Sending fax messages"><paragraph
    title="11.8.4.R.01."

    tags="Communications systems,Technical"


><![CDATA[<p>Once a MFD or fax machine has been connected to cryptographic equipment and used to send a classified fax message it can pose risks if subsequently connected directly to unsecured telecommunications infrastructure or the public switched telephone network (PSTN).&nbsp;For example, if a fax machine fails to send a classified fax message the device will continue attempting to send the fax message even if it has been disconnected from the cryptographic device and connected directly to the public switched telephone network. In such cases the fax machine could then send the classified fax message in the clear causing an information security incident.</p>]]></paragraph>
<paragraph
    title="11.8.4.R.02."

    tags="Communications systems,Technical"


><![CDATA[<p>Non-encrypted communications may be exposed in transmission and, if incorrectly addressed or an incorrect recipient number is entered, may cause a data breach.</p>]]></paragraph>
<paragraph
    title="11.8.4.C.01."

    tags="Communications systems,Technical"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2543"
><![CDATA[<p>Agencies sending classified messages MUST ensure that the message is encrypted to an appropriate level when communicated over unsecured telecommunications infrastructure or the public switched telephone network.</p>]]></paragraph>
<paragraph
    title="11.8.4.C.02."

    tags="Communications systems,Technical"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2545"
><![CDATA[<p>Agencies MUST have separate MFDs or fax machines for sending classified messages and messages classified RESTRICTED and below.</p>]]></paragraph>
</block>
<block title="Receiving fax messages"><paragraph
    title="11.8.5.R.01."

    tags="Communications systems,Technical"


><![CDATA[<p>Whilst the communications path between MFDs and fax machines may be appropriately protected, personnel need to remain cognisant of the need-to-know of the information that is being communicated. As such it is important that fax messages are collected from the receiving MFD or fax machine as soon as possible. Furthermore, if an expected fax message is not received it may indicate that there was a problem with the original transmission or the fax message has been taken by an unauthorised person.</p>]]></paragraph>
<paragraph
    title="11.8.5.C.01."

    tags="Communications systems,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2562"
><![CDATA[<p>The sender of a fax message SHOULD make arrangements for the receiver to:</p>
<ul>
<li>collect the fax message as soon as possible after it is received; and</li>
<li>notify the sender immediately if the fax message does not arrive when expected.</li>
</ul>]]></paragraph>
</block>
<block title="Connecting MFDs to telephone networks"><paragraph
    title="11.8.6.R.01."

    tags="Communications systems,MFDs,Technical"


><![CDATA[<p>When a MFD is connected to a computer network and a telephone network the device can act as a bridge between the networks. As such the telephone network needs to be accredited to the same classification as the computer network the MFD is connected to.</p>]]></paragraph>
<paragraph
    title="11.8.6.C.01."

    tags="Communications systems,MFDs,Technical"


    classification="Top Secret, Secret, Confidential"
    compliance="Must Not"
    cid="2568"
><![CDATA[<p>Agencies MUST NOT enable a direct connection from a MFD to a telephone network unless the telephone network is accredited to at least the same classification as the computer network to which the device is connected.</p>]]></paragraph>
<paragraph
    title="11.8.6.C.02."

    tags="Communications systems,MFDs,Technical"


    classification="All Classifications"
    compliance="Should Not"
    cid="2570"
><![CDATA[<p>Agencies SHOULD NOT enable a direct connection from a MFD to a telephone network unless the telephone network is accredited to at least the same classification as the computer network to which the device is connected.</p>]]></paragraph>
</block>
<block title="Connecting MFDs to computer networks"><paragraph
    title="11.8.7.R.01."

    tags="Communications systems,MFDs,Technical"


><![CDATA[<p>As network connected MFDs are considered to be devices that reside on a computer network they need to be able to process the same classification of information that the network is capable of processing.</p>]]></paragraph>
<paragraph
    title="11.8.7.C.01."

    tags="Communications systems,MFDs,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2575"
><![CDATA[<p>Where MFDs connected to computer networks have the ability to communicate via a gateway to another network, agencies MUST ensure that:</p>
<ul>
<li>each MFD applies user identification, authentication and audit functions for all classified information communicated by that device;</li>
<li>these mechanisms are of similar strength to those specified for workstations on that network; and</li>
<li>each gateway can identify and filter the classified information in accordance with the requirements for the export of data through a gateway.</li>
</ul>]]></paragraph>
</block>
<block title="Copying documents on MFDs"><paragraph
    title="11.8.8.R.01."

    tags="Communications systems,MFDs,Technical"


><![CDATA[<p>As networked MFDs are capable of sending scanned or copied documents across a connected network, personnel need to be aware that if they scan or copy documents at a classification higher than that of the network the device is connected to they could be causing a data spill onto the connected network.</p>]]></paragraph>
<paragraph
    title="11.8.8.C.01."

    tags="Communications systems,MFDs,Technical"


    classification="All Classifications"
    compliance="Must Not"
    cid="2578"
><![CDATA[<p>Agencies MUST NOT permit MFDs connected to computer networks to be used to scan or copy classified documents above the classification of the connected network.</p>]]></paragraph>
</block>
<block title="Observing MFD and fax machine use"><paragraph
    title="11.8.9.R.01."

    tags="Communications systems,MFDs,Technical"


><![CDATA[<p><span>Placing MFDs and fax machines in public areas can help reduce the likelihood of any suspicious use going unnoticed.</span></p>]]></paragraph>
<paragraph
    title="11.8.9.C.01."

    tags="Communications systems,MFDs,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2581"
><![CDATA[<p>Agencies SHOULD ensure that MFDs and fax machines are located in areas where their use can be observed.</p>]]></paragraph>
</block>
<block title="Servicing and Maintenance"><paragraph
    title="11.8.10.R.01."

    tags="Communications systems,Technical"


><![CDATA[<p>Network and MFD printers invariably use hard disk drives, flash drives or other reusable storage which can contain copies of classified information. Any maintenance or servicing should be conducted under supervision or by cleared personnel.</p>]]></paragraph>
<paragraph
    title="11.8.10.R.02."

    tags="Communications systems,Technical"


><![CDATA[<p>Copiers and laser printers may use electrostatic drums as part of the reproduction and printing process. These drums can retain a “memory” of recent documents which can be recovered. Any storage devices or drums replaced during maintenance should follow the prescribed media disposal and destruction processes (See Chapter 13 – Decommissioning and Disposal).</p>]]></paragraph>
<paragraph
    title="11.8.10.R.03."

    tags="Communications systems,Technical"


><![CDATA[<p>Toner cartridges and other components may incorporate a memory chip, often used to track pages numbers and estimate print capacity. These chips have read/write capability and may pose a risk to classified systems. Once chips have been removed, the toner cartridges themselves may be disposed of through supplier recycling or other approved disposal channels.</p>]]></paragraph>
<paragraph
    title="11.8.10.C.01"

    tags="Communications systems,Technical"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="2589"
><![CDATA[<p>Any maintenance or servicing MUST be conducted under supervision or by cleared personnel.</p>]]></paragraph>
<paragraph
    title="11.8.10.C.02"

    tags="Communications systems,Technical"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="2590"
><![CDATA[<p>Any storage devices, drums or cartridges with memory chips removed during maintenance or servicing MUST be disposed of following the processes prescribed in <a title="Media and IT Equpment management, decommissioning and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 - Media and IT equipment Management, Decommissioning and Disposal</a>.</p>]]></paragraph>
<paragraph
    title="11.8.10.C.03"

    tags="Communications systems,Technical"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="2591"
><![CDATA[<p>Toner cartridges MUST have the memory chip removed before the cartridge is recycled or otherwise disposed of. The memory chip MUST be disposed of following the processes prescribed in <a title="Media and IT Equpment management, decommissioning and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 - Media and IT equipment Management, Decommissioning and Disposal.</a></p>]]></paragraph>
<paragraph
    title="11.8.10.C.04"

    tags="Communications systems,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2592"
><![CDATA[<p>Any maintenance or servicing SHOULD be conducted under supervision or by cleared personnel.</p>]]></paragraph>
<paragraph
    title="11.8.10.C.05"

    tags="Communications systems,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2593"
><![CDATA[<p>Any storage devices, drums or cartridges with memory chips removed during maintenance or servicing SHOULD be disposed of following the processes prescribed in&nbsp;<a title="Media and IT Equpment management, decommissioning and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 - Media and IT equipment Management, Decommissioning and Disposal</a>.</p>]]></paragraph>
</block>
<block title="USB Devices"><paragraph
    title="11.8.11.R.01."

    tags="Communications systems,Technical"


><![CDATA[<p>MFDs may also be equipped with USB ports for maintenance and software updates. It is possible to copy data from installed storage devices to USB devices. Any use of USB capabilities must be carefully managed.</p>]]></paragraph>
<paragraph
    title="11.8.11.C.01"

    tags="Communications systems,Technical"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2596"
><![CDATA[<p>The use of any USB capability MUST be conducted under supervision or by cleared personnel.</p>]]></paragraph>
<paragraph
    title="11.8.11.C-02"

    tags="Communications systems,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2597"
><![CDATA[<p>The use of any USB capability SHOULD be conducted under supervision or by cleared personnel.</p>]]></paragraph>
</block>
<block title="Decommissioning and Disposal"><paragraph
    title="11.8.12.R.01."

    tags="Communications systems,Technical,Disposal"


><![CDATA[<p>The use of storage media and the characteristics of electrostatic drums allow the recovery of information from such devices and components. To protect the information, prescribed disposal procedures should be followed.</p>]]></paragraph>
<paragraph
    title="11.8.12.R.02."

    tags="Communications systems,Technical,Disposal"


><![CDATA[<p>The use of storage media and the characteristics of electrostatic drums allow the recovery of information from such devices and components. To protect the information, prescribed disposal procedures should be followed.</p>]]></paragraph>
<paragraph
    title="11.8.12.C.01"

    tags="Communications systems,Technical,Disposal"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2604"
><![CDATA[<p>Any storage devices, drums, cartridge memory chips or other components that may contain data or copies of documents MUST be disposed of following the processes prescribed in&nbsp;<a title="Media and IT Equpment management, decommissioning and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 - Media and IT equipment Management, Decommissioning and Disposal</a>.</p>]]></paragraph>
<paragraph
    title="11.8.12.C.02"

    tags="Communications systems,Technical,Disposal"


    classification="All Classifications"
    compliance="Should"
    cid="2606"
><![CDATA[<p>Any storage devices, drums, cartridge memory chips or other components that may contain data or copies of documents SHOULD be disposed of following the processes prescribed in&nbsp;<a title="Media and IT Equpment management, decommissioning and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 - Media and IT equipment Management, Decommissioning and Disposal</a>.</p>]]></paragraph>
</block>
<block title="Logging multifunction device use"><paragraph
    title="11.8.13.R.01."

    tags="Communications systems,Event Logging"


><![CDATA[<p>Centrally logging and analysing MFD events, which may include metadata and shadow copies of documents printed, scanned or copied by users, can assist in monitoring the security posture of systems, detecting malicious behaviour, and contributing to investigations following cyber security incidents. Logs are stored in a central system, such as a security information and event management tool or central database and can only be accessed or modified by authorised and authenticated users. Logs are stored for a duration informed by risk or regulatory guidelines.</p>]]></paragraph>
<paragraph
    title="11.8.13.C.01."

    tags="Communications systems,Event Logging"


    classification="Top Secret, Secret, Confidential"
    compliance="Should"
    cid="7537"
><![CDATA[<p>Use of MFDs for printing, scanning, and copying purposes SHOULD be centrally logged.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="12. Product Security"><section title="12.1. Product Selection and Acquisition"><subsection title="Objective"><paragraph
    title="12.1.1."


><![CDATA[<p>Products providing security functions for the protection of classified information are formally evaluated in order to provide a degree of assurance over the integrity and performance of the product.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="12.1.2."


><![CDATA[<p>This section covers information on the selection and acquisition of any product that provide security functionality for the protection of information. It DOES NOT provide information on the selection or acquisition of products that do not provide security functionality or physical security products.</p>]]></paragraph>
</block>
<block title="Selecting products without security functions"><paragraph
    title="12.1.3."


><![CDATA[<p>Agencies selecting products that do not provide a security function or selecting products that will not use their security functions are free to follow their own agency or departmental acquisition guidelines.</p>]]></paragraph>
</block>
<block title="Product specific requirements"><paragraph
    title="12.1.4."


><![CDATA[<p>Where consumer guides exist for evaluated products, agencies should identify and assess any potential conflicts with this manual. Where further advice is required, consult the GCSB.</p>]]></paragraph>
</block>
<block title="Convergence"><paragraph
    title="12.1.5."


><![CDATA[<p>Convergence is the integration of a number of discrete technologies into one product. Converged solutions can include the advantages and disadvantages of each discrete technology.</p>]]></paragraph>
<paragraph
    title="12.1.6."


><![CDATA[<p>Most products will exhibit some element of convergence. When products have converged elements, agencies will need to comply with the relevant areas of this manual for the discrete technologies when deploying the converged product.</p>]]></paragraph>
<paragraph
    title="12.1.7."


><![CDATA[<p>As an example, when agencies choose to use evaluated media, such as encrypted flash memory media, the requirements for evaluated products, media and cryptographic security apply.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Assurance"><paragraph
    title="12.1.8."


><![CDATA[<p>In Common Criteria (CC), assurance is the confidence that a Target of Evaluation (TOE) meets the Security Functional Requirements (SFR) of the product.</p>]]></paragraph>
 <block title="Determining Assurance"><paragraph
    title="12.1.9."


><![CDATA[<p>In order to determine the level of assurance (the EAL), the CC standard requires tests, checks and evaluations in several areas. Higher levels of assurance require more extensive design, documentation, testing and evaluation. Determining assurance requires assessment of the following elements:</p><ul>
<li>Development;</li>
<li>Guidance documents;</li>
<li>Life-cycle support;</li>
<li>Security Target evaluation;</li>
<li>Tests; and</li>
<li>Vulnerability assessment.</li>
</ul>]]></paragraph>
</block>
<block title="Augmented Assurance"><paragraph
    title="12.1.10."


><![CDATA[<p>It is possible to “augment” an evaluation to provide additional assurance without changing the fundamental assurance level. This mechanism allows the addition of assurance components not specifically required for a specific level of evaluation or the substitution of assurance components from the specification of another hierarchically higher assurance component. Of the assurance constructs defined in the CC, only EALs may be augmented. An augmented EAL is often indicated by a ”+”-sign (for example EAL4+). The concept of negative augmentation or an “EAL minus” is not recognised by the standard.</p>]]></paragraph>
</block>
<block title="High Assurance"><paragraph
    title="12.1.11."


><![CDATA[<p>High Assurance is a generic term encompassing EAL levels 5, 6 and 7. ASD run an independent High Assurance Evaluation scheme which is not related to AISEP or an EAL rating.</p>]]></paragraph>
</block>
<block title="Evaluated Products List"><paragraph
    title="12.1.12."


><![CDATA[<p>The Certified Products List (CPL) records products that have been evaluated through one or more of the following schemes:</p>
<ul>
<li>Common Criteria;</li>
<li>high assurance evaluation; or</li>
<li>an <a title="AISEP" rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/assessment-and-evaluation-programs/australian-information-security-evaluation-program" target="_blank">Australian Information Security Evaluation Program (AISEP)</a> approved evaluation.</li>
</ul>]]></paragraph>
<paragraph
    title="12.1.13."


><![CDATA[<p>AISEP certified products can be viewed&nbsp;on the <a title="CPL" rel="noopener noreferrer" href="https://www.commoncriteriaportal.org/products/index.cfm" target="_blank">Common Criteria Certified Products List (CPL)</a>.&nbsp;IT security products that are&nbsp;currently undergoing an evaluation in the AISEP are listed on the AISEP webpage under the section <a title="Products in Evaluation" rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/assessment-and-evaluation-programs/australian-information-security-evaluation-program" target="_blank">Products in Evaluation</a>.</p>]]></paragraph>
</block>
<block title="Evaluation level mapping"><paragraph
    title="12.1.14."


><![CDATA[<p>The Information Technology Security Evaluation Criteria (ITSEC) and Common Criteria (CC) assurance levels used in the EPL are similar, but not identical, in their relationship. The table below shows the relationship between the two evaluation criteria.</p>]]></paragraph>
<paragraph
    title="12.1.15."


><![CDATA[<p>This manual refers only to Common Criteria Evaluation Assurance Levels (EALs). The table below maps ITSEC evaluation assurance levels to Common Criteria EALs. EAL’s are defined in the Common Criteria Standard – part 3.</p><table>
<tbody>
<tr style="background-color: #bbbbbb;">
<td>Criteria</td>
<td colspan="8">Assurance level</td>
</tr>
<tr>
<td>
<p>Common Criteria</p>
</td>
<td>
<p>N/A</p>
</td>
<td>EAL1</td>
<td>EAL2</td>
<td>EAL3</td>
<td>EAL4</td>
<td>EAL5</td>
<td>EAL6</td>
<td>EAL7</td>
</tr>
<tr>
<td>ITSEC</td>
<td>E0</td>
<td>N/A</td>
<td>E1</td>
<td>E2</td>
<td>E3</td>
<td>E4</td>
<td>E5</td>
<td>E6</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Recognition arrangements"><paragraph
    title="12.1.16."


><![CDATA[<p>The AISEP programme has a number of recognition arrangements regarding evaluated products. Before choosing a product that has not been evaluated by the AISEP, agencies are encouraged to contact the GCSB to enquire whether the product will be recognised for New Zealand use once it has complete evaluation in a foreign scheme.</p>]]></paragraph>
<paragraph
    title="12.1.17."


><![CDATA[<p>Two such recognition arrangements are for the Common Criteria Recognition Arrangement up to the assurance level of EAL2 with the lifecycle flaw remediation augmentation and for degausser products listed on the National Security Agency/Central Security Service’s EPLD.</p>]]></paragraph>
</block>
<block title="Australian Information Security Evaluation Program (AISEP)"><paragraph
    title="12.1.18."


><![CDATA[<p>The <a title="AISEP" rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/assessment-and-evaluation-programs/australian-information-security-evaluation-program" target="_blank">AISEP</a> exists to ensure that a range of evaluated products are available to meet the needs of Australian and New Zealand Government agencies.</p>]]></paragraph>
<paragraph
    title="12.1.19."


><![CDATA[<p>The <a title="AISEP" rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/assessment-and-evaluation-programs/australian-information-security-evaluation-program" target="_blank">AISEP</a> performs the following functions:</p>
<ul>
<li>evaluation and certification of products using the Common Criteria;</li>
<li>continued maintenance of the assurance of evaluated products; and</li>
<li>recognition of products evaluated by a foreign scheme with which the AISEP has a mutual recognition agreement (generally the <a title="CCRA" rel="noopener noreferrer" href="https://www.commoncriteriaportal.org/ccra/index.cfm" target="_blank">Common Criteria Recognition Agreement – CCRA</a>).</li>
</ul>]]></paragraph>
</block>
<block title="Protection Profiles"><paragraph
    title="12.1.20."


><![CDATA[<p>A Protection Profile (PP) describes the security functionality that must be included in a Common Criteria evaluation to meet a range of defined threats. PPs also define the activities to be taken to assess the security functions of a product. Agencies can have confidence that a product evaluated against an AISEP or GCSB approved PP addresses the defined threats. Approved PPs are published on the <a title="CPL" rel="noopener noreferrer" href="https://www.commoncriteriaportal.org/products/index.cfm" target="_blank">Certified Products List</a>.</p>]]></paragraph>
<paragraph
    title="12.1.21."


><![CDATA[<p>The introduction of PP’s is to reduce the time required for evaluation, compared with the traditional approach to allow the AISEP to keep pace with the rapid evolution, production and release of security products and updates.  Cryptographic security functionality is included in the scope of evaluation against an approved Protection Profile. </p>]]></paragraph>
<paragraph
    title="12.1.22."


><![CDATA[<p>To facilitate the transition to AISEP approved Protection Profiles, a cap of Evaluation Assurance Level (EAL) 2 applies for all traditional AISEP (EAL based evaluations), including for technologies with no existing approved Protection Profile. EAL 2 is considered to represent a sensible trade-off between completion time and meaningful security assurance gains.</p>]]></paragraph>
<paragraph
    title="12.1.23."


><![CDATA[<p>Evaluations conducted in other nations’ Common Criteria schemes will continue to be recognised by the GCSB under the AISEP.</p>]]></paragraph>
<paragraph
    title="12.1.24."


><![CDATA[<p>Some High Assurance evaluations continue to be conducted in European Approved Testing Facilities and use the EAL rating scheme. ASD run an independent High Assurance Evaluation scheme which is not related to AISEP or an EAL rating.</p>]]></paragraph>
<paragraph
    title="12.1.25."


><![CDATA[<p>It is important that Agencies check the evaluation has examined the security enforcing functions by reviewing the target of evaluation/security target and other testing documentation.</p>]]></paragraph>
<paragraph
    title="12.1.26."


><![CDATA[<p>The UK utilises several product evaluation schemes such as the CESG Assisted Products Service (CAPS), CESG Assured Service (CAS) and IT Security Evaluation Criteria (ITSEC). Agencies should consult the GCSB if further clarity on the utilisation of these evaluation schemes and products is required.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Product Selection"><paragraph
    title="12.1.27."


><![CDATA[<p>The UK utilises several product evaluation schemes such as the CESG Assisted Products Service (CAPS), CESG Assured Service (CAS) and IT Security Evaluation Criteria (ITSEC). Agencies should consult the GCSB if further clarity on the utilisation of these evaluation schemes and products is required.</p>
<p><img class="leftAlone" title="" src="assets/NZISM/ProductSelectionGuide.png" alt="Product Selection Guide Diagram" width="681" height="948"></p>]]></paragraph>
 </subsection>
<subsection title="References"><paragraph
    title="12.1.28."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Reference</strong></p>
</td>
<td>
<p><strong>Title</strong></p>
</td>
<td>
<p><strong>Publisher</strong></p>
</td>
<td>
<p><strong>Source</strong></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>AISEP Policy Manual, August 2022</strong></p>
</td>
<td style="text-align: center;">ASD</td>
<td><a href="https://www.cyber.gov.au/sites/default/files/2022-10/2022_AUG_REL_AISEP_Policy_Manual_6.3.pdf">2022_AUG_REL_AISEP_Policy_Manual_6.3.pdf (cyber.gov.au)</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Australian Information Security Evaluation Program (AISEP)</strong></p>
</td>
<td style="text-align: center;">ASD</td>
<td><a title="Australian Information Security Evaluation Program" rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/programs/australasian-information-security-evaluation-program" target="_blank">https://www.cyber.gov.au/acsc/view-all-content/programs/australasian-information-security-evaluation-program</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Common Criteria</strong></p>
</td>
<td style="text-align: center;">
<p>CC</p>
</td>
<td><a rel="noopener noreferrer" href="https://www.commoncriteriaportal.org/index.cfm?" target="_blank">https://www.commoncriteriaportal.org</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Common Criteria Certified Products</strong></p>
</td>
<td style="text-align: center;">CC</td>
<td>
<p><a title="Common Criteria Certified Products" rel="noopener noreferrer" href="https://www.commoncriteriaportal.org/products" target="_blank">https://www.commoncriteriaportal.org/products</a>&nbsp;<a title="NCSC UK" rel="noopener noreferrer" href="https://www.ncsc.gov.uk/marketplace" target="_blank"><br></a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Product &amp; Services Marketplace</strong></p>
</td>
<td style="text-align: center;">NCSC, UK</td>
<td>
<p><a title="NCSC UK" rel="noopener noreferrer" href="https://www.ncsc.gov.uk/marketplace" target="_blank">https://www.ncsc.gov.uk/marketplace</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>National Information Assurance Partnership (NIAP)</strong></p>
</td>
<td style="text-align: center;">NIAP</td>
<td><a rel="noopener noreferrer" href="https://ww.niap-ccevs.org" target="_blank">https://ww.niap-ccevs.org</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Government Rules of Sourcing</strong></p>
</td>
<td style="text-align: center;">
<p>Ministry of Business Innovation &amp; Employment (MBIE)</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.procurement.govt.nz/assets/procurement-property/documents/government-procurement-rules.pdf" target="_blank">Government Procurement Rules - Rules for sustainable and inclusive procurement</a></p>
<p><a rel="noopener noreferrer" href="https://www.procurement.govt.nz/procurement/principles-charter-and-rules/government-procurement-rules/" target="_blank">​​Government Procurement Rules | New Zealand Government Procurement and Property</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Commonwealth Procurement Rules</strong></td>
<td style="text-align: center;">Department of Finance and deregulation (Financial Management Group)&nbsp;</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.finance.gov.au/government/procurement/commonwealth-procurement-rules" target="_blank">Commonwealth Procurement Rules | Department of Finance</a> <a rel="noopener noreferrer" href="https://www.gov.uk/government/publications/government-ict-offshoring-international-sourcing-guidance" target="_blank"></a></p>
<p><a rel="noopener noreferrer" href="https://www.finance.gov.au/sites/default/files/2022-06/CPRs%20-%201%20July%202022.pdf" target="_blank">https://www.finance.gov.au/sites/default/files/2022-06/CPRs 1 July 2022.pdf</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="12.1.29."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 112.5%; height: 204.306px;">
<tbody>
<tr style="height: 57.6389px;">
<td style="width: 16.9963%; height: 57.6389px;"><strong>Reference</strong></td>
<td style="width: 15.7602%; height: 57.6389px;"><strong>Title</strong></td>
<td style="width: 67.2126%; height: 57.6389px;"><strong>Source</strong></td>
</tr>
<tr style="height: 146.667px;">
<td style="width: 16.9963%; height: 146.667px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 15.7602%; height: 146.667px;">GOV5, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td style="width: 67.2126%; height: 146.667px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements/&nbsp;&nbsp;&nbsp;</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Evaluated product selection preference order"><paragraph
    title="12.1.30.R.01."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>In selecting products for use, agencies should note that completed evaluations provide greater assurance than those products that are still undergoing evaluation or have not completed any formal evaluation activity. This assurance gradation is reflected in the preference order for selecting security products. If an agency selects a product that is ranked lower in the preference order, the justification for this decision MUST be recorded.</p>]]></paragraph>
<paragraph
    title="12.1.30.R.02."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>For products that are currently in evaluation, agencies should select those that are undergoing evaluation through AISEP in preference to those being conducted in a recognised foreign scheme. If a major vulnerability is found during the course of an AISEP evaluation, the GCSB may advise agencies on appropriate risk reduction strategies.</p>]]></paragraph>
<paragraph
    title="12.1.30.R.03."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>It is important to recognise that a product that is under evaluation has not, and might never, complete all relevant evaluation processes.</p>]]></paragraph>
<paragraph
    title="12.1.30.R.04."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>Agencies should be aware that while this section provides a product selection preference order, policy stated elsewhere in this manual, or product specific advice from the GCSB, could override this standard by specifying more rigorous requirements for particular functions and device use.</p>]]></paragraph>
<paragraph
    title="12.1.30.R.05."

    tags="Technical,Evaluated Products,Product Security"


><![CDATA[<p>Additionally, where an EAL rating is mandated for a product to perform a cryptographic function for the protection of data at rest or in transit, as specified within <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a>, products that have not completed an Approved Evaluation do not satisfy the requirement.</p>]]></paragraph>
<paragraph
    title="12.1.30.C.01."

    tags="Governance,Evaluated Products,Product Security"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="3284"
><![CDATA[<p>Agencies MUST select products in the following order of preference:</p><ul>
<li>a protection profile (PP) evaluated product;</li>
<li>products having completed an evaluation through the AISEP or recognised under the Common Criteria Recognition Arrangement (CCRA);</li>
<li>products in evaluation in the AISEP; </li>
<li>products in evaluation in a scheme where the outcome will be recognised by the GCSB when the evaluation is complete; or</li>
<li>If products do not fall within any of these categories, contact the GCSB.</li>
</ul>]]></paragraph>
<paragraph
    title="12.1.30.C.02."

    tags="Governance,Information Security Documentation,Evaluated Products,Product Security"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="3286"
><![CDATA[<p>When choosing a product, agencies MUST document the justification for any decision to choose a product that is still in evaluation and accept any security risk introduced by the use of such a product.</p>]]></paragraph>
<paragraph
    title="12.1.30.C.03."

    tags="Governance,Evaluated Products,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3287"
><![CDATA[<p>Agencies SHOULD select products in the following order of preference:</p><ul>
<li>a protection profile (PP) evaluated product;</li>
<li>products having completed an evaluation through the AISEP or recognised under the Common Criteria Recognition Arrangement (CCRA);</li>
<li>products in evaluation in the AISEP; </li>
<li>products in evaluation in a scheme where the outcome will be recognised by the GCSB when the evaluation is complete; or</li>
<li>If products do not fall within any of these categories, normal selection criteria (such as functionality and security) will apply.</li>
</ul>]]></paragraph>
</block>
<block title="Evaluated product selection"><paragraph
    title="12.1.31.R.01."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p class="NormS12C1">A certified product might not meet the security requirements of an agency.&nbsp; This could occur for a number of reasons, including that the scope of the evaluation is inappropriate for the intended use or the operational environment differs from that assumed in the evaluation.&nbsp; As such, an agency should ensure that a product is suitable by reviewing all available documentation.&nbsp; In the case of <a rel="noopener noreferrer" href="https://www.commoncriteriaportal.org/products/index.cfm" target="_blank">Common Criteria certified products list</a>, this documentation includes the protection profile, target of evaluation, security target, certification report, consumer guide along with any qualifications and limitations.</p>]]></paragraph>
<paragraph
    title="12.1.31.R.02."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>Products that are in evaluation will not have a certification report and may not have a published security target. A protection profile will, as a rule, exist. A draft security target can be obtained from the GCSB for products that are in evaluation through AISEP. For products that are in evaluation through a foreign scheme, the vendor can be contacted directly for further information.</p>]]></paragraph>
<paragraph
    title="12.1.31.C.01."

    tags="Governance,Evaluated Products,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3294"
><![CDATA[<p>Agencies SHOULD select products that have their desired security functionality within the scope of the product’s evaluation and are applicable to the agency’s intended environment.</p>]]></paragraph>
</block>
<block title="Product specific requirements"><paragraph
    title="12.1.32.R.01."

    tags="Governance,Product Security"


><![CDATA[<p>Whilst this manual may recommend a minimum level of assurance in the evaluation of a product’s security functionality not all evaluated products may be found suitable for their intended purpose even if they pass their Common Criteria evaluation. Typically such products will have cryptographic functionality that is not covered in sufficient depth under the Common Criteria. Where products have specific usage requirements, in addition to this manual, or supersede requirements in this manual, they will be outlined in the product’s consumer guide.</p>]]></paragraph>
<paragraph
    title="12.1.32.C.01."

    tags="Governance,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3299"
><![CDATA[<p>Agencies MUST check consumer guides for products, where available, to determine any product specific requirements.</p>]]></paragraph>
<paragraph
    title="12.1.32.C.02."

    tags="Governance,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3304"
><![CDATA[<p>Where product specific requirements exist in a consumer guide, agencies MUST comply with the requirements outlined in the consumer guide.</p>]]></paragraph>
<paragraph
    title="12.1.32.C.03."

    tags="Governance,High Assurance Products,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3306"
><![CDATA[<p>Agencies selecting high assurance products and HACE MUST contact the GCSB and comply with any product specific requirements, before any purchase is made.</p>]]></paragraph>
</block>
<block title="Sourcing non-evaluated software"><paragraph
    title="12.1.33.R.01."

    tags="Technical,Product Security,Software Security"


><![CDATA[<p>Software downloaded from websites on the Internet can contain malicious code or malicious content that is installed along with the legitimate software. Agencies need to confirm the integrity of the software they are installing before deploying it on a system to ensure that no unintended software is installed at the same time.</p>]]></paragraph>
<paragraph
    title="12.1.33.C.01."

    tags="Technical,Product Security,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="3310"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>obtain software from verifiable sources and verify its integrity using vendor supplied checksums; and</li>
<li>validate the software’s interaction with the operating systems and network within a test environment prior to use on operational systems.</li>
</ul>]]></paragraph>
</block>
<block title="Delivery of evaluated products"><paragraph
    title="12.1.34.R.01."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>It is important that agencies ensure that the selected product is the actual product received. If the product differs from the evaluated version, then NO assurance can be gained from an evaluation being previously performed.</p>]]></paragraph>
<paragraph
    title="12.1.34.R.02."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>For products evaluated under the ITSEC or the Common Criteria scheme at EAL2 or higher, delivery information is available from the developer in the delivery procedures document.</p>]]></paragraph>
<paragraph
    title="12.1.34.R.03."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>For products that do not have evaluated delivery procedures, it is recommended that agencies assess whether the vendor’s delivery procedures are sufficient to maintain the integrity of the product.</p>]]></paragraph>
<paragraph
    title="12.1.34.R.04."

    tags="Technical,Evaluated Products,Product Security"


><![CDATA[<p>Other factors that the assessment of the delivery procedures for products might consider include:</p><ul>
<li>the intended environment of the product;</li>
<li>likely attack vectors;</li>
<li>the types of attackers that the product will defend against;</li>
<li>the resources of any potential attackers;</li>
<li>the likelihood of an attack;</li>
<li>the level of importance of maintaining confidentiality of the product purchase; and</li>
<li>the level of importance of ensuring adherence to delivery timeframes.</li>
</ul>]]></paragraph>
<paragraph
    title="12.1.34.R.05."

    tags="Technical,Evaluated Products,Product Security"


><![CDATA[<p>Delivery procedures can vary greatly from product to product. For most products the standard commercial practice for packaging and delivery can be sufficient for agencies requirements. More secure delivery procedures can include measures to detect tampering or masquerading. Some examples of specific security measures include tamper evident seals, cryptographic checksums and signatures, and secure transportation.</p>]]></paragraph>
<paragraph
    title="12.1.34.C.01."

    tags="Technical,Evaluated Products,High Assurance Products,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3318"
><![CDATA[<p>Agencies procuring high assurance products and HACE MUST contact the GCSB and comply with any product specific delivery procedures.</p>]]></paragraph>
<paragraph
    title="12.1.34.C.02."

    tags="Technical,Evaluated Products,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3320"
><![CDATA[<p>Agencies SHOULD ensure that products are delivered in a manner consistent with any delivery procedures defined in associated documentation.</p>]]></paragraph>
</block>
<block title="Delivery of non-evaluated products"><paragraph
    title="12.1.35.R.01."

    tags="IT Equipment,Technical,Product Security"


><![CDATA[<p>When a non-evaluated product is purchased agencies should determine if the product has arrived in a state that they were expecting it to and that there are no obvious signs of tampering.</p>]]></paragraph>
<paragraph
    title="12.1.35.C.01."

    tags="IT Equipment,Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3325"
><![CDATA[<p>Agencies SHOULD ensure that products purchased without the delivery assurances provided through the use of formally evaluated procedures are delivered in a manner that provides confidence that they receive the product that they expect to receive in an unaltered state, including checking:</p><ul>
<li>any labelling changes;</li>
<li>any damage; and</li>
<li>any signs of tampering.</li>
</ul>]]></paragraph>
</block>
<block title="Leasing arrangements"><paragraph
    title="12.1.36.R.01."

    tags="Governance,IT Equipment,Product Security"


><![CDATA[<p>Agencies should consider security and policy requirements when entering into a leasing agreement for IT equipment in order to avoid potential information security incidents during maintenance, repairs or disposal processes.</p>]]></paragraph>
<paragraph
    title="12.1.36.C.01."

    tags="Governance,IT Equipment,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3330"
><![CDATA[<p>Agencies SHOULD ensure that leasing agreements for IT equipment takes into account the:</p><ul>
<li>difficulties that could be encountered when the equipment needs maintenance;</li>
<li>control of remote maintenance, software updates and fault diagnosis;</li>
<li>if the equipment can be easily sanitised prior to its return; and</li>
<li>the possible requirement for destruction if sanitisation cannot be performed.</li>
</ul>]]></paragraph>
</block>
<block title="Ongoing maintenance of assurance"><paragraph
    title="12.1.37.R.01."

    tags="Technical,Product Security"


><![CDATA[<p>Developers that have demonstrated a commitment to ongoing maintenance or evaluation are more likely to be responsive to ensuring that security patches are independently assessed.</p>]]></paragraph>
<paragraph
    title="12.1.37.R.02."

    tags="Technical,Product Security"


><![CDATA[<p>A vendor’s commitment to assurance continuity can be gauged through the number of evaluations undertaken and whether assurance maintenance has been performed on previous evaluations.</p>]]></paragraph>
<paragraph
    title="12.1.37.C.01."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3337"
><![CDATA[<p>Agencies SHOULD choose products from developers that have made a commitment to the ongoing maintenance of the assurance of their product.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="12.2. Product Installation and Configuration"><subsection title="Objective"><paragraph
    title="12.2.1."


><![CDATA[<p>Evaluated products use evaluated configurations.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="12.2.2."


><![CDATA[<p>This section covers information on installing and configuring products providing security functionality. It does not provide information on the installation and configuration of general products or physical security products.</p>]]></paragraph>
</block>
<block title="Evaluated configuration"><paragraph
    title="12.2.3."


><![CDATA[<p>A product is considered to be operating in its evaluated configuration if:</p><ul>
<li>functionality is used that was within the scope of the evaluation and implemented in the specified manner;</li>
<li>only patches that have been assessed through a formal assurance continuity process have been applied; and</li>
<li>the environment complies with assumptions or organisational security policies stated in the product’s security target or similar document.</li>
</ul>]]></paragraph>
</block>
<block title="Unevaluated configuration"><paragraph
    title="12.2.4."


><![CDATA[<p>A product is considered to be operating in an unevaluated configuration when it does not meet the requirements of an evaluated configuration.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Installation and configuration of evaluated products"><paragraph
    title="12.2.5.R.01."

    tags="Technical,Evaluated Products,Product Security"


><![CDATA[<p>An evaluation of products provides assurance that the product will work as expected with a clearly defined set of constraints. These constraints, defined by the scope of the evaluation, generally consist of what security functionality can be used, and how the products are configured and operated.</p>]]></paragraph>
<paragraph
    title="12.2.5.R.02."

    tags="Technical,Evaluated Products,Product Security"


><![CDATA[<p>Using an evaluated product in manner which it was not intended could result in the introduction of new threats and vulnerabilities that were not considered by the initial evaluation.</p>]]></paragraph>
<paragraph
    title="12.2.5.R.03."

    tags="Technical,Evaluated Products,Product Security"


><![CDATA[<p>For products evaluated under the Common Criteria and ITSEC, information is available from the developer in the product’s installation, generation and startup documentation. Further information is also available in the security target and certification report.</p>]]></paragraph>
<paragraph
    title="12.2.5.C.01."

    tags="Technical,Evaluated Products,High Assurance Products,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3387"
><![CDATA[<p>Agencies MUST ensure that high assurance products and HACE are installed, configured, operated and administered in accordance with all product specific policy.</p>]]></paragraph>
<paragraph
    title="12.2.5.C.02."

    tags="Technical,Evaluated Products,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3389"
><![CDATA[<p>Agencies SHOULD install, configure, operate and administer evaluated products in accordance with available documentation resulting from the product’s evaluation.</p>]]></paragraph>
</block>
<block title="Use of evaluated products in unevaluated configurations"><paragraph
    title="12.2.6.R.01."

    tags="Technical,Evaluated Products,Product Security"


><![CDATA[<p>To ensure that a product will still provide the assurance desired by the agency when used in a manner for which it was not intended, a security risk assessment MUST be conducted upon the altered configuration. The further that a product deviates from its evaluated configuration, the less assurance can be gained from the evaluation.</p>]]></paragraph>
<paragraph
    title="12.2.6.R.02."

    tags="Technical,Evaluated Products,High Assurance Products,Product Security"


><![CDATA[<p>Given the potential threat vectors and the value of the classified information being protected, high assurance products and HACE MUST be configured in accordance with the GCSB’s guidelines.</p>]]></paragraph>
<paragraph
    title="12.2.6.C.01."

    tags="Technical,Evaluated Products,Product Security,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="3401"
><![CDATA[<p>Agencies wishing to use a product in an unevaluated configuration MUST undertake a security risk assessment including:</p><ul>
<li>the necessity of the unevaluated configuration;</li>
<li>testing of the unevaluated configuration; and</li>
<li>the environment in which the unevaluated product is to be used.</li>
</ul>]]></paragraph>
<paragraph
    title="12.2.6.C.02."

    tags="Technical,Evaluated Products,High Assurance Products,Product Security"


    classification="All Classifications"
    compliance="Must Not"
    cid="3404"
><![CDATA[<p>High assurance products and HACE MUST NOT be used in unevaluated configurations.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="12.3. Product Classifying and Labelling"><subsection title="Objective"><paragraph
    title="12.3.1."


><![CDATA[<p>IT equipment is classified and appropriately labelled.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="12.3.2."


><![CDATA[<p>This section covers information relating to the classification and labelling of both evaluated and non-evaluated IT equipment.</p>]]></paragraph>
</block>
<block title="Non-essential labels"><paragraph
    title="12.3.3."


><![CDATA[<p>Non-essential labels are labels other than classification and asset labels.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Classifying IT equipment"><paragraph
    title="12.3.4.R.01."

    tags="IT Equipment,Technical,Product Security"


><![CDATA[<p>Much of today’s technology incorporates an internal data storage capability. When media is used in IT equipment there is no guarantee that the equipment has not automatically accessed classified information from the media and stored it locally to the device, without the knowledge of the system user. As such, the IT equipment needs to be afforded the same degree of protection as that of the associated media.</p>]]></paragraph>
<paragraph
    title="12.3.4.C.01."

    tags="IT Equipment,Technical,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3423"
><![CDATA[<p>Agencies MUST classify IT equipment based on the highest classification of information the equipment and any associated media within the equipment, are approved for processing, storing or communicating.</p>]]></paragraph>
</block>
<block title="Labelling IT equipment"><paragraph
    title="12.3.5.R.01."

    tags="IT Equipment,Technical,Product Security"


><![CDATA[<p>The purpose of applying protective markings to all assets in a secure area is to reduce the likelihood that a system user will accidentally input classified information into another system residing in the same area that is of a lower classification than the information itself.</p>]]></paragraph>
<paragraph
    title="12.3.5.R.02."

    tags="IT Equipment,Technical,Product Security"


><![CDATA[<p>Applying protective markings to assets also assists in determining the appropriate usage, sanitisation, disposal or destruction requirements of the asset based on its classification. This is of particular importance in data centres and computer rooms.</p>]]></paragraph>
<paragraph
    title="12.3.5.C.01."

    tags="IT Equipment,Technical,Product Security"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="3427"
><![CDATA[<p>Agencies MUST clearly label all IT equipment capable of storing or processing classified information, with the exception of HACE, with the appropriate protective marking.</p>]]></paragraph>
<paragraph
    title="12.3.5.C.02."

    tags="IT Equipment,Technical,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3428"
><![CDATA[<p>Agencies MUST clearly label all IT equipment in data centres or computer rooms with an asset identification and the level of classification to which that equipment has been accredited.</p>]]></paragraph>
</block>
<block title="Labelling high assurance products"><paragraph
    title="12.3.6.R.01."

    tags="Technical,High Assurance Products,Product Security"


><![CDATA[<p>High assurance products often have tamper-evident seals placed on their external surfaces. To assist system users in noticing changes to the seals, and to prevent functionality being degraded, agencies MUST limit the use of non-essential labels.</p>]]></paragraph>
<paragraph
    title="12.3.6.C.01."

    tags="Technical,High Assurance Products,Product Security"


    classification="All Classifications"
    compliance="Must Not"
    cid="3431"
><![CDATA[<p>Agencies MUST NOT have any non-essential labels applied to external surfaces of high assurance products.</p>]]></paragraph>
</block>
<block title="Labelling HACE"><paragraph
    title="12.3.7.R.01."

    tags="Technical,High Assurance Products,Product Security"


><![CDATA[<p>HACE often have tamper-evident seals placed on their external surfaces. To assist system users in noticing changes to the seals, and to prevent functionality being degraded, agencies MUST only place seals on equipment with GCSB approval.</p>]]></paragraph>
<paragraph
    title="12.3.7.C.01."

    tags="Technical,High Assurance Products,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3434"
><![CDATA[<p>Agencies SHOULD seek GCSB authorisation before applying labels to external surfaces of HACE.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="12.4. Product Patching and Updating"><subsection title="Objective"><paragraph
    title="12.4.1."


><![CDATA[<p>To ensure security patches are applied in a timely fashion to manage software and firmware corrections, vulnerabilities and performance risks.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="12.4.2."


><![CDATA[<p>This section covers information on patching both evaluated and non-evaluated software and IT equipment.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Vulnerabilities and patch availability awareness"><paragraph
    title="12.4.3.R.01."

    tags="Technical,Product Security,Vulnerability Analysis"


><![CDATA[<p>It is important that agencies monitor relevant sources for information about new vulnerabilities and security patches. This way, agencies can take pro-active steps to address vulnerabilities in their systems.</p>]]></paragraph>
<paragraph
    title="12.4.3.C.01."

    tags="Technical,Product Security,Vulnerability Analysis"


    classification="All Classifications"
    compliance="Should"
    cid="3444"
><![CDATA[<p>Agencies SHOULD monitor relevant sources for information about new vulnerabilities and security patches for software and IT equipment used by the agency.</p>]]></paragraph>
</block>
<block title="Patching vulnerabilities in products"><paragraph
    title="12.4.4.R.01."

    tags="Technical,Product Security"


><![CDATA[<p>The assurance provided by an evaluation is related to the date at which the results were issued. Over the course of a normal product lifecycle, patches are released to address known security vulnerabilities. Applying these patches should be considered as part of an agency’s overall risk management strategy.</p>]]></paragraph>
<paragraph
    title="12.4.4.R.02."

    tags="Technical,High Assurance Products,Product Security"


><![CDATA[<p>Given the potential threat vectors and the value of the classified information being protected, high assurance products MUST NOT be patched by an agency without specific direction from the GCSB. If a patch is released for a high assurance product, the GCSB will conduct an assessment of the patch and might revise the product’s usage guidance. Likewise, for patches released for HACE, the GCSB will subsequently conduct an assessment of the cryptographic vulnerability and might revise usage guidance in the consumer guide for the product.</p>]]></paragraph>
<paragraph
    title="12.4.4.C.01."

    tags="Technical,Product Security"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3448"
><![CDATA[<p>Agencies MUST apply all critical security patches as soon as possible and within two (2) days of the release of the patch or update.</p>]]></paragraph>
<paragraph
    title="12.4.4.C.02."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3449"
><![CDATA[<p>Agencies MUST implement a patch management strategy, including an evaluation or testing process.</p>]]></paragraph>
<paragraph
    title="12.4.4.C.03."

    tags="Technical,High Assurance Products,Product Security"


    classification="All Classifications"
    compliance="Must Not"
    cid="3450"
><![CDATA[<p>Agencies MUST NOT patch high assurance products or HACE without the patch being approved by the GCSB.</p>]]></paragraph>
<paragraph
    title="12.4.4.C.04."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3451"
><![CDATA[<p>Agencies SHOULD apply all critical security patches as soon as possible and preferably within two (2) days of the release of the patch or update.</p>]]></paragraph>
<paragraph
    title="12.4.4.C.05."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3452"
><![CDATA[<p>Agencies SHOULD apply all non-critical security patches as soon as possible.</p>]]></paragraph>
<paragraph
    title="12.4.4.C.06."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3453"
><![CDATA[<p>Agencies SHOULD ensure that security patches are applied through a vendor recommended patch or upgrade process.</p>]]></paragraph>
</block>
<block title="When security patches are not available"><paragraph
    title="12.4.5.R.01."

    tags="Technical,Product Security"


><![CDATA[<p>When a security patch is not available for a known vulnerability, there are a number of approaches to reducing the risk to a system. This includes resolving the vulnerability through alternative means, preventing exploitation of the vulnerability, containing the exploit or implementing measures to detect attacks attempting to exploit the vulnerability.</p>]]></paragraph>
<paragraph
    title="12.4.5.C.01."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3455"
><![CDATA[<p>Where known vulnerabilities cannot be patched, or security patches are not available, agencies SHOULD implement:</p><ul>
<li>controls to resolve the vulnerability such as:
<ul>
<li>disable the functionality associated with the vulnerability though product configuration;</li>
<li>ask the vendor for an alternative method of managing the vulnerability;</li>
<li>install a version of the product that does not have the identified vulnerability;</li>
<li>install a different product with a more responsive vendor; or</li>
<li>engage a software developer to correct the software.</li>
</ul>
</li>
<li>controls to prevent exploitation of the vulnerability including:
<ul>
<li>apply external input sanitisation (if an input triggers the exploit);</li>
<li>apply filtering or verification on the software output (if the exploit relates to an information disclosure);</li>
<li>apply additional access controls that prevent access to the vulnerability; or</li>
<li>configure firewall rules to limit access to the vulnerable software.</li>
</ul>
</li>
<li>controls to contain the exploit including:
<ul>
<li>apply firewall rules limiting outward traffic that is likely in the event of an exploitation;</li>
<li>apply mandatory access control preventing the execution of exploitation code; or</li>
<li>set file system permissions preventing exploitation code from being written to disk;&nbsp;</li>
<li>allow and deny listing to prevent code execution; and</li>
</ul>
</li>
<li>controls to detect attacks including:
<ul>
<li>deploy an IDS;</li>
<li>monitor logging alerts; or</li>
<li>use other mechanisms as appropriate for the detection of exploits using the known vulnerability.</li>
</ul>
</li>
<li>controls to prevent attacks including:
<ul>
<li>deploy an IPS or HIPS; or</li>
<li>use other mechanisms as appropriate for the diversion of exploits using the known vulnerability, such as honey pots and Null routers.</li>
</ul>
</li>
</ul>]]></paragraph>
</block>
<block title="Firmware updates"><paragraph
    title="12.4.6.R.01."

    tags="Technical,Product Security"


><![CDATA[<p>As firmware provides the underlying functionality for hardware it is essential that the integrity of any firmware images or updates are maintained.</p>]]></paragraph>
<paragraph
    title="12.4.6.C.01."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3460"
><![CDATA[<p>Agencies MUST ensure that any firmware updates are performed in a manner that verifies the integrity and authenticity of the source and of the updating process or updating utility.</p>]]></paragraph>
</block>
<block title="Unsupported products"><paragraph
    title="12.4.7.R.01."

    tags="Technical,Product Security"


><![CDATA[<p>Once a cessation date for support is announced for software or IT equipment, agencies will increasingly find it difficult to protect against vulnerabilities found in the software or IT equipment as no security patches will be made available by the manufacturer after support ceases.</p>]]></paragraph>
<paragraph
    title="12.4.7.R.02."

    tags="Technical,Product Security"


><![CDATA[<p>Once a cessation date for support is announced agencies should assess the timeline, investigate new solutions that will be appropriately supported and establish a plan to implement the new solution.</p>]]></paragraph>
<paragraph
    title="12.4.7.C.01."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3465"
><![CDATA[<p>Agencies SHOULD assess the security risk of continued use of software or IT equipment when a cessation date for support is announced or when the product is no longer supported by the developer.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="12.5. Product Maintenance and Repairs"><subsection title="Objective"><paragraph
    title="12.5.1."


><![CDATA[<p>Products are repaired by cleared or appropriately escorted personnel.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="12.5.2."


><![CDATA[<p>This section covers information on maintaining and repairing both evaluated and non-evaluated IT equipment.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Maintenance and repairs"><paragraph
    title="12.5.3.R.01."

    tags="Technical,High Assurance Products,Product Security"


><![CDATA[<p>Making unauthorised repairs to high assurance products or HACE can impact the integrity of the product or equipment.</p>]]></paragraph>
<paragraph
    title="12.5.3.R.02."

    tags="Technical,Product Security"


><![CDATA[<p>Using cleared technicians on-site at an agency’s facilities is considered the most desired approach to maintaining and repairing IT equipment. This ensures that if classified information is disclosed during the course of maintenance or repairs, the technicians are aware of the protection requirements for the information.</p>]]></paragraph>
<paragraph
    title="12.5.3.C.01."

    tags="Technical,High Assurance Products,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3481"
><![CDATA[<p>Agencies MUST seek GCSB approval before undertaking any repairs to high assurance products or HACE.</p>]]></paragraph>
<paragraph
    title="12.5.3.C.02."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3483"
><![CDATA[<p>Maintenance and repairs of IT equipment containing media SHOULD be carried out on-site by an appropriately cleared technician.</p>]]></paragraph>
</block>
<block title="Maintenance and repairs by an uncleared technician"><paragraph
    title="12.5.4.R.01."

    tags="Technical,Product Security"


><![CDATA[<p>Agencies choosing to use uncleared technicians to maintain or repair IT equipment on-site at an agency’s facilities, or off-site at a company’s facilities, should be aware of the requirement for cleared personnel to escort the uncleared technicians during maintenance or repair activities.</p>]]></paragraph>
<paragraph
    title="12.5.4.C.01."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3492"
><![CDATA[<p>If an uncleared technician is used to undertake maintenance or repairs of IT equipment, the technician MUST be escorted by someone who:</p><ul>
<li>is appropriately cleared and briefed;</li>
<li>takes due care to ensure that classified information is not disclosed;</li>
<li>takes all responsible measures to ensure the integrity of the equipment; and</li>
<li>has the authority to direct the technician.</li>
</ul>]]></paragraph>
<paragraph
    title="12.5.4.C.02."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3493"
><![CDATA[<p>If an uncleared technician is used to undertake maintenance or repairs of IT equipment, agencies SHOULD sanitise and reclassify or declassify the equipment and associated media before maintenance or repair work is undertaken.</p>]]></paragraph>
<paragraph
    title="12.5.4.C.03."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3494"
><![CDATA[<p>Agencies SHOULD ensure that the ratio of escorts to uncleared technicians allows for appropriate oversight of all activities.</p>]]></paragraph>
<paragraph
    title="12.5.4.C.04."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3495"
><![CDATA[<p>If an uncleared technician is used to undertake maintenance or repairs of IT equipment, the technician SHOULD be escorted by someone who is sufficiently familiar with the product to understand the work being performed.</p>]]></paragraph>
</block>
<block title="Off-site maintenance and repairs"><paragraph
    title="12.5.5.R.01."

    tags="Technical,Product Security"


><![CDATA[<p>Agencies choosing to have IT equipment maintained or repaired off-site need to be aware of requirements for the company’s off-site facilities to be approved to process and store the products at the appropriate classification.</p>]]></paragraph>
<paragraph
    title="12.5.5.R.02."

    tags="Technical,Product Security"


><![CDATA[<p>Agencies choosing to have IT equipment maintained or repaired off-site can sanitise, declassify or lower the classification of the product prior to transport and subsequent maintenance or repair activities, to lower the physical transfer, processing and storage requirements.</p>]]></paragraph>
<paragraph
    title="12.5.5.C.01."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3498"
><![CDATA[<p>Agencies having IT equipment maintained or repaired off-site MUST ensure that the physical transfer, processing and storage requirements are appropriate for the classification of the product and are maintained at all times.</p>]]></paragraph>
</block>
<block title="Maintenance and repair of IT equipment from secure areas"><paragraph
    title="12.5.6.R.01."

    tags="Technical,Product Security,Secure Area"


><![CDATA[<p>Where equipment is maintained or repaired offsite, agencies should identify any co-located equipment of a higher classification. This higher classification equipment may be at risk of compromise from modifications or repairs to the lower classification equipment.</p>]]></paragraph>
<paragraph
    title="12.5.6.C.01."

    tags="Technical,Product Security,Secure Area"


    classification="All Classifications"
    compliance="Should"
    cid="3504"
><![CDATA[<p>Offsite repairs and maintenance SHOULD treat all equipment in accordance with the requirements for the highest classification of information processed, stored or communicated in the area that the equipment will be returned to.</p>]]></paragraph>
<paragraph
    title="12.5.6.C.02."

    tags="Technical,Product Security,Secure Area"


    classification="All Classifications"
    compliance="Should"
    cid="3507"
><![CDATA[<p>Agencies SHOULD conduct or arrange to have technical inspections conducted on all equipment returned to the secure area after maintenance or repair.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="12.6. Product Sanitisation and Disposal"><subsection title="Objective"><paragraph
    title="12.6.1."


><![CDATA[<p>All IT equipment is sanitised and disposed of in an approved and secure manner.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="12.6.2."


><![CDATA[<p>This section covers information on sanitising and disposing of both evaluated and non-evaluated IT equipment. Additional information on the sanitisation, destruction and disposal of media can be found in <a title="Media and IT equipment management, decommissioning and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 – Media and IT equipment management, decommissioning and disposal</a>.</p>]]></paragraph>
<paragraph
    title="12.6.3."


><![CDATA[<p>Media typically found installed in IT equipment are electrostatic memory devices such as laser printer cartridges and photocopier drums, non-volatile magnetic memory such as hard disks, non-volatile semi-conductor memory such as flash cards and volatile memory such as RAM cards. Some technologies, such as an FPGA, may integrate memory capabilities.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Sanitisation or destruction of IT equipment"><paragraph
    title="12.6.4.R.01."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


><![CDATA[<p>In order to prevent the disclosure of classified information into the public domain agencies will need to ensure that IT equipment is either sanitised or destroyed before being declassified and authorised for released into the public domain. Refer also to <a title="Media and&nbsp;IT Equipment Management, Decommissioning and Disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 - Media and&nbsp;IT Equipment Management, Decommissioning and Disposal</a>.</p>]]></paragraph>
<paragraph
    title="12.6.4.C.01."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3537"
><![CDATA[<p>Agencies MUST sanitise or destroy, then declassify, IT equipment containing <strong><span style="text-decoration: underline;">any</span></strong> media before disposal.</p>]]></paragraph>
<paragraph
    title="12.6.4.C.02."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3540"
><![CDATA[<p>IT equipment and associated media that have processed or stored NZEO information, and cannot be sanitised, MUST be returned to New Zealand for sanitisation or destruction, declassification and disposal.</p>]]></paragraph>
</block>
<block title="Disposal of IT equipment"><paragraph
    title="12.6.5.R.01."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


><![CDATA[<p>When disposing of IT equipment, agencies need to sanitise or destroy and subsequently declassify any media within the product that are capable of storing classified information. Once the media have been removed from the product it can be considered sanitised. Following subsequent approval for declassification from the owner of the information previously processed by the product, it can be disposed of by the agency.</p>]]></paragraph>
<paragraph
    title="12.6.5.R.02."

    tags="IT Equipment,Technical,Disposal,High Assurance Products,Product Sanitisation,Product Security"


><![CDATA[<p>The GCSB provides specific advice on how to securely dispose of high assurance products, HACE and TEMPEST rated equipment. There are a number of security risks that can occur due to improper disposal, including providing an attacker with an opportunity to gain insight into government capabilities.</p>]]></paragraph>
<paragraph
    title="12.6.5.C.01."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3545"
><![CDATA[<p>Agencies MUST have a documented process for the disposal of IT equipment.</p>]]></paragraph>
<paragraph
    title="12.6.5.C.02."

    tags="IT Equipment,Technical,Disposal,High Assurance Products,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3547"
><![CDATA[<p>Agencies MUST contact the GCSB and comply with any requirements for the disposal of high assurance products.</p>]]></paragraph>
<paragraph
    title="12.6.5.C.03."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3549"
><![CDATA[<p>Agencies MUST contact the GCSB and comply with any requirements for the disposal of HACE.</p>]]></paragraph>
<paragraph
    title="12.6.5.C.04."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3550"
><![CDATA[<p>Agencies MUST contact GCSB and comply with any requirements for the disposal of TEMPEST rated IT equipment or if the equipment is non-functional.</p>]]></paragraph>
<paragraph
    title="12.6.5.C.05."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3552"
><![CDATA[<p>Agencies MUST formally sanitise and then authorise the disposal of IT equipment, or waste, into the public domain.</p>]]></paragraph>
</block>
<block title="Sanitising printer cartridges and copier drums"><paragraph
    title="12.6.6.R.01."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


><![CDATA[<p>Electrostatic drums can retain an image of recently printed documents providing opportunity for unauthorised access to information. Some printer cartridges may have integrated drums. Printing random text with no blank areas on each colour printer cartridge or drum ensures that no residual information will be kept on the drum or cartridge.</p>]]></paragraph>
<paragraph
    title="12.6.6.C.01."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="3555"
><![CDATA[<p>Agencies MUST print at least three pages of random text with no blank areas on each colour printer cartridge with an integrated drum or separate copier drum.</p>]]></paragraph>
<paragraph
    title="12.6.6.C.02."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3557"
><![CDATA[<p>Agencies SHOULD print at least three pages of random text with no blank areas on each colour printer cartridge with an integrated drum or separate copier drum.</p>]]></paragraph>
</block>
<block title="Destroying printer cartridges and copier drums"><paragraph
    title="12.6.7.R.01."

    tags="Technical,Disposal,Media Destruction,Product Sanitisation,Product Security"


><![CDATA[<p>When printer cartridges with integrated copier drums or discrete drums cannot be sanitised due to a hardware failure, or when they are empty, there is no other option available but to destroy them.</p>]]></paragraph>
<paragraph
    title="12.6.7.C.01."

    tags="Technical,Disposal,Media Destruction,Product Sanitisation,Product Security"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="3561"
><![CDATA[<p>Agencies unable to sanitise printer cartridges with integrated copier drums or discrete copier drums, MUST destroy the cartridge or drum.</p>]]></paragraph>
<paragraph
    title="12.6.7.C.02."

    tags="Technical,Disposal,Media Destruction,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3563"
><![CDATA[<p>Agencies unable to sanitise printer cartridges with integrated copier drums or discrete copier drums, SHOULD destroy the cartridge or drum.</p>]]></paragraph>
</block>
<block title="Disposal of televisions and monitors"><paragraph
    title="12.6.8.R.01."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


><![CDATA[<p>Turning up the brightness to the maximum level on video screens will allow agencies to easily determine if information has been burnt in or persists upon the screen.</p>]]></paragraph>
<paragraph
    title="12.6.8.C.01."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3566"
><![CDATA[<p>Agencies MUST visually inspect video screens by turning up the brightness to the maximum level to determine if any classified information has been burnt into or persists on the screen, before redeployment or disposal.</p>]]></paragraph>
</block>
<block title="Sanitising televisions and monitors"><paragraph
    title="12.6.9.R.01."

    tags="Technical,Product Sanitisation,Product Security"


><![CDATA[<p>All types of video screens are capable of retaining classified information on the screen if appropriate mitigation measures are not taken during the lifetime of the screen. CRT monitors and plasma screens can be affected by burn-in whilst LCD screens can be affected by image persistence which can led to LED/OLED burn-in.</p>]]></paragraph>
<paragraph
    title="12.6.9.C.01."

    tags="Technical,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3572"
><![CDATA[<p>Agencies MUST attempt to sanitise video screens with minor burn-in or image persistence by displaying a solid white image on the screen for an extended period of time. If burn-in cannot be corrected the screen MUST be processed through an approved destruction facility.</p>]]></paragraph>
</block>
<block title="LCD/LED, plasma and non-CRT monitor types"><paragraph
    title="12.6.10.R.01."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


><![CDATA[<p>Current generations of monitors incorporate controllers to manage power up/power down, manage the display, operate any USB or other ports and manage the video data stream.&nbsp; The controller requires memory to operate and it incorporates some data storage capability and full write/read access to the display.&nbsp; It also retains settings and configuration.&nbsp; The underlying technology is often based on an FPGA and invariably requires some form of memory capability in order to operate.&nbsp; <br> <br> Researchers have demonstrated that images can be recovered by directly accessing the controller and associated memory or analysing the orientation of the liquid crystals.</p><p>In addition monitors can be compromised to actively monitor or covertly steal data and even manipulate what is displayed on the screen.&nbsp; Other attacks exploiting monitors have also been demonstrated.</p>]]></paragraph>
<paragraph
    title="12.6.10.R.02."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


><![CDATA[<p>Refer to <a title="Product Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a> and <a title="Media  &amp; IT Equipment Management, Decommissioning and Disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 – Media &amp; IT Equipment Management, Decommissioning and Disposa</a>l for additional guidance.</p>]]></paragraph>
<paragraph
    title="12.6.10.C.01."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="6997"
><![CDATA[<p>Because of the risks that data can be recovered from monitors, it is essential that any redeployment or disposal of monitors MUST follow the guidance in the NZISM.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="12.7. Supply Chain"><subsection title="Objective"><paragraph
    title="12.7.1."


><![CDATA[<p>Technology supply chains are established and managed to ensure continuity of supply and protection of sensitive related information.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="12.7.2."


><![CDATA[<p>The NZISM provides additional guidance for managing supply chain security risks associated with the acquisition (lease or purchase) of ICT equipment or services for use in NZ Government systems.</p>]]></paragraph>
</block>
<block title="Supply chain"><paragraph
    title="12.7.3."


><![CDATA[<p><span>A supply chain is the movement of materials as they move from their source (raw materials) through manufacture to the end customer. A supply chain can include materials acquisition, purchasing, design, manufacturing, warehousing, transportation, customer service, and supply chain management. It requires people, information and resources to move a product from manufacturer to supplier to customer. Every supply chain carries some risk which may include product protection; counterfeit products and goods and defective products. ICT supply chains are invariably global and complex.</span></p>]]></paragraph>
<paragraph
    title="12.7.4."


><![CDATA[<p>Relationships with external service providers are established in a variety of ways, for example, through joint ventures, business partnerships, outsourcing arrangements (e.g. through supply contracts, interagency agreements, lines of business arrangements, service-level agreements), licensing agreements, and/or supply chain exchanges. The growing use of external service providers and new relationships being established with those providers present new and difficult challenges for organisations, especially in the area of information system security. These challenges include:</p><ul>
<li>Defining the types of external information system services provided to organisations;</li>
<li>Describing how those external services are protected; and</li>
<li>Obtaining the necessary assurances that the risks to organisational operations and assets, individuals, other organisations, and national security arising from the use of the external services are acceptable.</li>
</ul>]]></paragraph>
</block>
<block title="Supply chain risk"><paragraph
    title="12.7.5."


><![CDATA[<p><span>The degree of confidence that the risk from using external services is at an acceptable level depends on the assurance external organisations provide and trust that organisations place in external service providers. In some cases, the level of trust is based on the amount of direct control organisations are able to exert on external service providers in the use of security controls and assurance on the effectiveness of those controls.</span></p>]]></paragraph>
<paragraph
    title="12.7.6."


><![CDATA[<p><span>The level of control is usually established by the terms and conditions of the contracts or service-level agreements with the external service providers and can range from extensive control (e.g., negotiating contracts or agreements that specify detailed security requirements for the providers) to very limited control (e.g., using contracts or service-level agreements to obtain commodity services such as commercial telecommunications services).</span></p>]]></paragraph>
<paragraph
    title="12.7.7."


><![CDATA[<p>From an Information Assurance viewpoint, there are five key aspects to supply chain risk:</p><ol>
<li>Protection of sensitive information and systems;</li>
<li>Continuity of supply;&nbsp;</li>
<li>Product assurance;</li>
<li>Security validation; and</li>
<li>National Procurement Policy</li>
</ol>]]></paragraph>
</block>
<block title="Protection of sensitive information and systems"><paragraph
    title="12.7.8."


><![CDATA[<p>This relates to the security of the supply chain, products and information relating to the intended use, purchaser, location and type of equipment.</p>]]></paragraph>
</block>
<block title="Continuity of supply"><paragraph
    title="12.7.9."


><![CDATA[<p>This is the traditional set of risks associated with supply chain. As supply chains have globalised and components are sourced from a number of countries, a disruption to supply may have a global effect.</p>]]></paragraph>
</block>
<block title="Product assurance"><paragraph
    title="12.7.10."


><![CDATA[<p>This relates to assurance that the product, technology or device performs as designed and specified and includes the provenance of the product, equipment, or device.</p>]]></paragraph>
</block>
<block title="Security validation"><paragraph
    title="12.7.11."


><![CDATA[<p>Security validation checks the performance and security of the equipment. The security design elements and features of the equipment or product will need to be separately considered from any operational drivers.</p>]]></paragraph>
</block>
<block title="National procurement policy"><paragraph
    title="12.7.12."


><![CDATA[<p>All agencies are required to follow the guidance of the Government Rules of Procurement. Some exemptions are permitted under Rule 13 including that of security, “essential security interests: Measures necessary for the protection of essential security interests, procurement indispensable for national security or for national defence…”. Care must be taken to follow these rules wherever possible.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="12.7.13."


><![CDATA[<p>While NOT an exhaustive list, further information on procurement and supply chain can be found at:</p><table class="table-main" style="width: 100%;">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Government Use of Offshore Information and Communication Technologies (ICT) Service Providers - Advice on Risk Management April 2009</strong></p>
</td>
<td style="text-align: center;">State Services Commission</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.otago.ac.nz/its/otago609912.pdf" target="_blank">1135964_1 (otago.ac.nz)</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>The new Government Rules of Sourcing</strong></td>
<td style="text-align: center;">Procurement.govt.NZ</td>
<td style="width: 33%;">
<p><a href="https://www.procurement.govt.nz/procurement/principles-charter-and-rules/government-procurement-rules/">​​</a><a rel="noopener noreferrer" href="https://www.procurement.govt.nz/assets/procurement-property/documents/government-procurement-rules.pdf" target="_blank">Government Procurement Rules - Rules for sustainable and inclusive procurement</a><a href="https://www.procurement.govt.nz/procurement/principles-charter-and-rules/government-procurement-rules/"></a></p>
<p><a rel="noopener noreferrer" href="https://www.procurement.govt.nz/procurement/principles-charter-and-rules/government-procurement-rules/" target="_blank">Government Procurement Rules | New Zealand Government Procurement and Property</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Government Rules of Sourcing - Rules for planning your procurement, approaching the market and contracting</strong></p>
</td>
<td style="text-align: center;">Ministry of Business Innovation and Employment</td>
<td style="width: 33%;"><a href="https://www.procurement.govt.nz/"></a><a href="https://www.procurement.govt.nz/procurement/">Procurement | New Zealand Government Procurement and Property</a><a rel="noopener noreferrer" href="https://www.procurement.govt.nz/" target="_blank"></a></td>
</tr>
<tr>
<td>
<p><strong>SP&nbsp;<strong>800-161</strong></strong></p>
</td>
<td>
<p><strong>Special Publication, Supply Chain Risk Management</strong></p>
</td>
<td style="text-align: center;">Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST)</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="http://csrc.nist.gov/publications/drafts/800-161/sp800_161_draft.pdf" target="_blank">http://csrc.nist.gov/publications/drafts/800-161/sp800_161_draft.pdf [PDF, 3.1 MB]</a></td>
</tr>
<tr>
<td><strong>SP&nbsp;<strong>800-53 Revision 4</strong></strong></td>
<td><strong>Special Publication, Security and Privacy Controls for Federal Information Systems and Organizations</strong></td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf" target="_blank">http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf [PDF, 5.1 MB]</a></td>
</tr>
<tr>
<td><strong><strong>NISTIR 7622</strong></strong></td>
<td><strong>Notional Supply Chain Risk Practices for Federal Information Systems&nbsp;</strong></td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7622.pdf" target="_blank">http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7622.pdf [PDF, 2.9 MB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Commercial Procurement &amp; Relationships&nbsp;</strong></p>
</td>
<td style="text-align: center;">UK Cabinet Office</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.gov.uk/government/organisations/cabinet-office" target="_blank">https://www.gov.uk/government/organisations/cabinet-office</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>CIO Council Government ICT Offshoring (International Sourcing) Guidance</strong></td>
<td style="text-align: center;">UK Cabinet Office</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.gov.uk/government/publications/government-ict-offshoring-international-sourcing-guidance" target="_blank">https://www.gov.uk/government/publications/government-ict-offshoring-international-sourcing-guidance</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Commonwealth Procurement Rules</strong></td>
<td style="text-align: center;">Department of Finance and deregulation (Financial Management Group)</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.finance.gov.au/government/procurement/commonwealth-procurement-rules" target="_blank">Commonwealth Procurement Rules | Department of Finance</a> <a rel="noopener noreferrer" href="https://www.gov.uk/government/publications/government-ict-offshoring-international-sourcing-guidance" target="_blank"></a></p>
<p><a rel="noopener noreferrer" href="https://www.finance.gov.au/sites/default/files/2022-06/CPRs%20-%201%20July%202022.pdf" target="_blank">https://www.finance.gov.au/sites/default/files/2022-06/CPRs 1 July 2022.pdf</a>&nbsp;</p>
</td>
</tr>
<tr>
<td class="table-main"><strong><strong>ISO 31000:2018</strong></strong></td>
<td class="table-main"><strong>Risk management – Guidelines</strong></td>
<td style="text-align: center;">
<p>ISO</p>
<p>&nbsp;</p>
</td>
<td style="width: 33%;"><a title="Risk Management - Guidelines" rel="noopener noreferrer" href="https://www.iso.org/standard/65694.html" target="_blank">https://www.iso.org/standard/65694.html</a><br>
<p>&nbsp;</p>
</td>
</tr>
<tr>
<td class="table-main"><strong><strong>HB 231:2004</strong></strong></td>
<td class="table-main"><strong>Information Security Risk Management Guidelines</strong></td>
<td style="text-align: center;">
<p>Standards NZ</p>
</td>
<td style="width: 33%;"><a title="Information Security Risk Management Guidelines" rel="noopener noreferrer" href="https://standards.govt.nz/shop/hb-2312004/" target="_blank">https://standards.govt.nz/shop/hb-2312004/</a></td>
</tr>
<tr>
<td class="table-main"><strong><strong>ISO Guide 73:2009</strong></strong></td>
<td class="table-main"><strong>Risk management - Vocabulary</strong></td>
<td style="text-align: center;">ISO&nbsp;
<p>&nbsp;</p>
</td>
<td style="width: 33%;"><a title="Risk Management - Vocabulary" rel="noopener noreferrer" href="https://www.iso.org/standard/44651.html" target="_blank">https://www.iso.org/standard/44651.html</a><br>
<p>&nbsp;</p>
</td>
</tr>
<tr>
<td class="table-main"><strong><strong>ISO/IEC 31010:2009</strong></strong></td>
<td class="table-main"><strong>Risk management - Risk assessment techniques</strong></td>
<td style="text-align: center;">ISO
<p>&nbsp;</p>
</td>
<td style="width: 33%;">
<p><a title="Risk Management - Risk Assessment techniques" rel="noopener noreferrer" href="https://www.iso.org/standard/51073.html" target="_blank">https://www.iso.org/standard/51073.html</a></p>
</td>
</tr>
<tr>
<td class="table-main"><strong><strong>ISO/IEC 27002:2022</strong></strong></td>
<td class="table-main">
<p class="no-uppercase"><strong>Information security, cybersecurity and privacy protection — Information security controls</strong></p>
</td>
<td style="text-align: center;">ISO/IEC
<p>&nbsp;</p>
</td>
<td style="width: 33%;">
<p><a title="ISO/IEC 27002:2022" rel="noopener noreferrer" href="https://www.iso.org/standard/75652.html" target="_blank">https://www.iso.org/standard/75652.html</a></p>
<p><a href="http://www.standards.co.nz"><br></a><a href="http://www.iso.org"></a></p>
</td>
</tr>
<tr>
<td class="table-main"><strong><strong>ISO/IEC 27005:2012</strong></strong></td>
<td class="table-main"><strong>Information technology - Security Techniques - Information Security Risk Management</strong></td>
<td style="text-align: center;">
<p class="product__standard-number">AS/NZS</p>
<p class="product__standard-number">ISO/IEC</p>
</td>
<td style="width: 33%;">
<p><a title="Information Technology - Security Techniques - Information Security Risk Management" rel="noopener noreferrer" href="https://standards.govt.nz/shop/asnzs-isoiec-270052012/" target="_blank">https://standards.govt.nz/shop/asnzs-isoiec-270052012/</a></p>
<p><a href="http://www.standards.co.nz"><br></a><a href="http://www.iso27001security.com/html/27002.html"></a></p>
</td>
</tr>
<tr>
<td class="table-main"><strong><strong>ISO 28000:2007&nbsp;</strong></strong></td>
<td class="table-main"><strong>Specification for security management systems for the supply chain</strong></td>
<td style="text-align: center;">ISO
<p>&nbsp;</p>
</td>
<td style="width: 33%;">
<p><a title="Specification for security management systems for the supply chain" rel="noopener noreferrer" href="https://www.iso.org/standard/44641.html" target="_blank">https://www.iso.org/standard/44641.html</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Risk Management"><paragraph
    title="12.7.14.R.01."

    tags="Technical,Product Security,Risk Management,Supply Chain"


><![CDATA[<p>ICT supply chains can introduce particular risks to an agency. In order to manage these risks, in addition to other identified ICT risks, supply chain risks are incorporated into an agency’s assessment of risk and the Security Risk Management Plan (SRMP). Identified risks are managed through the procurement process and through technical checks and controls (See <a title="SRMPs" href="http://nzism.gcsb.govt.nz/ism-document#Section-12761">Section 5.3 – Security Risk Management Plans</a> and <a title="System certification and accreditation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 – System Certification and Accreditation</a>).</p>]]></paragraph>
<paragraph
    title="12.7.14.C.01."

    tags="Technical,Product Security,Risk Management,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3634"
><![CDATA[<p>Agencies SHOULD incorporate the consideration of supply chain risks into an organisation-wide risk assessment and management process.</p>]]></paragraph>
<paragraph
    title="12.7.14.C.02."

    tags="Technical,Product Security,Risk Management,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3638"
><![CDATA[<p>Agencies SHOULD monitor supply chain risks on an ongoing basis and adjust mitigations and controls appropriately.</p>]]></paragraph>
<paragraph
    title="12.7.14.C.03."

    tags="Technical,Product Security,Risk Management,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3639"
><![CDATA[<p>Agencies SHOULD follow the Government Rules of Procurement.</p>]]></paragraph>
</block>
<block title="Contractor or Supplier Capability"><paragraph
    title="12.7.15.R.01."

    tags="Technical,Product Security,Supply Chain"


><![CDATA[<p>Agencies can assess the capability of a contractor and any subcontractors to meet their security of information, supply and product requirements.</p>]]></paragraph>
<paragraph
    title="12.7.15.C.01."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3644"
><![CDATA[<p>Agencies SHOULD require tenderers and contractors to provide information:</p><ul>
<li>identifying any restrictions on the disclosure, transfer or use of technology arising out of export controls or security arrangements; and</li>
<li>demonstrating that their supply chains comply with the security of supply requirements set out in the contract documents.</li>
</ul>]]></paragraph>
<paragraph
    title="12.7.15.C.02."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3646"
><![CDATA[<p>Agencies SHOULD request information from contractors and subcontractors to assess their ability to protect information.</p>]]></paragraph>
</block>
<block title="Security of Information"><paragraph
    title="12.7.16.R.01."

    tags="Technical,Product Security,Supply Chain"


><![CDATA[<p>After conducting a risk assessment, agencies and suppliers have the means and capability to protect classified information throughout the tendering and contracting process.</p>]]></paragraph>
<paragraph
    title="12.7.16.C.01."

    tags="Technical,Product Security,Supply Chain"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="3651"
><![CDATA[<p>Agencies MUST include contractual obligations on all contractors and subcontractors to safeguard information throughout the tendering and contracting procedure.</p>]]></paragraph>
<paragraph
    title="12.7.16.C.02."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3653"
><![CDATA[<p>Agencies SHOULD include contractual obligations to safeguard information throughout the tendering and contracting procedure.</p>]]></paragraph>
<paragraph
    title="12.7.16.C.03."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3654"
><![CDATA[<p>Agencies SHOULD reject contractors and subcontractors where they do not possess the necessary reliability to exclude risks to national security; or have breached obligations relating to security of information during a previous contract in circumstances amounting to grave misconduct.</p>]]></paragraph>
</block>
<block title="Continuity of Supply"><paragraph
    title="12.7.17.R.01."

    tags="Technical,Product Security,Supply Chain"


><![CDATA[<p>You can also require suppliers to provide commitments on the continuity of supply. These can include commitments from the supplier to ensure:</p><ul>
<li>delivery time;</li>
<li>stock levels;</li>
<li>visibility of the supply chain; and</li>
<li>supply chain resilience.</li>
</ul>]]></paragraph>
<paragraph
    title="12.7.17.C.01."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3658"
><![CDATA[<p>Agencies SHOULD ensure that changes in their supply chain during the performance of the contract will not adversely affect the continuity of supply requirements.</p>]]></paragraph>
</block>
<block title="Product Assurance"><paragraph
    title="12.7.18.R.01."

    tags="Technical,Product Security,Supply Chain,Assurance"


><![CDATA[<p>In addition to the product selection and acquisition guidance in this section, agencies are able to identify and mitigate risks through supply chain visibility, provenance, security validation and pre-installation tests and checks.</p>]]></paragraph>
<paragraph
    title="12.7.18.R.02."

    tags="Technical,Product Security,Supply Chain,Assurance"


><![CDATA[<p>Agencies, with the cooperation of their suppliers, should establish the provenance of any products and equipment. Provenance is defined as a record of the origin, history, specification changes and supply path of the products or equipment.</p>]]></paragraph>
<paragraph
    title="12.7.18.C.01."

    tags="Technical,Product Security,Supply Chain,Assurance"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3669"
><![CDATA[<p>Agencies MUST require suppliers and contractors to provide the provenance of any products or equipment.</p>]]></paragraph>
<paragraph
    title="12.7.18.C.02."

    tags="Technical,Product Security,Supply Chain,Assurance"


    classification="All Classifications"
    compliance="Should"
    cid="3674"
><![CDATA[<p>Agencies SHOULD require suppliers and contractors to provide the provenance of any products or equipment.</p>]]></paragraph>
</block>
<block title="Security validation"><paragraph
    title="12.7.19.R.01."

    tags="Technical,Product Security,Supply Chain"


><![CDATA[<p>Validation of the performance and security of the equipment is a vital part of the ongoing integrity and security of agency systems. The security design elements and features of the equipment or product will need to be separately considered from any operational drivers. Where compromises in security performance, capability or functionality are apparent, additional risk mitigation, controls and countermeasures may be necessary.</p>]]></paragraph>
<paragraph
    title="12.7.19.C.01."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3691"
><![CDATA[<p>Agencies SHOULD validate the security of the equipment against security performance, capability and functionality requirements.</p>]]></paragraph>
<paragraph
    title="12.7.19.C.02."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3693"
><![CDATA[<p>Where deficiencies in security performance, capability and functionality are identified, agencies SHOULD implement additional risk mitigation measures.</p>]]></paragraph>
</block>
<block title="Pre-Installation Tests and Checks "><paragraph
    title="12.7.20.R.01."

    tags="Technical,Product Security,Supply Chain"


><![CDATA[<p>An essential part of quality and security assurance is the delivery inspection, pre-installation and functional testing of any equipment. In particular, large systems that integrate equipment from different suppliers or that have specialised configuration and operational characteristics may require additional testing to provide assurance that large scale disruptions and security compromises are avoided.</p>]]></paragraph>
<paragraph
    title="12.7.20.C.01."

    tags="Technical,Product Security,Supply Chain"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="3698"
><![CDATA[<p>Agencies MUST consult with the GCSB on pre-installation, security verification and related tests before the equipment is used in an operational system.</p>]]></paragraph>
<paragraph
    title="12.7.20.C.02."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3700"
><![CDATA[<p>Agencies SHOULD inspect equipment on receipt for any obvious signs of tampering, relabelling or damage.</p>]]></paragraph>
<paragraph
    title="12.7.20.C.03."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3701"
><![CDATA[<p>Agencies SHOULD inspect equipment on receipt and test the operation before installation.</p>]]></paragraph>
<paragraph
    title="12.7.20.C.04."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3703"
><![CDATA[<p>Agencies SHOULD conduct installation verification and related tests before the equipment is used in an operational system.</p>]]></paragraph>
<paragraph
    title="12.7.20.C.05."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3704"
><![CDATA[<p>Where any software, firmware or other forms of programme code are required for the initialisation, operation, servicing or maintenance of the equipment, malware checks SHOULD be conducted before the equipment is installed in an operational system.</p>]]></paragraph>
</block>
<block title="Equipment Servicing"><paragraph
    title="12.7.21.R.01."

    tags="Technical,Product Security,Supply Chain"


><![CDATA[<p>Some larger or complex systems can have dependencies on particular infrastructures, equipment, software or configurations. Although these types of systems can be less flexible in responding to the rapid changes in technologies, the risks are outweighed by the functionality of the system. In such cases, the continuing support and maintenance of essential components is vital.</p>]]></paragraph>
<paragraph
    title="12.7.21.C.01."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3709"
><![CDATA[<p>For equipment that is expected to have an extended operational life in a critical system, and in the event that the supplier is no longer able to supply these, agencies SHOULD provide for the acquisition of:</p><ul>
<li>necessary licences;</li>
<li>information to produce spare parts, components, assemblies;</li>
<li>testing equipment; and</li>
<li>technical assistance agreements.</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="13. Media and IT Equipment Management, Decommissioning and Disposal"><section title="13.1. System Decommissioning"><subsection title="Objective"><paragraph
    title="13.1.1."


><![CDATA[<p>To ensure systems are safely decommissioned and that software, system logic and data are properly transitioned to new systems or archived in accordance with agency, legal and statutory requirements.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="13.1.2."


><![CDATA[<p>This section discusses the retirement and safe decommissioning of systems. Specific requirements on media handling, usage, sanitisation, destruction and disposal are discussed later in this chapter. System decommissioning is the retirement or termination of a system and its operations. System decommissioning does NOT deal with the theft or loss of equipment.</p>]]></paragraph>
</block>
<block title="Definitions"><paragraph
    title="13.1.3."


><![CDATA[<p>A system decommissioning will have one or more of the following characteristics:</p><ul>
<li>Ending a capability completely i.e. no migration, redevelopment or new version of a capability occurs;</li>
<li>Combining parts of existing capabilities services into a new, different system;</li>
<li>As part of wider redesign, where a capability is no longer provided and is decommissioned or merged with other capabilities or systems.</li>
</ul>]]></paragraph>
<paragraph
    title="13.1.4."


><![CDATA[<p>ICT requirements evolve as business needs change and technology advances. In some cases this will lead to the retirement and decommissioning of obsolete systems or systems surplus to requirements.</p>]]></paragraph>
<paragraph
    title="13.1.5."


><![CDATA[<p>Security requires a structured approach to decommissioning in order to cease information system operations in a planned, orderly and secure manner. It is also important that the approach for decommissioning systems is consistent and coordinated. Sanitisation is important to eliminate any remnant data that could be retrieved by unauthorised parties. These procedures include the following:</p><ul>
<li>A migration plan;</li>
<li>A decommissioning plan;</li>
<li>Archiving;</li>
<li>Safe disposal of equipment and media;</li>
<li>Robust procedures to manage any residual data and associated risk; and</li>
<li>Audit and final signoff.</li>
</ul>]]></paragraph>
<paragraph
    title="13.1.6."


><![CDATA[<p>As a final step, a review of the decommissioning should be undertaken to ensure no important elements, data or equipment have been overlooked.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="13.1.7."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Reference&nbsp;</strong></p>
</td>
<td>
<p><strong>Title</strong></p>
</td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Risk Management And Accreditation Of Information Systems Also Released As HMG Infosec Standard No. 2, August 2005</strong></p>
</td>
<td>
<p>UK Centre for the Protection of National Infrastructure (CPNI)</p>
</td>
<td>http://www.cpni.gov.uk/Documents/Publications/2005/2005003-Risk_management.pdf</td>
</tr>
<tr>
<td>
<p><strong>SP&nbsp;<strong>800-88</strong></strong></p>
</td>
<td>
<p><strong>NIST Special Publication 800-88 Guidelines for Media Sanitization, Rev.1, December, 2014</strong></p>
</td>
<td>
<p>National Institute of Standards and Technology (NIST), U.S. Department of Commerce</p>
</td>
<td><a rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf [PDF, 532 KB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Better Practice Checklist – Decommissioning Government Websites, March 2011</strong></p>
</td>
<td>
<p>Australian Government Information Management Office (AGIMO)</p>
</td>
<td><a rel="noopener noreferrer" href="http://agict.gov.au/policy-guides-procurement/better-practice-checklists-guidance/bpc-decommissioning" target="_blank">http://agict.gov.au/policy-guides-procurement/better-practice-checklists-guidance/bpc-decommissioning</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="13.1.8."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 107.465%; height: 220.694px;">
<tbody>
<tr style="height: 58px;">
<td style="width: 17.2375%; height: 58px;"><strong>Reference</strong></td>
<td style="width: 15.0889%; height: 58px;"><strong>Title</strong></td>
<td style="width: 66.1834%; height: 58px;"><strong>Source</strong></td>
</tr>
<tr style="height: 162.694px;">
<td style="width: 17.2375%; height: 162.694px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 15.0889%; height: 162.694px;">GOV3, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td style="width: 66.1834%; height: 162.694px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Agency Policy"><paragraph
    title="13.1.9.R.01."

    tags="Governance,Information Security Documentation,Disposal,Media Management,System Decomissioning"


><![CDATA[<p>Information systems are often supported by service and supply contracts and may also be subject to obligations to provide a service, capability or information. Decommissioning of a system will require the termination of these contracts and service obligations. Other aspects of system decommission may be subject to security, regulatory or legislative requirements. An Agency policy will provide a comprehensive approach to system decommissioning from the inception of a system, thus facilitating the termination of supply contracts and service obligations while managing any risks to the Agency.</p>]]></paragraph>
<paragraph
    title="13.1.9.C.01."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3829"
><![CDATA[<p>When the Information System reaches the end of its service life in an organisation, policy and procedures SHOULD be in place to ensure secure decommissioning and transfer or disposal, in order to satisfy corporate, legal and statutory requirements.</p>]]></paragraph>
</block>
<block title="Migration plan"><paragraph
    title="13.1.10.R.01."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


><![CDATA[<p>Once the decision to decommission a system has been taken, it is important to migrate processes, data, users and licences to replacement systems or to cease activities in an orderly fashion. It is also important to carefully plan the decommissioning process in order to avoid disruption to other systems, ensure business continuity, ensure security, protect privacy and meet any archive and other regulatory and legislative requirements. The basis of a decommissioning plan is a risk assessment.</p>]]></paragraph>
<paragraph
    title="13.1.10.C.01."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3832"
><![CDATA[<p>Agencies SHOULD undertake a risk assessment with consideration given to proportionality in respect of:</p><ul>
<li>scale and impact of the processes;</li>
<li>data;</li>
<li>users;</li>
<li>licences;</li>
<li>usage agreements; and</li>
<li>service to be migrated or decommissioned.</li>
</ul>]]></paragraph>
<paragraph
    title="13.1.10.C.02."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3833"
><![CDATA[<p>The risk assessment SHOULD include the following elements:</p><ul>
<li>Evaluation of the applications inventory and identification of any redundancies;</li>
<li>Identification of data owners and key stakeholders;</li>
<li>Identification of types of information (Active or Inactive) processed and stored;</li>
<li>Identification of software and other (including non-transferable) licences;</li>
<li>Identification of access rights to be transferred or cancelled;</li>
<li>Identification of any emanation control equipment or security enhancements;</li>
<li>Consideration of short and long term reporting requirements;</li>
<li>Assessment of equipment and hardware for redeployment or disposal;</li>
<li>Identification of any cloud-based data and services; and</li>
<li>User re-training.</li>
</ul>]]></paragraph>
<paragraph
    title="13.1.10.C.03."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3834"
><![CDATA[<p>Agencies SHOULD consider the need for a Privacy Impact Assessment.</p>]]></paragraph>
<paragraph
    title="13.1.10.C.04."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3835"
><![CDATA[<p>Agencies SHOULD identify relevant service and legal agreements and arrange for their termination.</p>]]></paragraph>
</block>
<block title="Decommissioning plan"><paragraph
    title="13.1.11.R.01."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


><![CDATA[<p>The decommissioning of a system can be a complex process. A decommissioning plan is an important tool in properly managing the safe decommissioning of a system and in providing reasonable assurance that due process and agency policy has been followed.</p>]]></paragraph>
<paragraph
    title="13.1.11.C.01."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3838"
><![CDATA[<p>The decommissioning plan will be based on the migration plan and SHOULD incorporate the following elements:</p><ul>
<li>An impact analysis;</li>
<li>Issue of notification to service providers, users and customers;</li>
<li>Issue of notification of decommissioning to all relevant interfaces and interconnections;</li>
<li>Timeframe, plan and schedule;</li>
<li>Data integrity and validation checks before archiving;</li>
<li>Transfer or redeployment of equipment and other assets;</li>
<li>Transfer or cancellation of licences;</li>
<li>Removal of redundant equipment and software;</li>
<li>Removal of redundant cables and termination equipment;</li>
<li>Removal of any emanation control equipment or security enhancements;</li>
<li>Return or safe disposal of any emanation control equipment or security enhancements;</li>
<li>Updates to systems configurations (switches, firewalls etc.);</li>
<li>Equipment and media sanitisation including any cloud-based data &amp; services(discussed later in this chapter);</li>
<li>Equipment and media disposal (discussed later in this chapter);</li>
<li>Any legal considerations for supply or service contract terminations;</li>
<li>Asset register updates; and</li>
<li>Retraining for, or redeployment of, support staff.</li>
</ul>]]></paragraph>
</block>
<block title="Archiving"><paragraph
    title="13.1.12.R.01."

    tags="Governance,Media Management,System Decomissioning"


><![CDATA[<p>Availability and integrity requirements in respect of information may persist for legal and other statutory or compliance reasons and require transfer to other ownership or custodianship for archive purposes. This will also require assurance that the data can continue to be accessed when required (availability) and assurance that it remains unchanged (integrity).</p>]]></paragraph>
<paragraph
    title="13.1.12.R.02."

    tags="Governance,Media Management,System Decomissioning"


><![CDATA[<p>Confidentiality requirements must also be considered. If an information system has been processing sensitive information or contains sensitive security components, which attract special handling requirements, it will require robust purging and overwrites or destruction. There are a number of methods and proprietary products available for such purposes.</p>]]></paragraph>
<paragraph
    title="13.1.12.C.01."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3842"
><![CDATA[<p>Agencies SHOULD identify data retention policies, regulation and legislation.</p>]]></paragraph>
<paragraph
    title="13.1.12.C.02."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3844"
><![CDATA[<p>Agencies SHOULD ensure adequate system documentation is archived.</p>]]></paragraph>
<paragraph
    title="13.1.12.C.03."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3845"
><![CDATA[<p>Agencies SHOULD archive essential software, system logic, system documentation and other system data to allow information to be recovered from archive.</p>]]></paragraph>
</block>
<block title="Audit and Final signoff"><paragraph
    title="13.1.13.R.01."

    tags="Governance,Media Management,System Decomissioning"


><![CDATA[<p>Update the organisation’s tracking and management systems to identify the specific information system components that are being removed from the inventory. To comply with governance, asset management and audit requirements, the Agency’s Accreditation Authority will certify that appropriate processes have been followed. This demonstrates good governance and avoids privacy breaches.</p>]]></paragraph>
<paragraph
    title="13.1.13.C.01."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3850"
><![CDATA[<p>The Agency’s Accreditation Authority SHOULD confirm IA compliance on decommissioning and disposal.</p>]]></paragraph>
<paragraph
    title="13.1.13.C.02."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3852"
><![CDATA[<p>The Agency’s Accreditation Authority SHOULD confirm secure equipment and media disposal.</p>]]></paragraph>
<paragraph
    title="13.1.13.C.03."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3853"
><![CDATA[<p>The Agency’s Accreditation Authority SHOULD confirm asset register updates.</p>]]></paragraph>
<paragraph
    title="13.1.13.C.04."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3855"
><![CDATA[<p>Once all security relevant activities associated with decommissioning and disposal have been completed and verified, a Security Decommissioning Compliance Certificate SHOULD be issued by the Agency’s Accreditation Authority.</p>]]></paragraph>
</block>
<block title="Final Review"><paragraph
    title="13.1.14.R.01."

    tags="Governance,Media Management,System Decomissioning"


><![CDATA[<p>As a final step, a review of the decommissioning should be undertaken to ensure no important elements, data, equipment, contractual or legislative, obligations have been overlooked.</p>]]></paragraph>
<paragraph
    title="13.1.14.C.01."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3862"
><![CDATA[<p>Agencies SHOULD undertake a post-decommissioning review.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="13.2. Media Handling"><subsection title="Objective"><paragraph
    title="13.2.1."


><![CDATA[<p>Media is properly classified, labelled and registered in order to clearly indicate the required handling instructions and degree of protection to be applied.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="13.2.2."


><![CDATA[<p>This section covers information relating to classifying, labelling and registering media. Information relating to classifying and labelling IT equipment can be found in <a title="Product classifying and labelling" href="http://nzism.gcsb.govt.nz/ism-document#Section-14507">Section 12.3 - Product Classifying and Labelling</a>.</p>]]></paragraph>
</block>
<block title="Exceptions for labelling and registering media"><paragraph
    title="13.2.3."


><![CDATA[<p>Labels are not needed for internally mounted fixed media if the IT equipment containing the media is labelled. Likewise fixed media does not need to be registered if the IT equipment containing the media is registered.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="13.2.4."


><![CDATA[<p>Additional information relating to media handling is contained in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong><strong>ISO/IEC 27001:2013</strong></strong></p>
</td>
<td>
<p><strong>&nbsp;10.7, Media Handling</strong></p>
</td>
<td>
<p style="text-align: center;">ISO</p>
</td>
<td>
<p><a title="Information technology — Security techniques — Information security management systems — Requirements - 10.7 Media Handling" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></p>
<p><a rel="noopener noreferrer" href="https://www.standards.govt.nz/" target="_blank">&nbsp;</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="13.2.5."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 100%; height: 241.487px;">
<tbody>
<tr style="height: 61.4306px;">
<td style="width: 18.7326%; height: 61.4306px;"><strong>Reference</strong></td>
<td style="width: 17.0703%; height: 61.4306px;"><strong>Title</strong></td>
<td style="width: 62.5998%; height: 61.4306px;"><strong>Source</strong></td>
</tr>
<tr style="height: 180.056px;">
<td style="width: 18.7326%; height: 180.056px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 17.0703%; height: 180.056px;">GOV3, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td style="width: 62.5998%; height: 180.056px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Reclassification and declassification procedures"><paragraph
    title="13.2.6.R.01."

    tags="Governance,Classifying Media,Media Handling,Media Management"


><![CDATA[<p>When reclassifying or declassifying media the process is based on an assessment of risk, including:</p><ul>
<li>the classification of the media and associated handling instructions;</li>
<li>the effectiveness of any sanitisation or destruction procedure used; </li>
<li>the planned redeployment; and</li>
<li>the intended destination of the media.</li>
</ul>]]></paragraph>
<paragraph
    title="13.2.6.C.01."

    tags="Governance,Classifying Media,Media Handling,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="3896"
><![CDATA[<p>Agencies MUST document procedures for the reclassification and declassification of media.</p>]]></paragraph>
</block>
<block title="Classifying media storing information"><paragraph
    title="13.2.7.R.01."

    tags="Governance,Classifying Media,Media Handling,Media Management"


><![CDATA[<p>Media that is not classified or not correctly classified may be stored, identified and handled inappropriately.</p>]]></paragraph>
<paragraph
    title="13.2.7.R.02."

    tags="Governance,Classifying Media,Media Handling,Media Management"


><![CDATA[<p>Incorrect or no classification may result in access by a person or persons without the appropriate security clearance.</p>]]></paragraph>
<paragraph
    title="13.2.7.C.01."

    tags="Governance,Classifying Media,Media Handling,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="3904"
><![CDATA[<p>Agencies MUST classify media to the highest classification of data stored on the media.</p>]]></paragraph>
</block>
<block title="Classifying media connected to systems of higher classifications"><paragraph
    title="13.2.8.R.01."

    tags="Governance,Classifying Media,Media Handling,Media Management"


><![CDATA[<p>Unless connected through a data diode or similar infrastructure, there is no guarantee that classified information was not copied to the media while it was connected to a system of higher classification than the classification level of the media itself.</p>]]></paragraph>
<paragraph
    title="13.2.8.C.01."

    tags="Governance,Classifying Media,Media Handling,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="3910"
><![CDATA[<p>Agencies MUST classify any media connected to a system of a higher classification at the higher system classification until confirmed not to be the case.</p>]]></paragraph>
</block>
<block title="Classifying media below that of the system"><paragraph
    title="13.2.9.R.01."

    tags="Governance,Classifying Media,Media Handling,Media Management"


><![CDATA[<p>When sufficient assurance exists that information cannot be written to media that is used with a system, then the media can be treated in accordance with the handling instructions of the classification of the information it stores rather than the classification of the system it is connected to or used with.</p>]]></paragraph>
<paragraph
    title="13.2.9.C.01."

    tags="Governance,Classifying Media,Media Handling,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="3915"
><![CDATA[<p>Agencies intending to classify media below the classification of the system to which it is connected to MUST ensure that:</p><ul>
<li>the media is read-only;</li>
<li>the media is inserted into a read-only device; or</li>
<li>the system has a mechanism through which read-only access can be assured such as approved data diodes, write-blockers or similar infrastructure.</li>
</ul>]]></paragraph>
</block>
<block title="Reclassifying media to a lower classification"><paragraph
    title="13.2.10.R.01."

    tags="Governance,Classifying Media,Media Handling,Media Management"


><![CDATA[<p>Agencies must follow the reclassification process as illustrated in Section 13.6 – Media Disposal.</p>]]></paragraph>
<paragraph
    title="13.2.10.C.01."

    tags="Governance,Classifying Media,Media Handling,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="3922"
><![CDATA[<p>Agencies wishing to reclassify media to a lower classification MUST ensure that:</p><ul>
<li>a formal decision is made to reclassify, or redeploy the media; and</li>
<li>the reclassification of all information on the media has been approved by the originator, or the media has been appropriately sanitised or destroyed.</li>
</ul>]]></paragraph>
</block>
<block title="Reclassifying media to a higher classification"><paragraph
    title="13.2.11.R.01."

    tags="Governance,Classifying Media,Media Handling,Media Management"


><![CDATA[<p>The media will always need to be protected in accordance with the classification of the information it stores. As such, if the classification of the information on the media changes, then so will the classification of the media.</p>]]></paragraph>
<paragraph
    title="13.2.11.C.01."

    tags="Governance,Classifying Media,Media Handling,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="3979"
><![CDATA[<p>Agencies MUST reclassify media if:</p><ul>
<li>information copied onto the media is of a higher classification; or</li>
<li>information contained on the media is subjected to a classification upgrade.</li>
</ul>]]></paragraph>
</block>
<block title="Labelling media"><paragraph
    title="13.2.12.R.01."

    tags="Governance,Media Handling,Media Management"


><![CDATA[<p>Labelling helps all personnel to identify the classification of media and ensure that they afford the media the correct protection measures.</p>]]></paragraph>
<paragraph
    title="13.2.12.C.01."

    tags="Governance,Media Handling,Media Management"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="3982"
><![CDATA[<p>Agencies MUST label media with a marking that indicates the maximum classification and any endorsements applicable to the information stored.</p>]]></paragraph>
<paragraph
    title="13.2.12.C.02."

    tags="Governance,Media Handling,Media Management"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3983"
><![CDATA[<p>Agencies MUST ensure that the classification of all media is easily visually identifiable.</p>]]></paragraph>
<paragraph
    title="13.2.12.C.03."

    tags="Governance,Media Handling,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="3984"
><![CDATA[<p>When using non-textual (colour, symbol) protective markings for operational security reasons, agencies MUST document the labelling scheme and train personnel appropriately.</p>]]></paragraph>
<paragraph
    title="13.2.12.C.04."

    tags="Governance,Media Handling,Media Management"


    classification="All Classifications"
    compliance="Should"
    cid="3985"
><![CDATA[<p>Agencies SHOULD label media with a marking that indicates the maximum classification and any endorsements applicable to the information stored.</p>]]></paragraph>
</block>
<block title="Labelling sanitised media"><paragraph
    title="13.2.13.R.01."

    tags="Governance,Media Handling,Media Management,Media Sanitisation"


><![CDATA[<p>It is not possible to effectively sanitise and subsequently reclassify SECRET or TOP SECRET non-volatile media to a classification lower than SECRET. Media of other classifications may be reclassified (See Section 13.6 – Media Disposal).</p>]]></paragraph>
<paragraph
    title="13.2.13.C.01."

    tags="Governance,Media Handling,Media Management,Media Sanitisation"


    classification="Secret, Top Secret"
    compliance="Must"
    cid="3988"
><![CDATA[<p>Agencies MUST label non-volatile media that has been sanitised and reclassified for redeployment with a notice similar to:</p><p>Warning: media has been sanitised and reclassified from [classification] to [classification]. Further lowering of classification only via destruction.</p>]]></paragraph>
</block>
<block title="Registering media"><paragraph
    title="13.2.14.R.01."

    tags="Governance,Media Handling,Media Management"


><![CDATA[<p>If agencies fail to register media with an appropriate identifier they will not be able to effectively keep track of their classified media and there will be a greater likelihood of unauthorised disclosure of classified information.</p>]]></paragraph>
<paragraph
    title="13.2.14.C.01."

    tags="Governance,Media Handling,Media Management"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="3991"
><![CDATA[<p>Agencies MUST register all media with a unique identifier in an appropriate register.</p>]]></paragraph>
<paragraph
    title="13.2.14.C.02."

    tags="Governance,Media Handling,Media Management"


    classification="All Classifications"
    compliance="Should"
    cid="3992"
><![CDATA[<p>Agencies SHOULD register all media with a unique identifier in an appropriate register.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="13.3. Media Usage"><subsection title="Objective"><paragraph
    title="13.3.1."


><![CDATA[<p>Media is used with systems in a controlled and accountable manner.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="13.3.2."


><![CDATA[<p>This section covers information on using media with systems. Further information on using media to transfer data between systems can be found in <a title="Data transfers" href="http://nzism.gcsb.govt.nz/ism-document#Section-16836">Section 20.1 - Data Transfers</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="13.3.3."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 100%; height: 229.514px;">
<tbody>
<tr style="height: 73.0556px;">
<td style="width: 19.2976%; height: 73.0556px;"><strong>Reference</strong></td>
<td style="width: 17.2114%; height: 73.0556px;"><strong>Title</strong></td>
<td style="width: 63.4562%; height: 73.0556px;"><strong>Source</strong></td>
</tr>
<tr style="height: 156.458px;">
<td style="width: 19.2976%; height: 156.458px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 17.2114%; height: 156.458px;">
<p>GOV3, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</p>
</td>
<td style="width: 63.4562%; height: 156.458px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a>&nbsp;&nbsp;&nbsp;</p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Using media with systems"><paragraph
    title="13.3.4.R.01."

    tags="Technical,Media Management"


><![CDATA[<p>To prevent classified data spills agencies will need to prevent classified media from being connected to, or used with, systems of a lesser classification than the protective marking of the media.</p>]]></paragraph>
<paragraph
    title="13.3.4.R.02."

    tags="Technical,Media Management"


><![CDATA[<p>Where media is used for backup purposes, the media will be certified for use at the highest level of classification to be backed-up. Refer also to <a title="Business Continuity and Disaster Recovery" href="http://nzism.gcsb.govt.nz/ism-document#Section-13074">Section 6.4 – Business Continuity and Disaster Recovery</a>.</p>]]></paragraph>
<paragraph
    title="13.3.4.C.01."

    tags="Technical,Media Management"


    classification="Confidential, Top Secret, Secret"
    compliance="Must Not"
    cid="4075"
><![CDATA[<p>Agencies MUST NOT use media containing classified information with a system that has a classification lower than the classification of the media.</p>]]></paragraph>
</block>
<block title="Storage of media"><paragraph
    title="13.3.5.R.01."

    tags="Technical,Media Management"


><![CDATA[<p>The security requirements for storage and physical transfer of classified information and IT equipment are specified in the <a title="PSR Physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR Policy Framework - Physical Security.</a></p>]]></paragraph>
<paragraph
    title="13.3.5.C.01."

    tags="Technical,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4078"
><![CDATA[<p>Agencies MUST ensure that storage facilities for media containing classified information meets the minimum physical security storage requirements as specified in the <a title="PSR Physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR Policy Framework - Physical Security</a>.</p>]]></paragraph>
</block>
<block title="Connecting media to systems"><paragraph
    title="13.3.6.R.01."

    tags="Technical,Media Management"


><![CDATA[<p>Some operating systems provide functionality to automatically execute or read certain types of programs that reside on optical media and flash memory media when connected. While this functionality was designed with a legitimate purpose in mind, such as automatically loading a graphical user interface for the system user to browse the contents of the media, or to install software residing on the media, it can also be used for malicious purposes.</p>]]></paragraph>
<paragraph
    title="13.3.6.R.02."

    tags="Technical,Media Management"


><![CDATA[<p>An attacker can create a file on optical media or a connectable device that the operating system will attempt to automatically execute.  When the operating system executes the file, it can have the same effect as when a system user explicitly executes malicious code.  The operating system executes the file without asking the system user for permission.</p>]]></paragraph>
<paragraph
    title="13.3.6.R.03."

    tags="Technical,Media Management"


><![CDATA[<p>Some operating systems will cache information on media to improve performance. As such, inserting media of a higher classification into a system of a lower classification could cause data to be read and saved from the device without user intervention.</p>]]></paragraph>
<paragraph
    title="13.3.6.R.04."

    tags="Technical,Media Management"


><![CDATA[<p>Using device access control software will prevent unauthorised media from being attached to a system. Using an allow listing approach gives security personnel greater control over what can, and what cannot, be connected to the system.</p>]]></paragraph>
<paragraph
    title="13.3.6.C.01."

    tags="Technical,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4086"
><![CDATA[<p>Agencies MUST disable any automatic execution features within operating systems for connectable devices and media.</p>]]></paragraph>
<paragraph
    title="13.3.6.C.02."

    tags="Technical,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4089"
><![CDATA[<p>Agencies MUST prevent unauthorised media from connecting to a system via the use of:</p><ul>
<li>device access control software;</li>
<li>seals;</li>
<li>physical means; or </li>
<li>other methods approved by the Accreditation Authority.</li>
</ul>]]></paragraph>
<paragraph
    title="13.3.6.C.03."

    tags="Technical,Media Management"


    classification="All Classifications"
    compliance="Should"
    cid="4091"
><![CDATA[<p>When writable media is connected to a writable communications port or device, agencies SHOULD implement controls to prevent the unintended writing of data to the media.</p>]]></paragraph>
</block>
<block title="IEEE 1394 (FIREWIRE) interface connections"><paragraph
    title="13.3.7.R.01."

    tags="Technical,FireWire,Media Management"


><![CDATA[<p>Known vulnerabilities have been demonstrated where attackers can connect a FireWire capable device to a locked workstation and modify information in RAM to gain access to encryption keys. Furthermore, as FireWire provides direct access to the system memory, an attacker can read or write directly to memory.</p>]]></paragraph>
<paragraph
    title="13.3.7.R.02."

    tags="Technical,FireWire,Media Management"


><![CDATA[<p>The best defence against this vulnerability is to disable access to FireWire ports using either software controls or physically disabling the FireWire ports so that devices cannot be connected. Alternatively select equipment without FireWire capability.</p>]]></paragraph>
<paragraph
    title="13.3.7.C.01."

    tags="Technical,FireWire,Media Management"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="4096"
><![CDATA[<p>Agencies MUST disable IEEE 1394 interfaces.</p>]]></paragraph>
<paragraph
    title="13.3.7.C.02."

    tags="Technical,FireWire,Media Management"


    classification="All Classifications"
    compliance="Should"
    cid="4097"
><![CDATA[<p>Agencies SHOULD disable IEEE 1394 interfaces.</p>]]></paragraph>
</block>
<block title="Transferring media"><paragraph
    title="13.3.8.R.01."

    tags="Technical,Media Management"


><![CDATA[<p>As media is often transferred through areas not certified to process the level of classified information on the media, additional protection mechanisms need to be implemented.</p>]]></paragraph>
<paragraph
    title="13.3.8.R.02."

    tags="Technical,Media Management"


><![CDATA[<p>Applying encryption to media may reduce the requirements for storage and physical transfer as outlined in the <a title="PSR Physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>. The reduction of any requirements is based on the original classification of information residing on the media and the level of assurance in the cryptographic product being used to encrypt the media.</p>]]></paragraph>
<paragraph
    title="13.3.8.R.03."

    tags="Technical,Media Management"


><![CDATA[<p>Further information on reducing storage and physical transfer requirements can be found in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15746">Section 17.1 - Cryptographic Fundamentals</a>.</p>]]></paragraph>
<paragraph
    title="13.3.8.C.01."

    tags="Technical,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4102"
><![CDATA[<p>Agencies MUST ensure that processes for transferring media containing classified information meets the minimum physical transfer requirements as specified in the <a title="PSR physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>.</p>]]></paragraph>
<paragraph
    title="13.3.8.C.02."

    tags="Encryption,Technical,Media Management"


    classification="All Classifications"
    compliance="Should"
    cid="4103"
><![CDATA[<p>Agencies SHOULD encrypt data stored on media with at least an Approved Cryptographic Algorithm (<a title="Approved cryptographic algorithms" href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">See Section 17.2 – Approved Cryptographic Algorithms</a>) if it is to be transferred to another area or location.</p>]]></paragraph>
</block>
<block title="Using media for data transfers"><paragraph
    title="13.3.9.R.01."

    tags="Technical,Data Transfers,Media Management"


><![CDATA[<p>Agencies transferring data between systems of different security domains or classifications are strongly encouraged to use media such as write-once CDs and DVDs. This will limit opportunity for information from the higher classified systems to be accidently transferred to lower classified systems. This procedure will also make each transfer a single, auditable event.</p>]]></paragraph>
<paragraph
    title="13.3.9.C.01."

    tags="Technical,Data Transfers,Media Management"


    classification="All Classifications"
    compliance="Should"
    cid="4111"
><![CDATA[<p>Data transfers between systems of different classification SHOULD be logged in an auditable log or register.</p>]]></paragraph>
<paragraph
    title="13.3.9.C.02."

    tags="Technical,Data Transfers,Media Management"


    classification="All Classifications"
    compliance="Should Not"
    cid="4114"
><![CDATA[<p>Agencies transferring data manually between two systems of different security domains or classifications SHOULD NOT use rewriteable media.</p>]]></paragraph>
</block>
<block title="Media in secure areas"><paragraph
    title="13.3.10.R.01."

    tags="Technical,Media Management,Secure Area"


><![CDATA[<p>Certain types of media including USB, FireWire and eSATA capable devices MUST be disabled or explicitly approved as an exception by the Accreditation Authority for a TOP SECRET environment (the GCSB). This provides an additional level of system user awareness and security.</p>]]></paragraph>
<paragraph
    title="13.3.10.R.02."

    tags="Technical,Media Management,Secure Area"


><![CDATA[<p>This practice should be used in addition to device access control software on workstations in case system users are unaware of, or choose to ignore, security requirements for media.</p>]]></paragraph>
<paragraph
    title="13.3.10.C.01."

    tags="Technical,Media Management,Secure Area"


    classification="Top Secret"
    compliance="Must Not"
    cid="4121"
><![CDATA[<p>Agencies MUST NOT permit any media that uses external interface connections within a TOP SECRET area without prior written approval from the Accreditation Authority.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="13.4. Media and IT Equipment Sanitisation"><subsection title="Objective"><paragraph
    title="13.4.1."


><![CDATA[<p>Media and IT Equipment that is to be redeployed or is no longer required is sanitised.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="13.4.2."


><![CDATA[<p>This section covers information relating to sanitising media and IT Equipment. Further information relating to sanitising IT equipment can be found in <a title="Product sanitisation and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Section-14585">Section 12.6 - Product Sanitisation and Disposal</a>.</p>]]></paragraph>
</block>
<block title="Definition"><paragraph
    title="13.4.3."


><![CDATA[<p>Sanitisation is defined as the process of removal of data and information from the storage device such that data recovery using any known technique or analysis is prevented or made unfeasible. The process includes the removal of all useful data from the storage device, including metadata, as well as the removal of all labels, markings, classifications and activity logs. Methods vary depending upon the nature, technology used and construction of the storage device or equipment and may include degaussing, incineration, shredding, grinding, knurling or embossing and chemical immersion.</p>]]></paragraph>
</block>
<block title="Sanitising media and IT Equipment "><paragraph
    title="13.4.4."


><![CDATA[<p>The process of sanitisation does not automatically change the classification of the media or IT Equipment, nor does sanitisation necessarily involve the destruction of media or IT Equipment.</p>]]></paragraph>
</block>
<block title="Product selection"><paragraph
    title="13.4.5."


><![CDATA[<p>Agencies are permitted to use non-evaluated products to sanitise media and IT Equipment. However, the product will still need to meet the specifications and achieve the requirements for sanitising media and IT Equipment as outlined in this section.</p>]]></paragraph>
</block>
<block title="Hybrid hard drives, Solid State Drives and Flash Memory Devices"><paragraph
    title="13.4.6."


><![CDATA[<p>Hybrid hard drives, solid state drives and flash memory devices are difficult or impossible to sanitise effectively. In most cases safe disposal will require destruction, this includes any equipment with integrated memory capability. The sanitisation and post sanitisation treatment requirements for redeployment of such devices should be carefully observed.</p>]]></paragraph>
</block>
<block title="New Zealand Eyes Only (NZEO) Materials"><paragraph
    title="13.4.7."


><![CDATA[<p>NZEO endorsed material requires additional protection at every level of classification. In general terms, media and IT Equipment containing NZEO material should be sanitised and redeployed or sanitised and destroyed in accordance with the procedures in this section. Media and IT Equipment that has contained NZEO material must not be disposed of to e-recyclers or sold to any third party.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="13.4.8."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Reference</strong></p>
</td>
<td>
<p><strong>Title</strong></p>
</td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Data Remanence in Semiconductor Devices</strong></p>
</td>
<td>
<p>Peter Gutmann</p>
<p>IBM T.J.Watson Research Center</p>
</td>
<td style="width: 33%;">http://www.cypherpunks.to/~peter/usenix01.pdf</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>RAM testing tool memtest86+</strong></p>
</td>
<td>&nbsp;</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.memtest.org/" target="_blank">https://www.memtest.org/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>MemtestG80 and MemtestCL: Memory Testers for CUDA- and OpenCL-enabled GPUs</strong></p>
</td>
<td>
<p>Simbios project funded by the National Institutes of Health</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://simtk.org/home/memtest" target="_blank">https://simtk.org/home/memtest</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>HDDerase </strong></p>
<p><strong>Capable of calling the ATA secure erase command for non-volatile magnetic hard disks. It is also capable of resetting host protected area and device configuration overlay table information on the media.</strong></p>
</td>
<td>
<p>A freeware tool developed by the Center for Magnetic Recording Research at the University of California San Diego.</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://cmrr.ucsd.edu/resources/secure-erase.html?_ga=2.231749531.545206853.1522881172-221519987.1522881172" target="_blank">https://cmrr.ucsd.edu/resources/secure-erase.html?_ga=2.231749531.545206853.1522881172-221519987.1522881172</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>AISEP Evaluated Products List (EPL)</strong></p>
</td>
<td>
<p>Australasian Information Security Evaluation Program</p>
</td>
<td style="width: 33%;"><a title="EPL" rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/epl-products" target="_blank">https://www.cyber.gov.au/acsc/view-all-content/epl-products</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>ATA Secure Erase</strong></p>
</td>
<td>
<p>ATA ANSI specifications</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.ansi.org/" target="_blank">https://www.ansi.org/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Secure sanitisation of storage media</strong></td>
<td>
<p>NCSC, UK</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/guidance/secure-sanitisation-storage-media" target="_blank">https://www.ncsc.gov.uk/guidance/secure-sanitisation-storage-media</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Reliably Erasing Data From Flash-Based Solid State Drives</strong></p>
</td>
<td>
<p>Wei, Grupp, Spada and Swanson Department of Computer Science and Engineering, University of California, San Diego</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.usenix.org/legacy/event/fast11/tech/full_papers/Wei.pdf" target="_blank">https://www.usenix.org/legacy/event/fast11/tech/full_papers/Wei.pdf [PDF, 1.96 MB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>The 2012 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE</strong></p>
</td>
<td>
<p>Edith Cowan University Research Online. Australian Digital Forensics Conference</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1110&amp;context=adf" target="_blank">https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1110&amp;context=adf</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>2010 Zombie Hard disks - Data from the Living Dead</strong></p>
</td>
<td>
<p>Edith Cowan University Research Online. Australian Digital Forensics Conference</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1085&amp;context=adf" target="_blank">https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1085&amp;context=adf</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market</strong></p>
</td>
<td>
<p>Edith Cowan University Research Online. Australian Digital Forensics Conference</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1079&amp;context=adf" target="_blank">https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1079&amp;context=adf</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>NSA/CSS Storage Device Declassification Manual December 2007</strong></p>
</td>
<td>NSA</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.nsa.gov/portals/75/documents/resources/everyone/Media-destruction/storage-device-declassification-manual.pdf" target="_blank">https://www.nsa.gov/portals/75/documents/resources/everyone/Media-destruction/storage-device-declassification-manual.pdf [PDF, 157 KB]</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Sanitisation procedures"><paragraph
    title="13.4.9.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Sanitising media and IT Equipment prior to reuse or redeployment in a different environment ensures that classified information is not inadvertently accessed by an unauthorised individual or inadequately protected.</p>]]></paragraph>
<paragraph
    title="13.4.9.R.02."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Using approved sanitisation methods provides a high level of assurance that no remnant data is on the media and IT Equipment.</p>]]></paragraph>
<paragraph
    title="13.4.9.R.03."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The procedures used in the NZISM are designed not only to prevent common attacks that are currently feasible, but also to protect from threats that could emerge in the future.</p>]]></paragraph>
<paragraph
    title="13.4.9.R.04."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>When sanitising media, it is necessary to read back the contents of the media to verify that the overwrite process completed successfully.</p>]]></paragraph>
<paragraph
    title="13.4.9.R.05."

    tags="Technical,Media Destruction,Media Management,Media Sanitisation"


><![CDATA[<p>If the sanitising process cannot be successfully completed, destruction will be necessary.</p>]]></paragraph>
<paragraph
    title="13.4.9.R.06."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>It is important to note that "factory reset" or similar terms <strong>do not</strong> constitute sanitisation of media.</p>]]></paragraph>
<paragraph
    title="13.4.9.C.01."

    tags="Information Security Documentation,Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4169"
><![CDATA[<p>Agencies MUST document conditions and procedures for the sanitisation of media and IT Equipment.</p>]]></paragraph>
</block>
<block title="Media that cannot be sanitised"><paragraph
    title="13.4.10.R.01."

    tags="Technical,Media Destruction,Media Management,Media Sanitisation"


><![CDATA[<p>Some types of media cannot be sanitised and therefore MUST be destroyed. It is not possible to use these types of media while maintaining a high level of assurance that no previous data can be recovered.</p>]]></paragraph>
<paragraph
    title="13.4.10.C.01."

    tags="Technical,Media Destruction,Media Disposal,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4176"
><![CDATA[<p>Agencies MUST destroy the following media types <span style="text-decoration: underline;"><strong>prior to</strong> <strong>disposal</strong></span>, as they cannot be effectively sanitised:</p><ul>
<li>microfiche;</li>
<li>microfilm;</li>
<li>optical discs;</li>
<li>printer ribbons and the impact surface facing the platen;</li>
<li>programmable read-only memory (PROM, EPROM, EEPROM);</li>
<li>flash memory and solid state or hybrid data storage devices;</li>
<li>read-only memory; and</li>
<li>faulty magnetic media that cannot be successfully sanitised.</li>
</ul><p> </p>]]></paragraph>
</block>
<block title="Volatile media sanitisation"><paragraph
    title="13.4.11.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>When sanitising volatile media, the specified time to wait following removal of power is based on applying a safety factor to research on recovering the contents of volatile media.</p>]]></paragraph>
<paragraph
    title="13.4.11.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4181"
><![CDATA[<p>Agencies MUST sanitise volatile media by:</p><ul>
<li>overwriting all locations of the media with an arbitrary pattern;</li>
<li>followed by a read back for verification; and</li>
<li>removing power from the media for at least 10 minutes.</li>
</ul>]]></paragraph>
</block>
<block title="Treatment of volatile media following sanitisation"><paragraph
    title="13.4.12.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>There is published literature that supports the existence of short-term data remanence effects in volatile media. Data retention time is reported to range from minutes (at normal room temperatures) to hours (in extreme cold), depending on the temperature of the volatile media. Further, published literature has shown that some volatile media can suffer from long-term data remanence effects resulting from physical changes to the media due to continuous storage of static data for an extended period of time. It is for these reasons that TOP SECRET volatile media MUST always remain at this classification, even after sanitisation.</p>]]></paragraph>
<paragraph
    title="13.4.12.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4184"
><![CDATA[<p>Following sanitisation, volatile media MUST be treated as indicated in the table below.</p><table class="table-secondary">
<tbody>
<tr>
<td>
<p><strong>Pre-sanitisation classification / Endorsement</strong></p>
</td>
<td>
<p><strong>Post-sanitisation classification / Endorsement</strong></p>
</td>
</tr>
<tr>
<td>
<p>New Zealand Eyes Only (NZEO) Endorsement</p>
</td>
<td>
<p>NZEO</p>
</td>
</tr>
<tr>
<td>
<p>TOP SECRET</p>
</td>
<td>
<p>TOP SECRET</p>
</td>
</tr>
<tr>
<td>
<p>SECRET</p>
</td>
<td>
<p>SECRET</p>
</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>UNCLASSIFIED</td>
</tr>
<tr>
<td>
<p>RESTRICTED and all lower classifications</p>
</td>
<td>UNCLASSIFIED</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Non-volatile magnetic media sanitisation"><paragraph
    title="13.4.13.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>Both the host protected area and device configuration overlay table of non-volatile magnetic hard disks are normally not visible to the operating system or the computer’s BIOS. Hence any sanitisation of the readable sectors on the media will not overwrite these hidden sectors leaving any classified information contained in these locations untouched. Some sanitisation programs include the ability to reset devices to their default state removing any host protected areas or device configuration overlays. This allows the sanitisation program to see the entire contents of the media during the subsequent sanitisation process.</p>]]></paragraph>
<paragraph
    title="13.4.13.R.02."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Modern non-volatile magnetic hard disks automatically reallocate space for bad sectors at a hardware level. These bad sectors are maintained in what is known as the growth defects table or ‘g-list’. If classified information was stored in a sector that is subsequently added to the g-list, sanitising the media will not overwrite these non-addressable bad sectors, and remnant data will exist in these locations. Whilst these sectors may be considered bad by the device quite often this is due to the sectors no longer meeting expected performance norms for the device and not due to an inability to read/write to the sector.</p>]]></paragraph>
<paragraph
    title="13.4.13.R.03."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The ATA secure erase command is built into the firmware of post-2001 devices and is able to access sectors that have been added to the g-list. Modern non-volatile magnetic hard disks also contain a primary defects table or ‘p-list’. The p-list contains a list of bad sectors found during post-production processes. No information is ever stored in sectors on the p-list for a device as they are inaccessible before the media is used for the first time.</p>]]></paragraph>
<paragraph
    title="13.4.13.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4189"
><![CDATA[<p>Agencies MUST sanitise non-volatile magnetic media by:</p><ul>
<li>if pre-2001 or under 15GB: overwriting the media at least three times in its entirety with an arbitrary pattern followed by a read back for verification; or</li>
<li>if post-2001 or over 15GB: overwriting the media at least once in its entirety with an arbitrary pattern followed by a read back for verification.</li>
</ul>]]></paragraph>
<paragraph
    title="13.4.13.C.02."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4190"
><![CDATA[<p>Agencies MUST boot from separate media to the media being sanitised when undertaking sanitisation.</p>]]></paragraph>
<paragraph
    title="13.4.13.C.03."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Should"
    cid="4191"
><![CDATA[<p>Agencies SHOULD reset the host protected area and drive configuration overlay table of non-volatile magnetic hard disks prior to overwriting the media.</p>]]></paragraph>
<paragraph
    title="13.4.13.C.04."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Should"
    cid="4192"
><![CDATA[<p>Agencies SHOULD attempt to overwrite the growth defects table (g-list) on non-volatile magnetic hard disks.</p>]]></paragraph>
<paragraph
    title="13.4.13.C.05."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Should"
    cid="4193"
><![CDATA[<p>Agencies SHOULD use the ATA security erase command for sanitising non-volatile magnetic hard disks instead of using block overwriting software.</p>]]></paragraph>
</block>
<block title="Treatment of non-volatile magnetic media following sanitisation"><paragraph
    title="13.4.14.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>Highly classified non-volatile magnetic media cannot be sanitised below its original classification because of concerns with the sanitisation of the host protected area, device configuration overlay table and growth defects table.</p>]]></paragraph>
<paragraph
    title="13.4.14.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4200"
><![CDATA[<p>Following sanitisation, non-volatile magnetic media MUST be treated as indicated in the table below.</p><table class="table-secondary">
<tbody>
<tr>
<td>
<p>Pre-sanitisation classification</p>
</td>
<td>
<p>Post-sanitisation classification</p>
</td>
</tr>
<tr>
<td>
<p>New Zealand Eyes Only (NZEO) Endorsement</p>
</td>
<td>
<p>NZEO</p>
</td>
</tr>
<tr>
<td>
<p>TOP SECRET</p>
</td>
<td>
<p>TOP SECRET</p>
</td>
</tr>
<tr>
<td>
<p>SECRET</p>
</td>
<td>
<p>SECRET</p>
</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>UNCLASSIFIED</td>
</tr>
<tr>
<td>
<p>RESTRICTED</p>
</td>
<td>UNCLASSIFIED</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Non-volatile EPROM media sanitisation"><paragraph
    title="13.4.15.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>When erasing non-volatile EPROM, the manufacturer’s specified ultraviolet erasure time is multiplied by a factor of three to provide an additional level of certainty in the process. Verification is provided by read-back.</p>]]></paragraph>
<paragraph
    title="13.4.15.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4205"
><![CDATA[<p>Agencies MUST sanitise non-volatile EPROM media by erasing as per the manufacturer’s specification, increasing the specified ultraviolet erasure time by a factor of three, then overwriting the media at least once in its entirety with a pseudo random pattern, followed by a read back for verification.</p>]]></paragraph>
</block>
<block title="Non-volatile EEPROM media sanitisation"><paragraph
    title="13.4.16.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>A single overwrite with a pseudo random pattern is considered good practice for sanitising non-volatile EEPROM media.</p>]]></paragraph>
<paragraph
    title="13.4.16.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4208"
><![CDATA[<p>Agencies MUST sanitise non-volatile EEPROM media by overwriting the media at least once in its entirety with a pseudo random pattern, followed by a read back for verification.</p>]]></paragraph>
</block>
<block title="Treatment of non-volatile EPROM and EEPROM media following sanitisation"><paragraph
    title="13.4.17.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>As little research has been conducted on the ability to recover data on non-volatile EPROM or EEPROM media after sanitisation, highly classified media retains its original classification.</p>]]></paragraph>
<paragraph
    title="13.4.17.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4212"
><![CDATA[<p>Following sanitisation, non-volatile EPROM and EEPROM media MUST be treated as indicated in the table below.</p><table class="table-secondary">
<tbody>
<tr>
<td>
<p>Pre-sanitisation classification</p>
</td>
<td>
<p>Post-sanitisation classification</p>
</td>
</tr>
<tr>
<td>
<p>New Zealand Eyes Only (NZEO) Endorsement</p>
</td>
<td>NZEO</td>
</tr>
<tr>
<td>
<p>TOP SECRET</p>
</td>
<td>
<p>TOP SECRET</p>
</td>
</tr>
<tr>
<td>SECRET</td>
<td>SECRET</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>UNCLASSIFIED</td>
</tr>
<tr>
<td>RESTRICTED</td>
<td>UNCLASSIFIED</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Non-volatile flash memory &amp; FPGA  media sanitisation"><paragraph
    title="13.4.18.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>Wear levelling ensures that writes are distributed evenly across each memory block in flash memory. Where possible flash memory SHOULD be overwritten with a pseudo random pattern twice, rather than once, as this helps to ensure that all memory blocks are overwritten during sanitisation. Verification is provided by read-back.</p>]]></paragraph>
<paragraph
    title="13.4.18.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4215"
><![CDATA[<p>Agencies MUST sanitise non-volatile flash memory media by overwriting the media at least twice in its entirety with a pseudo random pattern, followed by a read back for verification.</p>]]></paragraph>
</block>
<block title="Treatment of non-volatile flash memory &amp; FPCA media following sanitisation"><paragraph
    title="13.4.19.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>Owing to the use of wear levelling in flash memory, it is possible that not all physical memory locations are written to when attempting to overwrite the media. Classified information can therefore remain on the media. It is for these reasons that TOP SECRET, SECRET and CONFIDENTIAL flash memory media MUST always remain at their respective classification, even after sanitisation.</p>]]></paragraph>
<paragraph
    title="13.4.19.R.02."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Non-volatile flash memory may be redeployed within systems of the same classification only after <span style="text-decoration: underline;"><strong>all</strong></span> manufacturer's sanitation procedures have been followed. Destruction and Disposal are covered in sections <a title="Media and IT equipment destruction" href="http://nzism.gcsb.govt.nz/ism-document#Section-14890">13.5 - Media and IT equipment destruction</a> and <a title="Media and IT equipment disposal" href="http://nzism.gcsb.govt.nz/ism-document#Section-14964">13.6 - Media and IT equipment Disposal</a> respectively.</p>]]></paragraph>
<paragraph
    title="13.4.19.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4218"
><![CDATA[<p>Following sanitisation, non-volatile flash memory media MUST be treated as indicated in the table below.</p><table class="table-secondary">
<tbody>
<tr>
<td>
<p>Pre-sanitisation classification</p>
</td>
<td>
<p>Post-sanitisation classification</p>
</td>
</tr>
<tr>
<td>
<p>New Zealand Eyes Only (NZEO) Endorsement</p>
</td>
<td>NZEO</td>
</tr>
<tr>
<td>
<p>TOP SECRET</p>
</td>
<td>
<p>TOP SECRET</p>
</td>
</tr>
<tr>
<td>SECRET</td>
<td>SECRET</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>CONFIDENTIAL</td>
</tr>
<tr>
<td>RESTRICTED</td>
<td>UNCLASSIFIED</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="13.4.19.C.02."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="5426"
><![CDATA[<p>Where manufacturer sanitation procedures cannot be determined, items MUST be destroyed.</p>]]></paragraph>
</block>
<block title="Sanitising solid state drives"><paragraph
    title="13.4.20.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Solid state drives operate a Flash Translation Layer (FTL) to interface with the storage devices – usually NAND chips. Current sanitation techniques address the FTL, rather than destroying the underlying data. It is possible to bypass the FTL, thus accessing the underlying data. With current technology, there is no effective means of sanitising solid state drives.</p>]]></paragraph>
<paragraph
    title="13.4.20.R.02."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Solid state drives also use wear equalisation or levelling techniques which can leave data remnants.</p>]]></paragraph>
<paragraph
    title="13.4.20.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4222"
><![CDATA[<p>Solid state drives MUST be destroyed before disposal.</p>]]></paragraph>
<paragraph
    title="13.4.20.C.02."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4223"
><![CDATA[<p>Solid state drives MUST be sanitised using ATA Secure Erase sanitation software before redeployment.</p>]]></paragraph>
<paragraph
    title="13.4.20.C.03."

    tags="Technical,Media Management,Media Sanitisation"


    classification="Secret, Confidential, Top Secret"
    compliance="Must Not"
    cid="4224"
><![CDATA[<p>Solid state drives MUST NOT be redeployed in a lower classification environment.</p>]]></paragraph>
</block>
<block title="Hybrid Drives"><paragraph
    title="13.4.21.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Hybrid drives combine solid state memory devices with magnetic disk technologies. As such they are subject to the same difficulties in effective sanitisation as solid state devices.</p>]]></paragraph>
<paragraph
    title="13.4.21.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4227"
><![CDATA[<p>Hybrid drives MUST be treated as solid state drives for sanitisation purposes.</p>]]></paragraph>
</block>
<block title="Sanitising media and IT Equipment  prior to reuse"><paragraph
    title="13.4.22.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Sanitising media and IT Equipment prior to reuse at the same or higher classification assists with enforcing the need-to-know principle within the agency. This includes any material with an NZEO endorsement.</p>]]></paragraph>
<paragraph
    title="13.4.22.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Should"
    cid="4230"
><![CDATA[<p>Agencies SHOULD sanitise all media and IT Equipment prior to reuse at the same or higher classification.</p>]]></paragraph>
</block>
<block title="Verifying sanitised media and IT Equipment "><paragraph
    title="13.4.23.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Verifying the sanitisation of media and IT Equipment with a different product to the one conducting the sanitisation process provides an independent level of assurance that the sanitisation process was conducted correctly.</p>]]></paragraph>
<paragraph
    title="13.4.23.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Should"
    cid="4234"
><![CDATA[<p>Agencies SHOULD verify the sanitisation of media and IT Equipment using a different product from the one used to perform the initial sanitisation.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="13.5. Media and IT Equipment Destruction"><subsection title="Objective"><paragraph
    title="13.5.1."


><![CDATA[<p class="NormS13C5">To ensure media and IT equipment that cannot be sanitised is safely destroyed before disposal in an environmentally responsible manner.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="13.5.2."


><![CDATA[<p>This section covers information relating to the destruction of media and IT equipment. Further information relating to the destruction of IT equipment can be found in <a title="Product sanitisation and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Section-14585">Section 12.6 - Product Sanitisation and Disposal</a>.</p>]]></paragraph>
<paragraph
    title="13.5.3."


><![CDATA[<p class="NormS13C5">Any IT, electrical or electronic equipment MUST be destroyed and disposed of in an environmentally safe and responsible manner.  This reflects an increasing responsibility for improved equipment end-of-life treatment and environmentally responsible disposal solutions, while continuing to meet security and data protection requirements.</p>]]></paragraph>
</block>
<block title="Evolution of electronic components and equipment"><paragraph
    title="13.5.4."


><![CDATA[<p class="NormS13C5">The capability of various types of electronic equipment to store data has increased significantly with technology advances such as solid-state drives (SSDs) and on-board memory devices.  In turn these present a rich target of opportunity to, amongst others, cyber-criminals, unauthorised investigators, and foreign intelligence services.  Data may include, for example, identity, account numbers, physical addresses, transactions, cryptographic keys, strategic, financial or other private documents, and classified information.</p>]]></paragraph>
<paragraph
    title="13.5.5."


><![CDATA[<p>Where data from a discarded device is recovered, it may also result in a privacy or data breach - potentially incurring sanction from data regulators.</p>]]></paragraph>
</block>
<block title="Electronic Waste (Waste Electrical and Electronic Equipment (WEEE))"><paragraph
    title="13.5.6."


><![CDATA[<p class="NormS13C5">Media and IT equipment can contain a number of elements such as arsenic, lead, mercury, barium, selenium and cadmium in their manufacture.  These elements can be poisonous, carcinogenic or toxic in particulate or dust form.  If allowed to accumulate in dumps or poorly managed recycling or disposal centres, they can create a serious health risk or environmental hazard.</p>]]></paragraph>
<paragraph
    title="13.5.7."


><![CDATA[<p class="NormS13C5">Lead was traditionally used in solder on printed circuit boards, although it has been banned in many countries in the last decade. Lead oxide may still be found in cathode-ray tubes and older equipment.  Lead is toxic to humans and medical research has raised concerns about the impact of low-level exposure on the development of the brain and central nervous system in children.</p>]]></paragraph>
<paragraph
    title="13.5.8."


><![CDATA[<p class="NormS13C5">Other elements used in the manufacture of IT and electronic equipment may include flame retardants and plasticisers, and should be treated with caution.</p>]]></paragraph>
<paragraph
    title="13.5.9."


><![CDATA[<p class="NormS13C5">Some flame-retardant materials used in computers can be toxic if released as dust into the atmosphere.  Research has shown that they interfere with brain and skeletal development.</p>]]></paragraph>
<paragraph
    title="13.5.10."


><![CDATA[<p class="NormS13C5">Phthalates are probably best known as plasticisers and are widely used in the electronics industry.  One of the most widely used phthalates, DEHP, is classified by the EU as toxic to reproductive health. For example, in 1999 an EU-wide ban was imposed on the use of six phthalates in children's chewable toys.</p>]]></paragraph>
</block>
<block title="Incinerators"><paragraph
    title="13.5.11."


><![CDATA[<p class="NormS13C5">There are many risks associated with the incineration of electronic waste. Up-to-date guidance is available on the Ministry for the Environment website (<a href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-14920">see reference table 13.5.21</a>).</p>]]></paragraph>
<paragraph
    title="13.5.12."


><![CDATA[<p class="NormS13C5">Incinerators discharge into the atmosphere and create emissions and ash residue. There is potential for contamination of air, soil and water through the release of pollutants such as hydrocarbons, heavy metals and dioxins. </p>]]></paragraph>
<paragraph
    title="13.5.13."


><![CDATA[<p class="NormS13C5">There are two main by-products of incineration.  Firstly, inert bottom ash which is primarily formed from inorganic elements, and secondly, flue gases. These facilities must include gas cleaning systems designed to contain pollutants and safely exhaust to the atmosphere.  Properly designed, installed and operated facilities will be able to manage and safely dispose of the waste, particulate matter and contaminants produced by incineration. </p>]]></paragraph>
<paragraph
    title="13.5.14."


><![CDATA[<p class="NormS13C5">It is essential that any incineration facility is properly rated, inspected and authorised or licenced to process WEEE.  Any relevant national environmental legislation and regulation must also be complied with.  In particular the Resource Management Act and the National Environmental Standards for Air Quality must be observed.</p>]]></paragraph>
<paragraph
    title="13.5.15."


><![CDATA[<p class="NormS13C5">Some electrical and electronic waste materials cannot be safely incinerated.  This includes:</p><ul>
<li>Alkaline batteries;</li>
<li>Glass;</li>
<li>Lithium batteries; and</li>
<li>Mobile phones.</li>
</ul>]]></paragraph>
</block>
<block title="Destruction"><paragraph
    title="13.5.16."


><![CDATA[<p class="NormS13C5">While sanitisation of media and IT equipment can be highly effective in controlled conditions and when applied for specific purposes, it does not provide the high level of assurances on the irrecoverably of data when the media and equipment has left the control of the owner, agency or other organisation.</p>]]></paragraph>
<paragraph
    title="13.5.17."


><![CDATA[<p class="NormS13C5">Destruction provides considerably higher levels of assurance to agencies where non-recoverability of any agency data is a consideration.  In many cases destruction is essential, rather than sanitisation and disposal.</p>]]></paragraph>
<paragraph
    title="13.5.18."


><![CDATA[<p class="NormS13C5">The GCSB approves destruction facilities (see also 13.6.11).  It is important to note that such approval is specific, confined to the destruction process and DOES NOT endorse or approve the use of any sanitisation process, method or software.</p>]]></paragraph>
</block>
<block title="New Zealand Eyes Only (NZEO) Materials"><paragraph
    title="13.5.19."


><![CDATA[<p>NZEO endorsed material requires additional protection at every level of classification.</p>]]></paragraph>
<paragraph
    title="13.5.20."


><![CDATA[<p>In general terms, media and IT Equipment containing NZEO material should be sanitised and redeployed or sanitised and destroyed in accordance with the procedures in this section. Media and IT Equipment that has contained NZEO material must not be disposed of, to e-recyclers or sold to any third party.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="13.5.21."


><![CDATA[<p>Further references can be found at:</p>
<table>
<tbody>
<tr>
<td>Reference</td>
<td>Title</td>
<td>Publisher</td>
<td>Source</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Secure Destruction of Sensitive Items</strong></td>
<td>CPNI</td>
<td><a rel="noopener noreferrer" href="https://www.cpni.gov.uk/sensitive-information-assets" target="_blank">Protect sensitive information and assets from creation to verified destruction. | CPNI</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Proposed amendments to National Environmental Standards for Air Quality: Particulate matter and mercury emissions</strong></td>
<td>Cabinet Paper June 2020</td>
<td><a rel="noopener noreferrer" href="https://environment.govt.nz/publications/approval-to-release-discussion-document-proposed-amendments-to-national-environmental-standards-for-air-quality-particulate-matter-and-mercury-emissions/" target="_blank">https://environment.govt.nz/publications/approval-to-release-discussion-document-proposed-amendments-to-national-environmental-standards-for-air-quality-particulate-matter-and-mercury-emissions/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>
<p>Consultation document</p>
<p>February 2020</p>
</td>
<td><a rel="noopener noreferrer" href="https://environment.govt.nz/publications/proposed-amendments-to-the-national-environmental-standards-for-air-quality-particulate-matter-and-mercury-emissions-consultation-document/" target="_blank">https://environment.govt.nz/publications/proposed-amendments-to-the-national-environmental-standards-for-air-quality-particulate-matter-and-mercury-emissions-consultation-document/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>
<p>Summary of submissions</p>
<p>December 2020</p>
</td>
<td><a rel="noopener noreferrer" href="https://environment.govt.nz/publications/proposed-amendments-to-the-national-environmental-standards-for-air-quality-summary-of-submissions/" target="_blank">https://environment.govt.nz/publications/proposed-amendments-to-the-national-environmental-standards-for-air-quality-summary-of-submissions/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Guidelines and recommendations for WEEE reuse and recycling operators</strong></td>
<td>Ministry for the Environment</td>
<td><a rel="noopener noreferrer" href="https://environment.govt.nz/publications/waste-electrical-and-electronic-equipment-guidance-for-collection-reuse-and-recycling/guidelines-and-recommendations-for-weee-reuse-and-recycling-operators/" target="_blank">https://environment.govt.nz/publications/waste-electrical-and-electronic-equipment-guidance-for-collection-reuse-and-recycling/guidelines-and-recommendations-for-weee-reuse-and-recycling-operators/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Overview of other WEEE good practice guidance/advice and standards</strong></td>
<td>Ministry for the Environment</td>
<td><a rel="noopener noreferrer" href="https://environment.govt.nz/publications/waste-electrical-and-electronic-equipment-guidance-for-collection-reuse-and-recycling/overview-of-other-weee-good-practice-guidanceadvice-and-standards/" target="_blank">https://environment.govt.nz/publications/waste-electrical-and-electronic-equipment-guidance-for-collection-reuse-and-recycling/overview-of-other-weee-good-practice-guidanceadvice-and-standards/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Health and safety considerations when reusing or recycling WEEE</strong></td>
<td>Ministry for the Environment</td>
<td><a rel="noopener noreferrer" href="https://environment.govt.nz/publications/waste-electrical-and-electronic-equipment-guidance-for-collection-reuse-and-recycling/health-and-safety-considerations-when-reusing-or-recycling-weee/" target="_blank">https://environment.govt.nz/publications/waste-electrical-and-electronic-equipment-guidance-for-collection-reuse-and-recycling/health-and-safety-considerations-when-reusing-or-recycling-weee/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Hazardous Air Pollutants</strong></td>
<td>Ministry for the Environment</td>
<td><a rel="noopener noreferrer" href="https://environment.govt.nz/facts-and-science/air/air-pollutants/hazardous-air-pollutants-effects-health/" target="_blank">https://environment.govt.nz/facts-and-science/air/air-pollutants/hazardous-air-pollutants-effects-health/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>New Zealand Waste list (L-Code)</strong></td>
<td>Ministry for the Environment</td>
<td><a rel="noopener noreferrer" href="https://www.mfe.govt.nz/waste/guidance-and-resources/waste-list" target="_blank">https://www.mfe.govt.nz/waste/guidance-and-resources/waste-list</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Environmental Health Intelligence NZ – Air quality</strong></td>
<td>Massey University</td>
<td><a rel="noopener noreferrer" href="https://www.ehinz.ac.nz/indicators/air-quality/" target="_blank">https://www.ehinz.ac.nz/indicators/air-quality/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>E-Waste Management</strong></td>
<td>National Environmental Agency (US)</td>
<td><a rel="noopener noreferrer" href="https://www.nea.gov.sg/our-services/waste-management/3r-programmes-and-resources/e-waste-management" target="_blank">https://www.nea.gov.sg/our-services/waste-management/3r-programmes-and-resources/e-waste-management</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Hazardous Substances</strong></td>
<td>National Environmental Agency (US)</td>
<td><a rel="noopener noreferrer" href="https://www.nea.gov.sg/our-services/pollution-control/chemical-safety/hazardous-substances" target="_blank">https://www.nea.gov.sg/our-services/pollution-control/chemical-safety/hazardous-substances</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong><a rel="noopener noreferrer" href="http://www.business.govt.nz/healthandsafetygroup/" target="_blank">A-Z</a> Topics and Industry</strong></td>
<td>Worksafe NZ</td>
<td><a rel="noopener noreferrer" href="https://www.worksafe.govt.nz/" target="_blank">https://www.worksafe.govt.nz/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Stewart, E. S., &amp; Lemieux, P. M. (2003, May). Emissions from the incineration of electronics industry waste. In IEEE International Symposium on Electronics and the Environment, 2003. (pp. 271-275). IEEE.</strong></td>
<td>Stewart and Lemieux, Office of Research and Development, US EPA, 2003,IEEE</td>
<td><a rel="noopener noreferrer" href="https://www.researchgate.net/publication/4020282_Emissions_from_the_incineration_of_electronics_industry_waste" target="_blank">https://www.researchgate.net/publication/4020282_Emissions_from_the_incineration_of_electronics_industry_waste</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Gurgul, A., Szczepaniak, W., &amp; Zabłocka-Malicka, M. (2017). Incineration, pyrolysis and gasification of electronic waste. In E3S Web of conferences (Vol. 22, p. 00060). EDP Sciences.</strong></td>
<td>Gurgul et al, Wroclaw University of Science and Technology, Poland, 2017,</td>
<td><a rel="noopener noreferrer" href="https://www.e3s-conferences.org/articles/e3sconf/pdf/2017/10/e3sconf_asee2017_00060.pdf" target="_blank">https://www.e3s-conferences.org/articles/e3sconf/pdf/2017/10/e3sconf_asee2017_00060.pdf</a> [PDF, 519 KB]</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Black, H. (2005). Getting the lead out of electronics. Environews,113(10).</strong></td>
<td>Harvey Black, published in Environmental Health Perspectives, 2005 Oct; 113(10): A682–A685,</td>
<td><a rel="noopener noreferrer" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1281311" target="_blank">https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1281311</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>EU bans baby toys containing phthalates. (1999). BMJ : British Medical Journal, 319(7224), 1522.</strong></td>
<td>Xavier Bosch, The Lancet, Volume 354, Issue 9195, p2060, December 11, 1999,</td>
<td><a rel="noopener noreferrer" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1174644/" target="_blank">https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1174644/</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Destruction procedures"><paragraph
    title="13.5.22.R.01."

    tags="Technical,Media Destruction,Media Management"


><![CDATA[<p>Documenting procedures for media and IT equipment destruction will ensure that destruction is carried out in an appropriate, consistent and responsible manner within the agency.</p>]]></paragraph>
<paragraph
    title="13.5.22.C.01."

    tags="Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4270"
><![CDATA[<p>Agencies MUST document procedures for the destruction of media and IT Equipment.</p>]]></paragraph>
</block>
<block title="Media and IT Equipment destruction"><paragraph
    title="13.5.23.R.01."

    tags="Technical,Media Destruction,Media Management"


><![CDATA[<p>The destruction methods given are designed to ensure that recovery of data is impossible or impractical. Health and safety training and the use of safety equipment may be required with these methods.</p>]]></paragraph>
<paragraph
    title="13.5.23.C.01."

    tags="Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4276"
><![CDATA[<p>To destroy media and IT Equipment agencies MUST use at least one of the methods shown in the following table.</p><table class="table-secondary">
<tbody>
<tr>
<td rowspan="2">Item</td>
<td colspan="6">
<p>Destruction methods</p>
</td>
</tr>
<tr>
<td style="text-align: center; background-color: #d1d0d1;">
<p>Furnace/ Incinerator</p>
</td>
<td style="text-align: center; background-color: #d1d0d1;">
<p>Hammer mill</p>
</td>
<td style="text-align: center; background-color: #d1d0d1;">Disintegrator</td>
<td style="text-align: center; background-color: #d1d0d1;">
<p>Grinder/ Sander</p>
</td>
<td style="text-align: center; background-color: #d1d0d1;">Cutting</td>
<td style="text-align: center; background-color: #d1d0d1;">
<p>Degausser</p>
</td>
</tr>
<tr>
<td>Magnetic floppy disks</td>
<td class="table-cell-orange" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-green" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-green" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-blue" style="text-align: center;">&nbsp;No</td>
<td class="table-cell-red" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-red" style="text-align: center;">&nbsp;Yes</td>
</tr>
<tr>
<td>Magnetic hard disks</td>
<td class="table-cell-orange" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-green" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-green" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-red" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-blue" style="text-align: center;">&nbsp;No</td>
<td class="table-cell-red" style="text-align: center;">&nbsp;Yes</td>
</tr>
<tr>
<td>Magnetic tapes</td>
<td class="table-cell-orange" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-green" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-green" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-blue" style="text-align: center;">&nbsp;No</td>
<td class="table-cell-red" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-red" style="text-align: center;">&nbsp;Yes</td>
</tr>
<tr>
<td>Optical disks</td>
<td class="table-cell-orange" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-green" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-green" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-red" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-red" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-blue" style="text-align: center;">&nbsp;No</td>
</tr>
<tr>
<td>Electrostatic memory devices&nbsp;</td>
<td class="table-cell-orange" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-green" style="text-align: center;">Yes&nbsp;</td>
<td class="table-cell-green" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-red" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-blue" style="text-align: center;">&nbsp;No</td>
<td class="table-cell-blue" style="text-align: center;">&nbsp;No</td>
</tr>
<tr>
<td>Semi-conductor memory</td>
<td class="table-cell-orange" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-green" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-green" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-blue" style="text-align: center;">&nbsp;No</td>
<td class="table-cell-blue" style="text-align: center;">&nbsp;No</td>
<td class="table-cell-blue" style="text-align: center;">&nbsp;No</td>
</tr>
<tr>
<td>Other Circuit Boards</td>
<td class="table-cell-orange" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-green" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-green" style="text-align: center;">&nbsp;Yes</td>
<td class="table-cell-blue" style="text-align: center;">&nbsp;No</td>
<td class="table-cell-blue" style="text-align: center;">&nbsp;No</td>
<td class="table-cell-blue" style="text-align: center;">&nbsp;No</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Destruction methods for media and IT equipment"><paragraph
    title="13.5.24.R.01."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


><![CDATA[<p class="Normal-nonumbering">Where an agency does not perform its own destruction of media and IT equipment, an approved facility must be used. Agencies that do perform destruction of media and IT equipment must use equipment that complies with the NZISM.</p>]]></paragraph>
<paragraph
    title="13.5.24.R.02."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


><![CDATA[<p>A variety of equipment for media and IT Equipment destruction exists. Evaluated products will provide assurance that the product will be effective. Approved products are discussed in <a title="Product security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 - Product Security</a>.</p>]]></paragraph>
<paragraph
    title="13.5.24.R.03."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


><![CDATA[<p>Where a product or service is not an evaluated product or is NOT listed in the <a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy" target="_blank">PSR</a>, agencies must consult the GCSB for advice.</p>]]></paragraph>
<paragraph
    title="13.5.24.R.04."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


><![CDATA[<p class="Normal-nonumbering">Equipment can be dismantled or pre-processed before disposal. Care MUST be taken to ensure safe handling of any potential poisonous, carcinogenic or toxic materials.  </p>]]></paragraph>
<paragraph
    title="13.5.24.R.05."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


><![CDATA[<p class="Normal-nonumbering">Where incineration is the disposal method of choice, users must ensure the facility is properly rated for the incineration of electronic waste (WEEE) and the safe handling of any poisonous, carcinogenic and toxic materials produced in the incineration process.  The facility must also be properly authorised or licenced to operate.</p>]]></paragraph>
<paragraph
    title="13.5.24.C.01."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4302"
><![CDATA[<p class="NormS13C4">Media and IT equipment destruction MUST be performed using approved destruction equipment, facilities and methods.</p>]]></paragraph>
<paragraph
    title="13.5.24.C.02."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4304"
><![CDATA[<p class="NormS13C4">Where agencies do not own their own destruction equipment, agencies MUST use an <span style="text-decoration: underline;">approved destruction facility</span> for media and IT equipment destruction.</p>]]></paragraph>
<paragraph
    title="13.5.24.C.03."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="7165"
><![CDATA[<p class="Normal-nonumbering">Where a facility is NOT an approved facility, agencies MUST ensure any incineration equipment is rated for the destruction of electronic waste (WEEE) and the operator is properly authorised or licensed.</p>]]></paragraph>
<paragraph
    title="13.5.24.C.04."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="7166"
><![CDATA[<p class="Normal-nonumbering">Where a facility is NOT an approved facility, agencies MUST ensure processes are in place for the safe handling of electronic waste (WEEE), including any residual material from the destruction process.</p>]]></paragraph>
</block>
<block title="Storage and handling of media and IT Equipment waste particles"><paragraph
    title="13.5.25.R.01."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


><![CDATA[<p>Following destruction, normal accounting and auditing procedures do not apply. As such, it is essential that when an item is recorded as being destroyed, destruction is assured.</p>]]></paragraph>
<paragraph
    title="13.5.25.C.01."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4343"
><![CDATA[<p>Agencies MUST, at minimum, store and handle the resulting waste for all methods, in accordance with the classification given in the table below.</p><table class="table-secondary">
<tbody>
<tr>
<td rowspan="2">
<p style="text-align: center;"><strong>Initial media or IT Equipment classification</strong></p>
</td>
<td colspan="2">
<p style="text-align: center;"><strong>Screen aperture size particles can pass through</strong></p>
</td>
</tr>
<tr>
<td style="text-align: center; background-color: #d1d1d1;">
<p><strong>Less than or equal to <span style="text-decoration: underline;">3mm</span></strong></p>
<p><strong>Treat as</strong></p>
</td>
<td style="text-align: center; background-color: #d1d1d1;">
<p><strong>Less than or equal to <span style="text-decoration: underline;">6mm</span></strong></p>
<p><strong>Treat as</strong></p>
</td>
</tr>
<tr>
<td class="box-text-red" style="text-align: left;"> TOP SECRET</td>
<td style="text-align: center;">
<p>UNCLASSIFIED</p>
</td>
<td style="text-align: center;"><strong>RESTRICTED</strong></td>
</tr>
<tr>
<td class="box-text-blue" style="text-align: left;">SECRET</td>
<td style="text-align: center;">
<p>UNCLASSIFIED</p>
</td>
<td style="text-align: center;"><strong>RESTRICTED</strong></td>
</tr>
<tr>
<td class="box-text-green" style="text-align: left;">CONFIDENTIAL</td>
<td style="text-align: center;">
<p>UNCLASSIFIED</p>
</td>
<td style="text-align: center;"><strong>RESTRICTED</strong></td>
</tr>
<tr>
<td class="box-text-black" style="text-align: left;">RESTRICTED</td>
<td style="text-align: center;">
<p>UNCLASSIFIED</p>
</td>
<td style="text-align: center;">
<p>UNCLASSIFIED</p>
</td>
</tr>
</tbody>
</table><p>Particle size: measured in any direction, should not exceed stated measurement.</p>]]></paragraph>
</block>
<block title="Degaussers"><paragraph
    title="13.5.26.R.01."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


><![CDATA[<p>Degaussers are effective ONLY on magnetic media or storage devices. Coercivity varies between media and IT Equipment types and between brands and models of the same type. Care is needed when determining the desired coercivity as a degausser of insufficient strength will not be effective. The National Security Agency/Central Security Service’s EPLD contains a list of common types of media and their associated coercivity ratings.</p>]]></paragraph>
<paragraph
    title="13.5.26.R.02."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


><![CDATA[<p>Since 2006 perpendicular magnetic media have become available. Some degaussers are only capable of sanitising longitudinal magnetic media. As such, care needs to be taken to ensure that a suitable degausser is used when sanitising perpendicular magnetic media.</p>]]></paragraph>
<paragraph
    title="13.5.26.R.03."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


><![CDATA[<p>Some degaussers will have product specific requirements. Agencies will need to comply with any directions provided by the GCSB to ensure that degaussers are being used in the correct manner to achieve an effective destruction outcome. Refer also to <a title="Product security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 - Product Security</a>.</p>]]></paragraph>
<paragraph
    title="13.5.26.C.01."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4349"
><![CDATA[<p>Agencies MUST use a degausser of sufficient field strength for the coercivity of the media and IT Equipment.</p>]]></paragraph>
<paragraph
    title="13.5.26.C.02."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4350"
><![CDATA[<p>Agencies MUST use a degausser which has been evaluated as capable for the magnetic orientation (longitudinal or perpendicular) of the media.</p>]]></paragraph>
<paragraph
    title="13.5.26.C.03."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4352"
><![CDATA[<p>Agencies MUST comply with product specific directions provided by the manufacturers, along with any provided by the GCSB.</p>]]></paragraph>
</block>
<block title="Supervision of destruction"><paragraph
    title="13.5.27.R.01."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


><![CDATA[<p>To ensure that classified media and IT Equipment is appropriately destroyed it will need to be supervised to the point of destruction and have its destruction overseen by at least one person cleared to the highest classification of the media being destroyed. To provide accountability and traceability, a destruction register is essential.</p>]]></paragraph>
<paragraph
    title="13.5.27.C.01."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4357"
><![CDATA[<p>Agencies MUST perform the destruction of media and IT Equipment under the supervision of at least one person cleared to the highest classification of the media or IT Equipment being destroyed.</p>]]></paragraph>
<paragraph
    title="13.5.27.C.02."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4358"
><![CDATA[<p>Personnel supervising the destruction of media or IT Equipment MUST:</p><ul>
<li>supervise the handling of the media or IT Equipment to the point of destruction; and</li>
<li>ensure that the destruction is completed successfully.</li>
</ul>]]></paragraph>
<paragraph
    title="13.5.27.C.03."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Should"
    cid="4359"
><![CDATA[<p class="NormS13C4">The Destruction Register SHOULD record:</p><ul>
<li>Destruction facility used;</li>
<li>Destruction method used;</li>
<li>Date of destruction;</li>
<li>Operator and witnesses;</li>
<li>Media and IT equipment classification; and</li>
<li>Media and IT equipment type, characteristics and serial number.</li>
</ul>]]></paragraph>
</block>
<block title="Supervision of accountable material destruction"><paragraph
    title="13.5.28.R.01."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


><![CDATA[<p class="NormS13C4">As accountable material is more sensitive than standard classified media and IT equipment, it needs to be supervised by at least two personnel and have a destruction certificate signed by both personnel supervising the process.&nbsp; This includes any NZEO material.</p>]]></paragraph>
<paragraph
    title="13.5.28.C.01."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4363"
><![CDATA[<p>Agencies MUST perform the destruction of accountable material under the supervision of at least two personnel cleared to the highest classification of the media or IT Equipment being destroyed.</p>]]></paragraph>
<paragraph
    title="13.5.28.C.02."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4364"
><![CDATA[<p>Personnel supervising the destruction of accountable media and IT Equipment MUST:</p><ul>
<li>supervise the handling of the material to the point of destruction;</li>
<li>ensure that the destruction is completed successfully; </li>
<li>sign a destruction certificate; and</li>
<li>complete the relevant entries in the destruction register.</li>
</ul>]]></paragraph>
</block>
<block title="Outsourcing media and IT Equipment destruction"><paragraph
    title="13.5.29.R.01."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


><![CDATA[<p>Agencies may wish to outsource media and IT Equipment destruction for efficiency and cost reasons.</p>]]></paragraph>
<paragraph
    title="13.5.29.C.01."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="Top Secret"
    compliance="Must Not"
    cid="4367"
><![CDATA[<p class="NormS13C4">Agencies MUST NOT outsource the supervision and oversight of the destruction of TOP SECRET or NZEO media and IT equipment or other accountable material to a non-government entity or organisation.</p>]]></paragraph>
<paragraph
    title="13.5.29.C.02."

    tags="IT Equipment,Technical,Media Destruction,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4368"
><![CDATA[<p>Agencies outsourcing the destruction of media and IT Equipment to a commercial facility MUST use an approved facility and comply with the procedures and instructions in this Chapter.</p>]]></paragraph>
</block>
<block title="Transporting media and IT Equipment for offsite destruction"><paragraph
    title="13.5.30.R.01."

    tags="IT Equipment,Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Requirements on the safe handling and physical transfer of media and IT Equipment between agencies or to commercial facilities can be found in the <a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy" target="_blank">PSR</a><a title="Best practice guidelines for transporting sensitive items" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/physical-security/specific-scenarios/securely-transporting-sensitive-items/best-practice-guidelines-for-transporting-sensitive-items/" target="_blank"></a>.</p>]]></paragraph>
<paragraph
    title="13.5.30.C.01."

    tags="IT Equipment,Technical,Media Handling,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Should"
    cid="4371"
><![CDATA[<p>Agencies SHOULD sanitise media and IT Equipment prior to transporting it to an offsite location for destruction.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="13.6. Media and IT Equipment Disposal"><subsection title="Objective"><paragraph
    title="13.6.1."


><![CDATA[<p>Media and IT equipment is declassified and approved by the CISO, or delegate, for release before disposal into the public domain.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="13.6.2."


><![CDATA[<p>This section covers information relating to the disposal of media and IT equipment. Further information relating to the disposal of IT equipment can be found in <a title="Product sanitisation and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Section-14585">Section 12.6 - Product Sanitisation and Disposal</a>.</p>]]></paragraph>
<paragraph
    title="13.6.3."


><![CDATA[<p>NZEO endorsed material requires additional protection at every level of classification.</p>]]></paragraph>
<paragraph
    title="13.6.4."


><![CDATA[<p>In general terms, media and IT equipment containing NZEO material should be sanitised and redeployed or sanitised and destroyed in accordance with the procedures in this section. Media and IT equipment that has contained NZEO material must not be disposed of, to e-recyclers or sold to any third party.</p>]]></paragraph>
<paragraph
    title="13.6.5."


><![CDATA[<p>Note the discussion in section <a title="Media and IT equipment sanitisation" href="http://nzism.gcsb.govt.nz/ism-document#Section-14810">13.4 - Media and IT equipment sanitisation</a>, on the challenges and difficulties in effectively sanitising media of all types.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Declassification prior to disposal"><paragraph
    title="13.6.6.R.01."

    tags="Technical,Classifying Media,Media Disposal,Media Management"


><![CDATA[<p>Prior to its disposal, media and IT equipment needs to be declassified to ensure that classified information is not accidentally released into the public domain.</p>]]></paragraph>
<paragraph
    title="13.6.6.C.01."

    tags="Technical,Classifying Media,Media Disposal,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4385"
><![CDATA[<p>Agencies MUST declassify all media and IT equipment prior to disposing of it into the public domain.</p>]]></paragraph>
<paragraph
    title="13.6.6.C.02."

    tags="Technical,Classifying Media,Media Disposal,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4386"
><![CDATA[<p>Media and IT equipment that cannot be effectively sanitised or declassified MUST be destroyed and not released into the public domain.</p>]]></paragraph>
</block>
<block title="Disposal procedures"><paragraph
    title="13.6.7.R.01."

    tags="Technical,Classifying Media,Media Disposal,Media Management"


><![CDATA[<p>The following diagram illustrates the mandated disposal process. Note declassification describes the entire process, including any reclassifications, approvals and documentation, before media and media waste can be released into the public domain.</p>]]></paragraph>
<paragraph
    title="13.6.7.C.01."

    tags="Technical,Classifying Media,Media Disposal,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4389"
><![CDATA[<p>Agencies MUST document procedures for the disposal of media and IT equipment.</p>
<p><img class="leftAlone" title="" src="assets/NZISM/MediaDisposalProcessOutline.png" alt="Media Disposal Process Outline Diagram" width="734" height="1052"></p>]]></paragraph>
</block>
<block title="Declassifying media"><paragraph
    title="13.6.8.R.01."

    tags="Technical,Classifying Media,Media Disposal,Media Management"


><![CDATA[<p>The process of reclassifying, sanitising or destroying media does not provide sufficient assurance for media to be declassified and released into the public domain. In order to declassify media, formal administrative approval is required before releasing the media or waste into the public domain.</p>]]></paragraph>
<paragraph
    title="13.6.8.C.01."

    tags="Technical,Classifying Media,Media Disposal,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4392"
><![CDATA[<p>Agencies declassifying media MUST ensure that:</p><ul>
<li>the reclassification of all classified information on the media has been approved by the originator, or the media has been appropriately sanitised or destroyed; and</li>
<li>formal approval is granted before the media is released into the public domain.</li>
</ul>]]></paragraph>
</block>
<block title="Disposal of media"><paragraph
    title="13.6.9.R.01."

    tags="Technical,Classifying Media,Media Disposal,Media Management"


><![CDATA[<p>Disposing of media in a manner that does not draw undue attention ensures that media that was previously classified is not subjected to additional scrutiny over that of regular waste. This can include the removal of labels, markings and serial numbers.</p>]]></paragraph>
<paragraph
    title="13.6.9.C.01."

    tags="Technical,Classifying Media,Media Disposal,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4395"
><![CDATA[<p>Agencies MUST dispose of media in a manner that does not draw undue attention to its previous classification.</p>]]></paragraph>
</block>
<block title="New Zealand Eyes Only (NZEO) Materials"><paragraph
    title="13.6.10.R.01."

    tags="Technical,Media Destruction,Media Disposal,Media Management,Media Sanitisation"


><![CDATA[<p>NZEO endorsed material requires additional protection at every level of classification and creates a special case in the destruction and disposal process.</p>]]></paragraph>
<paragraph
    title="13.6.10.C.01."

    tags="Technical,Media Destruction,Media Disposal,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4398"
><![CDATA[<p>Media and IT equipment that has contained NZEO material MUST be sanitised and redeployed or sanitised and destroyed in accordance with the procedures in this chapter.</p>]]></paragraph>
<paragraph
    title="13.6.10.C.02."

    tags="Technical,Media Disposal,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4399"
><![CDATA[<p>For disposal of all NZEO endorsed materials, an approved destruction facility MUST be used.</p>]]></paragraph>
<paragraph
    title="13.6.10.C.03."

    tags="Technical,Media Disposal,Media Management"


    classification="All Classifications"
    compliance="Must Not"
    cid="4400"
><![CDATA[<p>Media and IT equipment that has contained NZEO material MUST NOT be disposed of via e-recyclers or sold to any third party.</p>]]></paragraph>
</block>
<block title="Approved Secure Destruction Facilities"><paragraph
    title="13.6.11.R.01."

    tags="Technical,Media Destruction,Media Disposal,Media Management"


><![CDATA[<p class="NormS13C6">An approved secure destruction facility may be agency-owned or a commercial facility.</p>]]></paragraph>
<paragraph
    title="13.6.11.R.02."

    tags="Technical,Media Destruction,Media Disposal,Media Management"


><![CDATA[<p class="NormS13C6">A number of regulatory and legislative requirements including those relating to health, safety, environmental protection, hazardous materials handling disposal and export, will have to be met by any such facility.</p>]]></paragraph>
<paragraph
    title="13.6.11.R.03."

    tags="Technical,Media Destruction,Media Disposal,Media Management"


><![CDATA[<p class="NormS13C6">It may not be economically viable for individual agencies to own and maintain such facilities.  In such cases the use of a commercial facility may be the only practical alternative.</p>]]></paragraph>
<paragraph
    title="13.6.11.R.04."

    tags="Technical,Media Destruction,Media Disposal,Media Management"


><![CDATA[<p class="NormS13C6">To ensure secure destruction facilities have the capability, capacity and equipment to securely destroy media and IT equipment to the specifications detailed in the NZISM, a formal approval is required.  An inspection of the facility and any necessary testing of the equipment will determine suitability for operation as a secure destruction facility.  If the results of the inspection and testing are satisfactory, a formal approval is issued.  Periodic re-inspections are conducted to ensure on-going compliance with the NZISM requirements.</p>]]></paragraph>
<paragraph
    title="13.6.11.R.05."

    tags="Technical,Media Destruction,Media Disposal,Media Management"


><![CDATA[<p class="NormS13C6"><a title="Approved Secure Destruction Facilities - Guidance to Vendors" rel="noopener noreferrer" href="https://ncsc.govt.nz/assets/NCSC-Documents/ASDF-Info-For-Service-Providers.pdf" target="_blank">Commercial organisations may apply</a> to the GCSB for approval as a secure destruction facility under the NZISM.</p>]]></paragraph>
<paragraph
    title="13.6.11.R.06."

    tags="Technical,Media Destruction,Media Disposal,Media Management"


><![CDATA[<p class="NormS13C6">The Director-General of the GCSB will issue such approvals if satisfied that the standards detailed in the NZISM have been satisfactorily been met and can be maintained. </p>]]></paragraph>
<paragraph
    title="13.6.11.C.01."

    tags="Technical,Media Destruction,Media Disposal,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="5711"
><![CDATA[<p class="NormS13C6">Where agencies establish their own disposal/destruction facilities, these facilities MUST be approved by the Director-General GCSB.</p>]]></paragraph>
</block>
<block title="Use of Approved Secure Destruction Facilities"><paragraph
    title="13.6.12.R.01."

    tags="Technical,Media Destruction,Media Disposal,Media Management"


><![CDATA[<p class="NormS13C6">Agencies may not have the facilities to securely dispose of media and IT equipment to the specifications detailed in the NZISM (Refer to <a title="Media and IT Equipment Destruction" href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-14902">13.5.7 Media and IT Equipment Destruction</a> and <a title="Storage and handling of media waste particles" href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-14904">13.5.9 Storage and handling of media waste particles</a>).&nbsp; In these circumstances the use of an <a title="ASDFs" rel="noopener noreferrer" href="https://www.gcsb.govt.nz/our-work/national-cyber-security-centre-ncsc/approved-secure-destruction-facilities/" target="_blank">approved secure disposal or destruction facility</a> (agency owned or a commercial facility) is permitted <span style="text-decoration: underline;">provided</span> all other procedures in this Chapter are followed.</p>]]></paragraph>
<paragraph
    title="13.6.12.R.02."

    tags="Technical,Media Destruction,Media Disposal,Media Management"


><![CDATA[<p class="NormS13C6">The GCSB maintains a register of <a title="ASDFs" rel="noopener noreferrer" href="https://www.gcsb.govt.nz/our-work/national-cyber-security-centre-ncsc/approved-secure-destruction-facilities/" target="_blank">approved secure disposal/destruction facilities</a>.</p>]]></paragraph>
<paragraph
    title="13.6.12.R.03."

    tags="Technical,Media Destruction,Media Disposal,Media Management"


><![CDATA[<p class="NormS13C6">In practical terms this requires tracking, supervision and oversight (witnessed) to the point where the disposal/destruction process is complete.&nbsp; Procedures are detailed in <a title="Media and IT Equipment Destruction" href="http://nzism.gcsb.govt.nz/ism-document#Section-14890">Section 13.5 - Media and IT Equipment Destruction</a>.</p>]]></paragraph>
<paragraph
    title="13.6.12.C.01."

    tags="Technical,Media Destruction,Media Disposal,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="5716"
><![CDATA[<p class="NormS13C6">&nbsp;Agencies MUST use an <a title="ASDFs" rel="noopener noreferrer" href="https://www.gcsb.govt.nz/our-work/national-cyber-security-centre-ncsc/approved-secure-destruction-facilities/" target="_blank">approved secure disposal/destruction facility</a> for the destruction of media and IT equipment.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="14. Software security"><section title="14.1. Standard Operating Environments"><subsection title="Objective"><paragraph
    title="14.1.1."

    tags="Information Security Documentation"


><![CDATA[<p>Standard Operating Environments (SOE) are hardened in order to minimise attacks and compromise through known vulnerabilities and attack vectors.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="14.1.2."


><![CDATA[<p>This section covers information on the hardening of software used on workstations and servers on systems within agency control.</p>]]></paragraph>
</block>
<block title="Characterisation"><paragraph
    title="14.1.3."


><![CDATA[<p>Characterisation is a technique used to analyse and record a system’s configuration. It is important as it can be used as a baseline to verify the system’s integrity at a later date. It is also important that the baseline has high levels of integrity and assurance to avoid reinfecting systems or reintroducing compromises when restoring from baselines.</p>]]></paragraph>
<paragraph
    title="14.1.4."


><![CDATA[<p>In virtual environments a baseline is usually a “snapshot” or image take at a point in time. If the image or snapshot is infected, then restoring from that image can result in further compromise. See also <a title="Virtualisation" href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation</a> and <a title="VLANs" href="http://nzism.gcsb.govt.nz/ism-document#Section-17362">22.3 – Virtual Local Area Networks</a>.</p>]]></paragraph>
<paragraph
    title="14.1.5."


><![CDATA[<p>Methods of characterising files and directories include:</p><ul>
<li>performing a cryptographic checksum on the files/directories when they are known to be virus/contaminant free;</li>
<li>documenting the name, type, size and attributes of legitimate files and directories, along with any changes to this information expected under normal operating conditions; or</li>
<li>for a Windows system, taking a system difference snapshot.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="14.1.6."


><![CDATA[<p>Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong><strong>ISO/IEC 27001:2013&nbsp;</strong></strong></p>
</td>
<td>
<p><strong><strong><strong>A.12.4.1,&nbsp;</strong></strong>Control of Operational Software</strong></p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="Information technology — Security techniques — Information security management systems — Requirements" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></p>
</td>
</tr>
<tr>
<td>
<p><strong><strong>ISO/IEC 27001:2013&nbsp;</strong></strong></p>
</td>
<td>
<p><strong><strong>A.12.6.1,&nbsp;</strong>Control of Technical Vulnerabilities</strong></p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="Information technology — Security techniques — Information security management systems — Requirements" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a><a rel="noopener noreferrer" href="http://www.standards.co.nz" target="_blank"><br></a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Independent testing of different antivirus software and their effectiveness</strong></p>
</td>
<td style="text-align: center;">
<p>AV Comparatives</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.av-comparatives.org/" target="_blank">https://www.av-comparatives.org/</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="14.1.7."


><![CDATA[<p class="NormS10C7">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 100%; height: 255.07px;">
<tbody>
<tr style="height: 51.5556px;">
<td style="width: 19.2976%; height: 51.5556px;">
<p><strong>Reference</strong></p>
</td>
<td style="width: 17.733%; height: 51.5556px;">
<p><strong>Title</strong></p>
</td>
<td style="width: 62.9346%; height: 51.5556px;">
<p><strong>Source</strong></p>
</td>
</tr>
<tr style="height: 203.514px;">
<td style="width: 19.2976%; height: 203.514px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 17.733%; height: 203.514px;">
<p>GOV3, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</p>
</td>
<td style="width: 62.9346%; height: 203.514px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a> &nbsp;</p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Developing hardened SOEs"><paragraph
    title="14.1.8.R.01."

    tags="Technical,Software Security,Standard Operating Environments"


><![CDATA[<p>Antivirus and anti-malware software, while an important defensive measure, can be defeated by malicious code that has yet to be identified by antivirus vendors. This can include targeted attacks, where a new virus is engineered or an existing one modified to defeat the signature-based detection schemes.</p>]]></paragraph>
<paragraph
    title="14.1.8.R.02."

    tags="Technical,Software Security,Standard Operating Environments"


><![CDATA[<p>The use of antivirus and anti-malware software, while adding value to the defence of workstations, cannot be relied solely upon to protect the workstation. As such agencies still need to deploy appropriately hardened SOEs to assist with the protection of workstations against a broader range of security risks.</p>]]></paragraph>
<paragraph
    title="14.1.8.C.01."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1149"
><![CDATA[<p>Agencies SHOULD develop a hardened SOE for workstations and servers, covering:</p><ul>
<li>removal of unneeded software and operating system components;</li>
<li>removal or disabling of unneeded services, ports and BIOS settings;</li>
<li>disabling of unused or undesired functionality in software and operating systems;</li>
<li>implementation of access controls on relevant objects to limit system users and programs to the minimum access required;</li>
<li>installation of antivirus and anti-malware software;</li>
<li>installation of software-based firewalls limiting inbound and outbound network connections; </li>
<li>configuration of either remote logging or the transfer of local event logs to a central server; and</li>
<li>protection of audit and other logs through the use of a one way pipe to reduce likelihood of compromise key transaction records.</li>
</ul>]]></paragraph>
</block>
<block title="Maintaining hardened SOEs"><paragraph
    title="14.1.9.R.01."

    tags="Technical,Software Security,Standard Operating Environments"


><![CDATA[<p>Whilst a SOE can be sufficiently hardened when it is deployed, its security will progressively degrade over time. Agencies can address the degradation of the security of a SOE by ensuring that patches are continually applied, system users are not able to disable or bypass security functionality and antivirus and other security software is appropriately maintained with the latest signatures and updates.</p>]]></paragraph>
<paragraph
    title="14.1.9.R.02."

    tags="Technical,Software Security,Standard Operating Environments"


><![CDATA[<p>End Point Agents monitor traffic and apply security policies on applications, storage interfaces and data in real-time. Administrators actively block or monitor and log policy breaches. The End Point Agent can also create forensic monitoring to facilitate incident investigation.</p>]]></paragraph>
<paragraph
    title="14.1.9.R.03."

    tags="Technical,SOPs,Standard Operating Environments"


><![CDATA[<p>End Point Agents can monitor user activity, such as the cut, copy, paste, print, print screen operations and copying data to external drives and other devices.  The Agent can then apply policies to limit such activity.</p>]]></paragraph>
<paragraph
    title="14.1.9.C.01."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Must"
    cid="1158"
><![CDATA[<p>Agencies MUST ensure that for all servers and workstations:</p><ul>
<li>a technical specification is agreed for each platform with specified controls;</li>
<li>a standard configuration created and updated for each operating system type and version;</li>
<li>system users do not have the ability to install or disable software without approval; and</li>
<li>installed software and operating system patching is up to date.</li>
</ul>]]></paragraph>
<paragraph
    title="14.1.9.C.02."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1159"
><![CDATA[<p>Agencies SHOULD ensure that for all servers and workstations:</p><ul>
<li>malware detection heuristics are set to a high level;</li>
<li>malware pattern signatures are checked for updates on at least a daily basis;</li>
<li>malware pattern signatures are updated as soon as possible after vendors make them available; </li>
<li>all disks and systems are regularly scanned for malicious code; and</li>
<li>the use of End Point Agents is considered.</li>
</ul>]]></paragraph>
</block>
<block title="Default passwords and accounts"><paragraph
    title="14.1.10.R.01."

    tags="Technical,Passwords,Software Security,Standard Operating Environments"


><![CDATA[<p>Default passwords and accounts for operating systems are often exploited by attackers as they are well documented in product manuals and can be easily checked in an automated manner with little effort required.</p>]]></paragraph>
<paragraph
    title="14.1.10.C.01."

    tags="Technical,Passwords,Software Security,Standard Operating Environments"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="1162"
><![CDATA[<p>Agencies MUST reduce potential vulnerabilities in their SOEs by:</p><ul>
<li>removing unused accounts;</li>
<li>renaming or deleting default accounts; and</li>
<li>replacing default passwords before or during the installation process.</li>
</ul>]]></paragraph>
<paragraph
    title="14.1.10.C.02."

    tags="Technical,Passwords,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1163"
><![CDATA[<p>Agencies SHOULD reduce potential vulnerabilities in their SOEs by:</p><ul>
<li>removing unused accounts;</li>
<li>renaming or deleting default accounts; and</li>
<li>replacing default passwords, before or during the installation process.</li>
</ul>]]></paragraph>
</block>
<block title="Server separation"><paragraph
    title="14.1.11.R.01."

    tags="Technical,Software Security,Standard Operating Environments"


><![CDATA[<p>Servers with a high security risk can include Web, email, file, Internet Protocol Telephony (IPT) servers, Mobile Device Manager (MDM) servers and gateway components. It is important to clearly identify all services and connections to design a complete and secure server separation architecture. Refer also to <a title="Gateway security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 – Gateway Security</a>.</p>]]></paragraph>
<paragraph
    title="14.1.11.C.01."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1169"
><![CDATA[<p>Where servers with a high security risk have connectivity to unsecure public networks, agencies SHOULD:</p><ul>
<li>use appropriately designed and configured gateways;</li>
<li>consider the use of cross-domain solutions;</li>
<li>segment networks;</li>
<li>maintain effective functional segregation between servers allowing them to operate independently;</li>
<li>minimise communications between servers at both the network and file system level as appropriate; and</li>
<li>limit system users and programs to the minimum access needed to perform their duties.</li>
</ul>]]></paragraph>
</block>
<block title="Characterisation"><paragraph
    title="14.1.12.R.01."

    tags="Technical,Characterisation,Software Security,Standard Operating Environments"


><![CDATA[<p>There are known techniques for defeating basic characterisations, therefore other methods of intrusion detection are also needed, particularly in situations where it is impractical to use a trusted environment for the generation of the characterisation data. Characterisation is very useful in post-intrusion forensic investigations where an infected disk can be compared to stored characterisation data in order to determine what files have been changed or introduced.</p>]]></paragraph>
<paragraph
    title="14.1.12.R.02."

    tags="Governance,Business Continuity,Characterisation,Risk Assessment,Software Security,Standard Operating Environments"


><![CDATA[<p>Characterisation is also directly related to business continuity and disaster recovery and is influenced by Business Impact Analyses and Risk Assessments.  Grouping elements by business applications and setting priority and criticality of the elements to the business may assist in determining the most appropriate and useful characterisations.</p>]]></paragraph>
<paragraph
    title="14.1.12.C.01."

    tags="Technical,Characterisation,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1185"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>characterise all servers whose functions are critical to the agency, and those identified as being at a high security risk of compromise;</li>
<li>store the characterisation information securely off the server in a manner that maintains integrity;</li>
<li>update the characterisation information after every legitimate change to a system as part of the change control process;</li>
<li>as part of the agency’s ongoing audit schedule, compare the stored characterisation information against current characterisation information to determine whether a compromise, or a legitimate but incorrectly completed system modification, has occurred;</li>
<li>perform the characterisation from a trusted environment rather than the standard operating system wherever possible; and</li>
<li>resolve any detected changes in accordance with the agency’s information security incident management procedures.</li>
</ul>]]></paragraph>
<paragraph
    title="14.1.12.C.02."

    tags="Approved Cryptographic Algorithms,Technical,Characterisation,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1189"
><![CDATA[<p>Agencies SHOULD use an Approved Cryptographic Algorithm to perform cryptographic checksums for characterisation purposes.</p>]]></paragraph>
<paragraph
    title="14.1.12.C.03."

    tags="Governance,Business Continuity,Characterisation,Risk Assessment,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1190"
><![CDATA[<p>Agencies SHOULD consider characterisations in the context of a BCP or DRP and any related Business Impact Analyses and Risk Assessments. </p>]]></paragraph>
</block>
<block title="Automated outbound connections by software"><paragraph
    title="14.1.13.R.01."

    tags="Technical,Software Security,Standard Operating Environments"


><![CDATA[<p>Applications that include beaconing functionality include those that initiate a connection to the vendor site over the Internet and inbound remote management.</p>]]></paragraph>
<paragraph
    title="14.1.13.C.01."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1193"
><![CDATA[<p>Agencies SHOULD review all software applications to determine whether they attempt to establish any unauthorised or unplanned external connections.</p>]]></paragraph>
<paragraph
    title="14.1.13.C.02."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1194"
><![CDATA[<p>If automated outbound connection functionality is included, agencies SHOULD make a business decision to determine whether to permit or deny these connections, including an assessment of the security risks involved in doing so.</p>]]></paragraph>
<paragraph
    title="14.1.13.C.03."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1195"
><![CDATA[<p>If automated outbound connection functionality is included, agencies SHOULD consider the implementation of Data Loss Prevention (DLP) technologies.</p>]]></paragraph>
</block>
<block title="Knowledge of software used on systems"><paragraph
    title="14.1.14.R.01."

    tags="Technical,Software Security,Standard Operating Environments"


><![CDATA[<p>Information about installed software, that could be disclosed outside the agency, can include:</p><ul>
<li>user agent on Web requests disclosing the Web browser type;</li>
<li>network and email client information in email headers; and</li>
<li>email server software headers.</li>
</ul><p>This information could provide a malicious entity with knowledge of how to tailor attacks to exploit vulnerabilities in the agency’s systems.</p>]]></paragraph>
<paragraph
    title="14.1.14.C.01."

    tags="Technical,Software Security,Standard Operating Environments"


    classification="All Classifications"
    compliance="Should"
    cid="1198"
><![CDATA[<p>Agencies SHOULD limit information that could be disclosed outside the agency about what software, and software versions are installed on their systems.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="14.2. Application Allow listing"><subsection title="Objective"><paragraph
    title="14.2.1."


><![CDATA[<p>Only approved applications are used on agency controlled systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="14.2.2."


><![CDATA[<p>This section covers information on the use of technical controls to restrict the specific applications that can be accessed by a user or group of users.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="14.2.3."


><![CDATA[<p>Further information on software restriction policies as implemented by Microsoft can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Using Software Restriction Policies to Protect Against Unauthorized Software</strong></td>
<td style="text-align: center;">Microsoft</td>
<td><a rel="noopener noreferrer" href="https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-xp/bb457006(v=technet.10)?redirectedfrom=MSDN" target="_blank">https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-xp/bb457006(v=technet.10)?redirectedfrom=MSDN</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>APPLOCKER</strong></td>
<td style="text-align: center;">Microsoft</td>
<td><a rel="noopener noreferrer" href="https://docs.microsoft.com/en-nz/windows/security/threat-protection/applocker/applocker-overview" target="_blank">https://docs.microsoft.com/en-nz/windows/security/threat-protection/applocker/applocker-overview</a>&nbsp;<a rel="noopener noreferrer" href="http://www.asd.gov.au/publications/protect/Application_Whitelisting.pdf" target="_blank"></a></td>
</tr>
<tr>
<td><strong>SP&nbsp;800-167</strong></td>
<td><strong>NIST Special Publication 800-167 - Guide to Application Whitelisting</strong></td>
<td style="text-align: center;">NIST</td>
<td><a rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-167.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-167.pdf [PDF, 622 KB]</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Application allow listing"><paragraph
    title="14.2.4.R.01."

    tags="Technical,Application allow listing,Software Security"


><![CDATA[<p>Application access control can be an effective mechanism to prevent the successful compromise of an agency system resulting from the exploitation of a vulnerability in an application or the execution of malicious code.</p>]]></paragraph>
<paragraph
    title="14.2.4.R.02."

    tags="Technical,Application allow listing,Software Security"


><![CDATA[<p>Defining a list of trusted executables, an allow list, is a practical and secure method of securing a system rather than relying on a list of bad executables, a deny list, to be prevented from running.</p>]]></paragraph>
<paragraph
    title="14.2.4.R.03."

    tags="Technical,Application allow listing,Software Security"


><![CDATA[<p>Application allow listing is considered only one part of a defence-in-depth strategy in order to prevent a successful attack, or to help mitigate consequences arising from an attack.</p>]]></paragraph>
<paragraph
    title="14.2.4.C.01."

    tags="Technical,Application allow listing,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="1234"
><![CDATA[<p>Agencies SHOULD implement application allow listing as part of the SOE for workstations, servers and any other network device.</p>]]></paragraph>
</block>
<block title="System user permissions"><paragraph
    title="14.2.5.R.01."

    tags="Technical,Application allow listing,Software Security,System Access"


><![CDATA[<p>An average system user requires access to only a few applications, or groups of applications, in order to conduct their work. Restricting the system user’s permissions to execute code to this limited set of applications reduces the attack surface of the system.</p>]]></paragraph>
<paragraph
    title="14.2.5.C.01."

    tags="Technical,Application allow listing,Software Security,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1242"
><![CDATA[<p>Agencies MUST ensure that a system user cannot disable the application allow listing mechanism.</p>]]></paragraph>
<paragraph
    title="14.2.5.C.02."

    tags="Technical,Application allow listing,Software Security,System Access"


    classification="All Classifications"
    compliance="Should"
    cid="1246"
><![CDATA[<p>Agencies SHOULD prevent a system user from running arbitrary executables.</p>]]></paragraph>
<paragraph
    title="14.2.5.C.03."

    tags="Technical,Application allow listing,Software Security,System Access"


    classification="All Classifications"
    compliance="Should"
    cid="896"
><![CDATA[<p>Agencies SHOULD restrict a system user’s rights in order to permit them to only execute a specific set of predefined executables as required for them to complete their duties.</p>]]></paragraph>
<paragraph
    title="14.2.5.C.04."

    tags="Technical,Application allow listing,Software Security,System Access"


    classification="All Classifications"
    compliance="Should"
    cid="898"
><![CDATA[<p>Agencies SHOULD ensure that application allow listing does not replace the antivirus and anti-malware software within a system.</p>]]></paragraph>
</block>
<block title="System administrator permissions"><paragraph
    title="14.2.6.R.01."

    tags="Technical,Application allow listing,Software Security"


><![CDATA[<p>Since the consequences of running malicious code as a privileged user are much more severe than an unprivileged user, an application allow list implementation should be strictly enforced for system administrators.</p>]]></paragraph>
<paragraph
    title="14.2.6.C.01."

    tags="Technical,Application allow listing,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="907"
><![CDATA[<p>Agencies SHOULD ensure that system administrators are not automatically exempt from application allow list policy.</p>]]></paragraph>
</block>
<block title="Application allow listing configuration"><paragraph
    title="14.2.7.R.01."

    tags="Technical,Application allow listing,Software Security"


><![CDATA[<p>A decision to execute a routine, application, or other programme should be made based on a validated cryptographic hash as it is more secure than a decision based on the executable’s signature, path or parent folder.</p>]]></paragraph>
<paragraph
    title="14.2.7.R.02."

    tags="Technical,Application allow listing,Software Security"


><![CDATA[<p>In order for application allow listing to be effective an agency MUST initially gather information on necessary executables and applications in order to ensure that the implementation is fully effective.</p>]]></paragraph>
<paragraph
    title="14.2.7.R.03."

    tags="Technical,Application allow listing,Software Security"


><![CDATA[<p>Different application allow listing controls, such as restricting execution based on cryptographic hash, filename, pathname or folder, have various advantages and disadvantages.  Agencies need to be aware of this when implementing application allow listing.</p>]]></paragraph>
<paragraph
    title="14.2.7.R.04."

    tags="Technical,Application allow listing,Software Security"


><![CDATA[<p>Application allow listing based on parent folder or executable path is futile if access control list permissions allow a system user to write to the folders or overwrite permitted executables.</p>]]></paragraph>
<paragraph
    title="14.2.7.R.05."

    tags="Technical,Application allow listing,Software Security"


><![CDATA[<p>Executables may create multiple processes in the course of execution.  These may be identified through examination of programme specifications, testing in a "sand-boxed" environment before development, and logs of any processes spawned or created.</p>]]></paragraph>
<paragraph
    title="14.2.7.R.06."

    tags="Technical,Application allow listing,Software Security"


><![CDATA[<p>Spawned processes may behave in ways that can compromise system security, change security settings and modify access permissions.  Clearly this can be undesirable behaviour.</p>]]></paragraph>
<paragraph
    title="14.2.7.R.07."

    tags="Technical,Application allow listing,Software Security"


><![CDATA[<p>Adequate logging information can allow system administrators to further refine the application allow listing implementation and detect a pattern of deny decisions for a system user.</p>]]></paragraph>
<paragraph
    title="14.2.7.R.08."

    tags="Technical,Application allow listing,Software Security"


><![CDATA[<p>An example of relevant information that could be included in logs for application allow listing implementations would be decisions to deny execution incorporating information that would present a reviewer with evidence of misuse.</p>]]></paragraph>
<paragraph
    title="14.2.7.C.01."

    tags="Technical,Application allow listing,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="934"
><![CDATA[<p>Agencies SHOULD ensure that the default policy is to deny the execution of software.</p>]]></paragraph>
<paragraph
    title="14.2.7.C.02."

    tags="Technical,Application allow listing,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="936"
><![CDATA[<p>Agencies SHOULD ensure that application allow listing is used in addition to a strong access control list model and the use of limited privilege accounts.</p>]]></paragraph>
<paragraph
    title="14.2.7.C.03."

    tags="Technical,Application allow listing,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="940"
><![CDATA[<p>Agencies SHOULD plan and test application allow listing mechanisms and processes thoroughly prior to implementation.</p>]]></paragraph>
<paragraph
    title="14.2.7.C.04."

    tags="Technical,Application allow listing,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="942"
><![CDATA[<p>Agencies SHOULD restrict the decision whether to run an executable based on the following, in the order of preference shown:</p><ol>
<li>validates cryptographic hash;</li>
<li>executable absolute path;</li>
<li>digital signature; and</li>
<li>parent folder.</li>
</ol>]]></paragraph>
<paragraph
    title="14.2.7.C.05."

    tags="Technical,Application allow listing,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="945"
><![CDATA[<p>Agencies SHOULD restrict the process creation permissions of any executables which are permitted to run by the application allow listing controls.</p>]]></paragraph>
<paragraph
    title="14.2.7.C.06."

    tags="Technical,Application allow listing,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="5529"
><![CDATA[<p>Agencies SHOULD validate executable behaviour, in particular process creation, permission changes and access control modifications through examination, testing, monitoring and restriction of the permissions.</p>]]></paragraph>
<paragraph
    title="14.2.7.C.07."

    tags="Technical,Application allow listing,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="947"
><![CDATA[<p>Logs from the application allow listing implementation SHOULD include all relevant information.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="14.3. Web Applications"><subsection title="Objective"><paragraph
    title="14.3.1."


><![CDATA[<p>Access to Web content is implemented in a secure and accountable manner.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="14.3.2."


><![CDATA[<p>This section covers information on Web browsers, plug-ins and active content including the development and implementation of appropriate use policies. </p>]]></paragraph>
<paragraph
    title="14.3.3."


><![CDATA[<p>The requirements in this section apply equally to the Web accessed via the Internet as well as websites accessed on an agency intranet.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="14.3.4."


><![CDATA[<p>An example of open source software&nbsp;that manages allow lists for client-side JavaScript controls is available at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>NoScript Firefox extension</strong></td>
<td style="text-align: center;">Inform Action</td>
<td>
<p><a rel="noopener noreferrer" href="https://noscript.net/" target="_blank">https://noscript.net/</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Web usage policy"><paragraph
    title="14.3.5.R.01."

    tags="Governance,Information Security Documentation,Software Security,Web Applications"


><![CDATA[<p>If agencies allow system users to access the Web they will need to define the extent of Web access that is granted. This can be achieved through the development, and awareness raising amongst system users, of a Web usage policy.</p>]]></paragraph>
<paragraph
    title="14.3.5.C.01."

    tags="Governance,Information Security Documentation,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Must"
    cid="1272"
><![CDATA[<p>Agencies MUST develop and implement a policy governing appropriate Web usage.</p>]]></paragraph>
</block>
<block title="Web proxy"><paragraph
    title="14.3.6.R.01."

    tags="Technical,Software Security,Web Applications"


><![CDATA[<p>Web proxies provide valuable information in determining if malicious code is performing regular interactions over Web traffic. Web proxies also provide usable information if system users are violating agency Web usage policies.</p>]]></paragraph>
<paragraph
    title="14.3.6.C.01."

    tags="Technical,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1592"
><![CDATA[<p>Agencies SHOULD use a Web proxy for all Web browsing activities.</p>]]></paragraph>
<paragraph
    title="14.3.6.C.02."

    tags="Technical,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1593"
><![CDATA[<p>An agency’s Web proxy SHOULD authenticate system users and provide logging that includes at least the following details about websites accessed:</p><ul>
<li>address (uniform resource locator);</li>
<li>time/date;</li>
<li>system user;</li>
<li>internal IP address; and</li>
<li>external IP address.</li>
</ul>]]></paragraph>
<paragraph
    title="14.3.6.C.03."

    tags="Governance,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should Not"
    cid="1594"
><![CDATA[<p>Agencies SHOULD NOT permit downloading of executable files from external websites unless there is a demonstrable and approved business requirement.</p>]]></paragraph>
</block>
<block title="Applications and plug-ins"><paragraph
    title="14.3.7.R.01."

    tags="Technical,Software Security,Web Applications"


><![CDATA[<p>Web browsers can be configured to allow the automatic launching of downloaded files.  This can occur with or without the system user’s knowledge thus making the workstation vulnerable to attack.</p>]]></paragraph>
<paragraph
    title="14.3.7.C.01."

    tags="Technical,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1597"
><![CDATA[<p>Agencies SHOULD disable the automatic launching of files downloaded from external websites.</p>]]></paragraph>
</block>
<block title="Inspection of TLS"><paragraph
    title="14.3.8.R.01."

    tags="Technical,Software Security,TLS,Web Applications"


><![CDATA[<p>As TLS encrypted Web traffic travelling over HTTPS connections can deliver content without any filtering, agencies can reduce this security risk by using TLS inspection so that the Web traffic can be filtered.</p>]]></paragraph>
<paragraph
    title="14.3.8.R.02."

    tags="Technical,Software Security,TLS,Web Applications"


><![CDATA[<p>An alternative of using an allow list for HTTPS websites can allow websites that have a low security risk of delivering malicious code and have a high privacy requirement like Web banking, to continue to have end-to-end encryption.</p>]]></paragraph>
<paragraph
    title="14.3.8.R.03."

    tags="Technical,Software Security,TLS,Web Applications"


><![CDATA[<p>It is however, important to note that there are many recorded cases of websites generally considered to be a low security risk that have been compromised.</p>]]></paragraph>
<paragraph
    title="14.3.8.C.01."

    tags="Technical,Software Security,TLS,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1602"
><![CDATA[<p>Agencies permitting TLS through their gateways SHOULD implement:</p><ul>
<li>a solution that decrypts and inspects the TLS traffic as per content filtering requirements; or</li>
<li>an allow list specifying the addresses (uniform resource locators) to which encrypted connections are permitted, with all other addresses blocked.</li>
</ul>]]></paragraph>
</block>
<block title="Legal advice on the Inspection of TLS traffic"><paragraph
    title="14.3.9.R.01."

    tags="Governance,Software Security,TLS,Web Applications"


><![CDATA[<p>Encrypted TLS traffic may contain personal information. Agencies should seek legal advice on whether inspecting such traffic is in breach of the Privacy Act or other legislation. User policies should incorporate an explanation of the security drivers and acknowledgement from users on the policy contents and requirements. Refer to <a title="Personnel security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 – Personnel Security</a> and <a title="Email security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15182">Chapter 15 – Email Security</a>.</p>]]></paragraph>
<paragraph
    title="14.3.9.C.01."

    tags="Governance,Software Security,TLS,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1605"
><![CDATA[<p>Agencies SHOULD seek legal advice regarding the inspection of encrypted TLS traffic by their gateways.</p>]]></paragraph>
</block>
<block title="Allow listing / Deny listing websites"><paragraph
    title="14.3.10.R.01."

    tags="Technical,Allow listing,Software Security,Web Applications"


><![CDATA[<p>Defining an allow list of permitted websites and blocking all unlisted websites limits one of the most common data delivery and exfiltration techniques used by malicious code. However, if agency personnel have a legitimate requirement to access a numerous and rapidly changing list of websites, agencies will need to consider the practicality and costs of such an implementation. In such cases deny listing is a limited but none-the-less effective measure.</p>]]></paragraph>
<paragraph
    title="14.3.10.C.01."

    tags="Technical,Allow listing,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1609"
><![CDATA[<p>Agencies SHOULD implement allow listing for all HTTP traffic being communicated through their gateways.</p>]]></paragraph>
<paragraph
    title="14.3.10.C.02."

    tags="Technical,Allow listing,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1608"
><![CDATA[<p>Agencies using an allow list on their gateways to specify the external addresses, to which encrypted connections are permitted, SHOULD specify allow list addresses by domain name or IP address.</p>]]></paragraph>
<paragraph
    title="14.3.10.C.03."

    tags="Technical,Allow listing,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1610"
><![CDATA[<p>If agencies do not allow list websites they SHOULD deny list websites to prevent access to known malicious websites.</p>]]></paragraph>
<paragraph
    title="14.3.10.C.04."

    tags="Technical,Allow listing,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1611"
><![CDATA[<p>Agencies deny listing websites SHOULD update the deny list on a frequent basis to ensure that it remains effective.</p>]]></paragraph>
</block>
<block title="Client-side active content"><paragraph
    title="14.3.11.R.01."

    tags="Technical,Software Security,Web Applications"


><![CDATA[<p>Software that runs on agency systems SHOULD be controlled by the agency. Active content delivered though websites should be constrained so that it cannot arbitrarily access system users’ files or deliver malicious code. Unfortunately the implementations of Web browsers regularly contain flaws that permit such activity.</p>]]></paragraph>
<paragraph
    title="14.3.11.C.01."

    tags="Technical,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1614"
><![CDATA[<p>Agencies SHOULD block client-side active content, such as Java and ActiveX, which are assessed as having a limited business impact.</p>]]></paragraph>
<paragraph
    title="14.3.11.C.02."

    tags="Technical,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1615"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>use client-side controls that allow JavaScript on a per website basis; and</li>
<li>add JavaScript functions used only for malicious purposes to the agency Web content filter or IDS/IPS.</li>
</ul>]]></paragraph>
</block>
<block title="Web content filter"><paragraph
    title="14.3.12.R.01."

    tags="Technical,Software Security,Web Applications,Content Filtering"


><![CDATA[<p>Using a Web proxy provides agencies with an opportunity to filter potentially harmful information to system users and their workstations.</p>]]></paragraph>
<paragraph
    title="14.3.12.C.01."

    tags="Technical,Software Security,Web Applications,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="1618"
><![CDATA[<p>Agencies SHOULD use the Web proxy to filter content that is potentially harmful to system users and their workstations.</p>]]></paragraph>
</block>
<block title="Website Passwords"><paragraph
    title="14.3.13.R.01."

    tags="Technical,Passwords,Software Security,Web Applications"


><![CDATA[<p>Some websites require the use of a userID and password as the authentication mechanism. The management of passwords on these websites is often insecure and there are numerous examples of compromises where tens of thousands, and sometimes millions of passwords are compromised in a single incident. Where the same password is used on multiple websites, an incident can potentially compromise the user’s account on every website using that password. It is important to treat these websites as insecure and manage passwords appropriately.</p>]]></paragraph>
<paragraph
    title="14.3.13.C.01."

    tags="Technical,Passwords,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Must Not"
    cid="1621"
><![CDATA[<p>Users MUST NOT use agency userID and login passwords as credentials for external websites.</p>]]></paragraph>
<paragraph
    title="14.3.13.C.02."

    tags="Technical,Passwords,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should Not"
    cid="1622"
><![CDATA[<p>Users SHOULD NOT store web site authentication credentials (userID and password) on workstations, remote access devices (such as laptops) or BYO devices.</p>]]></paragraph>
<paragraph
    title="14.3.13.C.03."

    tags="Technical,Passwords,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should Not"
    cid="1623"
><![CDATA[<p>Users SHOULD NOT use the same password for multiple websites.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="14.4. Software Application Development"><subsection title="Objective"><paragraph
    title="14.4.1."


><![CDATA[<p>Secure programming methods and testing are used for application development in order to minimise the number of coding errors and introduction of security vulnerabilities.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="14.4.2."


><![CDATA[<p>This section covers information relating to the development, upgrade and maintenance of application software used on agency systems.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="14.4.3."


><![CDATA[<p>Additional information relating to software development is contained in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>ISO/IEC 27001:2013&nbsp;</strong></td>
<td><strong><strong>A.12.5,&nbsp;</strong>Security in Development and Support Processes</strong></td>
<td style="text-align: center;">ISO</td>
<td><a title="Information technology — Security techniques — Information security management systems — Requirements" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>OWASP Secure Coding Practices - Quick Reference Guide</strong></p>
</td>
<td style="text-align: center;">OWASP</td>
<td><a rel="noopener noreferrer" href="https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide" target="_blank">https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide</a>&nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Secure Code Review</strong></p>
</td>
<td style="text-align: center;">
<p>MITRE Corporation</p>
</td>
<td><a rel="noopener noreferrer" href="https://www.mitre.org/publications/systems-engineering-guide/enterprise-engineering/systems-engineering-for-mission-assurance/secure-code-review" target="_blank">https://www.mitre.org/publications/systems-engineering-guide/enterprise-engineering/systems-engineering-for-mission-assurance/secure-code-review&nbsp;</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Build Security In</strong></p>
</td>
<td style="text-align: center;">
<p>DHS – US-CERT</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.us-cert.gov/bsi" target="_blank">https://www.us-cert.gov/bsi</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Application Security - Application Security &amp; Development A To Z</strong></p>
</td>
<td style="text-align: center;">
<p>US Defense Information Security Agency (DISA)</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://iase.disa.mil/stigs/app-security/app-security/Pages/index.aspx" target="_blank">http://iase.disa.mil/stigs/app-security/app-security/Pages/index.aspx</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Writing Secure Code - Michael Howard and David LeBlanc</strong></p>
</td>
<td style="text-align: center;">
<p>Microsoft Press</p>
</td>
<td>ISBN Book 978-0-7356-1722-3<br> ISBN eBook 978-0-7356-9146-9</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Software development environments"><paragraph
    title="14.4.4.R.01."

    tags="Technical,Software Security"


><![CDATA[<p>Recognised good practice segregates development, testing and production environments to limit the spread of malicious code and minimise the likelihood of faulty code being put into production.<br>Limiting access to development and testing environments will reduce the information that can be gained by an attacker.</p>]]></paragraph>
<paragraph
    title="14.4.4.C.01."

    tags="Technical,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="1635"
><![CDATA[<p>Agencies SHOULD ensure that software development environments are configured such that:</p><ul>
<li>there are at least three separate environments covering:
<ul>
<li>development;</li>
<li>testing; and</li>
<li>production.</li>
</ul>
</li>
<li>information flow between the environments is strictly limited according to a defined and documented change policy, with access granted only to system users with a clear business requirement;</li>
<li>new development and modifications only take place in the development environment; and</li>
<li>write access to the authoritative source for the software (source libraries &amp; production environment) is disabled.</li>
</ul>]]></paragraph>
</block>
<block title="Secure programming"><paragraph
    title="14.4.5.R.01."

    tags="Technical,Software Security"


><![CDATA[<p>Designing software to use the lowest privilege level needed to achieve its task will limit the privileges an attacker could gain in the event they subvert the software security.</p>]]></paragraph>
<paragraph
    title="14.4.5.R.02."

    tags="Technical,Software Security"


><![CDATA[<p>Validating all inputs will ensure that the input is within expected ranges, reducing the chance that malicious or erroneous input causes unexpected results.</p>]]></paragraph>
<paragraph
    title="14.4.5.C.01."

    tags="Technical,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="1639"
><![CDATA[<p>Agencies SHOULD ensure that software developers use secure programming practices when writing code, including:</p><ul>
<li>designing software to use the lowest privilege level needed to achieve its task;</li>
<li>denying access by default;</li>
<li>checking return values of all system calls; and</li>
<li>validating all inputs.</li>
</ul>]]></paragraph>
</block>
<block title="Software testing"><paragraph
    title="14.4.6.R.01."

    tags="Technical,Software Security"


><![CDATA[<p>Software reviewing and testing will reduce the possibility of introducing vulnerabilities into a production environment.</p>]]></paragraph>
<paragraph
    title="14.4.6.R.02."

    tags="Technical,Software Security"


><![CDATA[<p>Using an independent party for software testing will limit any bias that can occur when a developer tests their own software.</p>]]></paragraph>
<paragraph
    title="14.4.6.C.01."

    tags="Technical,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="1643"
><![CDATA[<p>Software SHOULD be reviewed or tested for vulnerabilities before it is used in a production environment.</p>]]></paragraph>
<paragraph
    title="14.4.6.C.02."

    tags="Technical,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="1644"
><![CDATA[<p>Software SHOULD be reviewed or tested by an independent party as well as the developer.</p>]]></paragraph>
<paragraph
    title="14.4.6.C.03."

    tags="Technical,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="1645"
><![CDATA[<p>Software development SHOULD follow secure coding practices and agency development standards.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="14.5. Web Application Development"><subsection title="Objective"><paragraph
    title="14.5.1."


><![CDATA[<p>Security mechanisms are incorporated into all Web applications by design and implementation.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="14.5.2."


><![CDATA[<p>This section covers the deployment of agency Web applications and websites.</p>]]></paragraph>
</block>
<block title="Protecting Web servers"><paragraph
    title="14.5.3."


><![CDATA[<p>Even though Web servers may contain only information authorised for release into the public domain, there still remains a need to protect the integrity and availability of the information.  As such, Web servers are to be treated in accordance with the requirements of the classification of the system they are connected to.</p>]]></paragraph>
</block>
<block title="Web application components"><paragraph
    title="14.5.4."


><![CDATA[<p>Web application components at a high level consist of a Web server for presentation, a Web application for processing and a database for content storage. There can be more or fewer components, however in general there is a presentation layer, application layer and database layer.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="14.5.5."


><![CDATA[<p>Further information on Web application security is available from the Open Web Application Security Project at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>The Open Web Application Security Project (OWASP) - Reference</strong></p>
</td>
<td style="text-align: center;">OWASP</td>
<td>
<p><a rel="noopener noreferrer" href="https://owasp.org/" target="_blank">https://owasp.org/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>NZ Digital Government - Security and Privacy assurance</strong></p>
</td>
<td style="text-align: center;">DIA</td>
<td><a title="Digital Government - security and privacy assurance" rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/governance/managing-online-channels/security-and-privacy-for-websites/designing-for-security-and-privacy/security-and-privacy-assurance/" target="_blank">https://www.digital.govt.nz/standards-and-guidance/governance/managing-online-channels/security-and-privacy-for-websites/designing-for-security-and-privacy/security-and-privacy-assurance/&nbsp;</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Web Design and Applications</strong></p>
</td>
<td style="text-align: center;">
<p>W3C</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.w3.org/standards/webdesign/" target="_blank">https://www.w3.org/standards/webdesign/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Web Development – Patterns and Practices</strong></p>
</td>
<td style="text-align: center;">
<p>Microsoft</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://msdn.microsoft.com/en-us/library/ff921348.aspx" target="_blank">https://msdn.microsoft.com/en-us/library/ff921348.aspx</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Agency website content"><paragraph
    title="14.5.6.R.01."

    tags="Technical,Software Security,Web Applications"


><![CDATA[<p>Reviewing active content on agency Web servers will assist in identifying and mitigating information security issues.</p>]]></paragraph>
<paragraph
    title="14.5.6.C.01."

    tags="Technical,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1661"
><![CDATA[<p>Agencies SHOULD review all active content on their Web servers for known information security issues.</p>]]></paragraph>
</block>
<block title="Segregation of Web application components"><paragraph
    title="14.5.7.R.01."

    tags="Technical,Software Security,Web Applications"


><![CDATA[<p>Web applications are typically very exposed services that provide complex interactions with system users. This greatly increases the security risk of being compromised. By segregating components, the impact of potential application flaws or attacks is limited.</p>]]></paragraph>
<paragraph
    title="14.5.7.C.01."

    tags="Technical,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1664"
><![CDATA[<p>Agencies SHOULD minimise connectivity and access between each Web application component.</p>]]></paragraph>
</block>
<block title="Web applications"><paragraph
    title="14.5.8.R.01."

    tags="Technical,Software Security,Web Applications"


><![CDATA[<p>The Open Web Application Security Project guide provides a comprehensive resource to consult when developing Web applications.</p>]]></paragraph>
<paragraph
    title="14.5.8.C.01."

    tags="Technical,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1667"
><![CDATA[<p>Agencies SHOULD follow the documentation provided in the Open Web Application Security Project guide to building secure Web applications and Web services.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="15. Email security"><section title="15.1. Email Applications"><subsection title="Objective"><paragraph
    title="15.1.1."


><![CDATA[<p>Email messages have appropriate protective markings to facilitate the application of handling instructions.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="15.1.2."


><![CDATA[<p>This section covers information on email policy and usage as it applies to content and protective markings. &nbsp;Information on email infrastructure is located in <a title="Email infrastructure" href="http://nzism.gcsb.govt.nz/ism-document#Section-15250">Section 15.2 - Email Infrastructure</a>.</p>]]></paragraph>
</block>
<block title="Automatically generated emails"><paragraph
    title="15.1.3."


><![CDATA[<p>The requirements for emails within this section equally apply to automatically and manually generated emails.</p>]]></paragraph>
</block>
<block title="Exceptions for receiving unmarked email messages"><paragraph
    title="15.1.4."


><![CDATA[<p>Where an agency receives unmarked non-government emails as part of its business practice the application of protective markings can be automated.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="15.1.5."


><![CDATA[<p>Further references can be found at:</p><table class="table-main" style="width: 819.844px;">
<tbody>
<tr>
<td style="width: 79px;"><strong>Reference</strong></td>
<td style="width: 88px;"><strong>Title</strong></td>
<td style="width: 74px;"><strong>Publisher</strong></td>
<td style="width: 550.844px;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 79px;">
<p><strong>SP 800-45</strong></p>
</td>
<td style="width: 88px;">
<p><strong>NIST publication SP 800-45 v2, Guidelines on Electronic Mail Security</strong></p>
</td>
<td style="text-align: center; width: 74px;">NIST</td>
<td style="width: 550.844px;">
<p><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-45/version-2/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-45/version-2/final</a></p>
</td>
</tr>
<tr>
<td style="width: 79px;">&nbsp;</td>
<td style="width: 88px;">
<p><strong>Detecting socially engineered emails August 2012</strong></p>
</td>
<td style="text-align: center; width: 74px;">ASD</td>
<td style="width: 550.844px;">
<p><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/detecting-socially-engineered-messages" target="_blank">Detecting Socially Engineered Messages | Cyber.gov.au</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="15.1.6."


><![CDATA[<p class="NormS10C7">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td>
<p>GOV2, GOV3, GOV4, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</p>
</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a><a title="PSR Mandatory Requirements - Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/information-security/mandatory-requirements-2/" target="_blank"></a>&nbsp;&nbsp;&nbsp;</p>
<p><a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a><a title="PSR Mandatory Requirements - Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/physical-security/physical-security-mandatory-requirements-2/" target="_blank">/</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Email usage policy"><paragraph
    title="15.1.7.R.01."

    tags="Governance,Information Security Documentation,Email,Email Security"


><![CDATA[<p>There are many security risks associated with the unsecure nature of email that are often overlooked. Documenting them will inform information owners about these security risks and how they might affect business operations.</p>]]></paragraph>
<paragraph
    title="15.1.7.C.01."

    tags="Governance,Information Security Documentation,Email,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1684"
><![CDATA[<p>Agencies MUST develop and implement a policy governing the use of email.</p>]]></paragraph>
</block>
<block title="Email distribution"><paragraph
    title="15.1.8.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Often the membership, clearance level and nationality of members of email distribution lists is unknown. As such, personnel sending sensitive emails with NZEO or other nationality releasability marked information could be accidentally causing an information security incident by sending such information to distribution lists.</p>]]></paragraph>
<paragraph
    title="15.1.8.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1687"
><![CDATA[<p>Agencies MUST ensure that emails containing NZEO or other nationality releasability marked information are sent only to named recipients.</p>]]></paragraph>
<paragraph
    title="15.1.8.C.02."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Must Not"
    cid="1688"
><![CDATA[<p>Agencies MUST NOT transmit emails or other documents, containing NZEO or other nationality releasability marks, to groups or distribution lists unless the nationality of all members of the distribution lists can be confirmed.</p>]]></paragraph>
</block>
<block title="Protective marking standard"><paragraph
    title="15.1.9.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Applying markings that reflect the protective requirements of an email informs the recipient on how to appropriately handle the email and any related documents.</p>]]></paragraph>
<paragraph
    title="15.1.9.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1691"
><![CDATA[<p>Agencies SHOULD comply with the national classification system for the application of protective markings.</p>]]></paragraph>
</block>
<block title="Marking tools"><paragraph
    title="15.1.10.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Requiring system user intervention in the marking of system user-generated emails assures a conscious decision by the system user, lessening the chance of incorrectly marked emails.</p>]]></paragraph>
<paragraph
    title="15.1.10.R.02."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Limiting the protective markings a system user is allowed to choose, to those for which the system is accredited lessens the chance that a system user inadvertently over-classifies an email and reminds them of the maximum classification of information that is permitted on the system.</p>]]></paragraph>
<paragraph
    title="15.1.10.R.03."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Gateway filters usually check only the most recent protective marking.  Care MUST be taken when changing protective markings to a classification lower than that of the original email as this can result in emails being forwarded to systems or individuals NOT authorised and cleared to receive them.   The instructions in the classification system on changing classifications MUST be observed to avoid a security breach.</p>]]></paragraph>
<paragraph
    title="15.1.10.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Must Not"
    cid="1696"
><![CDATA[<p>Agencies MUST NOT allow system users to select protective markings that the system has not been accredited to process, store or communicate.</p>]]></paragraph>
<paragraph
    title="15.1.10.C.02."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should Not"
    cid="1697"
><![CDATA[<p>Agencies SHOULD NOT allow a protective marking to be inserted into system user generated emails without their intervention.</p>]]></paragraph>
<paragraph
    title="15.1.10.C.03."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should Not"
    cid="1698"
><![CDATA[<p>Agencies SHOULD NOT permit system users replying to or forwarding an email to select a protective marking that indicates that the classification of the email is lower than a previous classification used for the email.</p>]]></paragraph>
</block>
<block title="Marking classified and unclassified emails"><paragraph
    title="15.1.11.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>As with paper-based information, all electronic-based information should be marked with an appropriate protective marking in accordance with the classification system.  This ensures that appropriate security measures are applied to the information and also assists in preventing the inadvertent release of information into the public domain.</p>]]></paragraph>
<paragraph
    title="15.1.11.R.02."

    tags="Governance,Email,Email Security"


><![CDATA[<p>When a protective marking is applied to an email it is important that it reflects the highest classification in the body of the email and any attachments within the email.</p>]]></paragraph>
<paragraph
    title="15.1.11.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1702"
><![CDATA[<p>All classified and unclassified emails MUST have a protective marking.</p>]]></paragraph>
<paragraph
    title="15.1.11.C.02."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1703"
><![CDATA[<p>Email protective markings MUST accurately reflect the highest classification of all elements in an email, including any attachments.</p>]]></paragraph>
<paragraph
    title="15.1.11.C.03."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1704"
><![CDATA[<p>Agencies SHOULD include protective markings in the email subject line or header to facilitate early identification of the classification.</p>]]></paragraph>
</block>
<block title="Emails from outside the government"><paragraph
    title="15.1.12.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>If an email is received from outside government the system user has an obligation to determine the appropriate protective measures for the email if it is to be responded to, forwarded or printed.</p>]]></paragraph>
<paragraph
    title="15.1.12.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1707"
><![CDATA[<p>Where an unmarked email has originated outside the government, the agency MUST assess the information and determine how it is to be handled in accordance with the classification system.</p>]]></paragraph>
</block>
<block title="Marking personal emails"><paragraph
    title="15.1.13.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Applying protective markings to personal emails may create system overheads and will be misleading.</p>]]></paragraph>
<paragraph
    title="15.1.13.R.02."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Personal emails can be marked as “PERSONAL” or “UNOFFICIAL” to avoid confusion with Official or Classified information.</p>]]></paragraph>
<paragraph
    title="15.1.13.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should Not"
    cid="1711"
><![CDATA[<p>Where an email is of a personal nature and does not contain government information, protective markings SHOULD NOT be used.</p>]]></paragraph>
</block>
<block title="Receiving unmarked emails"><paragraph
    title="15.1.14.R.01."

    tags="Emanation Security,Governance,Email"


><![CDATA[<p>If an email is received from a New Zealand or overseas government agency without a protective marking the system user has an obligation to contact the originator to seek clarification on the appropriate protection measures for the email or follow established protocols and policy for protective markings.</p>]]></paragraph>
<paragraph
    title="15.1.14.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1714"
><![CDATA[<p>Where an unmarked email has originated from a New Zealand or overseas government agency, personnel SHOULD contact the originator to determine how it is to be handled.</p>]]></paragraph>
</block>
<block title="Receiving emails with unknown protective markings"><paragraph
    title="15.1.15.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>If an email is received with a protective marking that the system user is not familiar with they have an obligation to contact the originator to seek clarification on the protective marking and the appropriate protection measures for the email.</p>]]></paragraph>
<paragraph
    title="15.1.15.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1717"
><![CDATA[<p>Where an email is received with an unknown protective marking from a New Zealand or overseas government agency, personnel SHOULD contact the originator to determine appropriate protection measures.</p>]]></paragraph>
</block>
<block title="Printing"><paragraph
    title="15.1.16.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>The PSR requires that paper-based information have the classification of the information placed at the top and bottom of each piece of paper, in CAPITALS and appearing as the first and last item on each page.</p>]]></paragraph>
<paragraph
    title="15.1.16.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1720"
><![CDATA[<p>Agencies SHOULD configure systems so that the protective markings appear at the top and bottom of every page when the email is printed, in CAPITALS and appearing as the first and last item on each page.</p>]]></paragraph>
</block>
<block title="Active Web addresses within emails"><paragraph
    title="15.1.17.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Spoofed emails often contain an active Web address directing personnel to a malicious website to either elicit information or infect their workstation with malicious code. In order to reduce the success rate of such attacks agencies can choose to educate their personnel to neither send emails with active Web addresses or to click on Web addresses in emails that they receive.</p>]]></paragraph>
<paragraph
    title="15.1.17.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should Not"
    cid="1723"
><![CDATA[<p>Personnel SHOULD NOT send emails that contain active Web addresses or click on active Web addresses within emails they receive.</p>]]></paragraph>
</block>
<block title="Awareness of email usage policies"><paragraph
    title="15.1.18.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>In order to protect information and systems, system users will need to be familiar with email usage policies.</p>]]></paragraph>
<paragraph
    title="15.1.18.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1726"
><![CDATA[<p>Agencies MUST make their system users aware of the agency’s email usage policies.</p>]]></paragraph>
</block>
<block title="Monitoring email usage"><paragraph
    title="15.1.19.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Agencies may choose to monitor compliance with aspects of email usage policies such as attempts to send prohibited file types or executables, attempts to send excessive sized attachments or attempts to send classified information without appropriate protective markings.</p>]]></paragraph>
<paragraph
    title="15.1.19.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1729"
><![CDATA[<p>Agencies SHOULD implement measures to monitor their personnel’s compliance with email usage policies.</p>]]></paragraph>
<paragraph
    title="15.1.19.C.02."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1730"
><![CDATA[<p>Agencies SHOULD enforce the use of approved government email systems such as SEEMAIL.</p>]]></paragraph>
</block>
<block title="Public Web-based email services"><paragraph
    title="15.1.20.R.01."

    tags="Governance,Email,Email Security"


><![CDATA[<p>Using public Web-based email services may allow personnel to bypass security measures that agencies will have put in place to protect against malicious code or phishing attempts distributed via email. Web based email services may also by-pass agency context filtering mechanisms.</p>]]></paragraph>
<paragraph
    title="15.1.20.C.01."

    tags="Governance,Email,Email Security"


    classification="All Classifications"
    compliance="Should Not"
    cid="1733"
><![CDATA[<p>Agencies SHOULD NOT allow personnel to use public Web-based email services, for processing, receiving or sending emails or attachments for official business.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="15.2. Email Infrastructure"><subsection title="Objective"><paragraph
    title="15.2.1."


><![CDATA[<p>Email infrastructure is hardened, email is secured, and protective marking of email messages is enforced.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="15.2.2."


><![CDATA[<p>This section covers information on email infrastructure security, specifically email authentication and secure email transport. Information on using email applications can be found in <a title="Email applications" href="http://nzism.gcsb.govt.nz/ism-document#Section-15183">Section 15.1 - Email Applications</a> and <a title="Using the internet" href="http://nzism.gcsb.govt.nz/ism-document#Section-13449">Section 9.3 - Using the Internet</a>.</p>]]></paragraph>
<paragraph
    title="15.2.3."


><![CDATA[<p>Email is a critical tool for communication, and is commonly targeted by cyber-attacks. It is hard to protect because email is historically insecure and subject to social engineering. This section covers email authentication, secure email transport, and securing non-email sending domains.</p>]]></paragraph>
</block>
<block title="Email authentication"><paragraph
    title="15.2.4."


><![CDATA[<p>Email authentication protects your email from impersonation attacks like spoofing and phishing; phishing and malware distribution attacks are common internet security threats.&nbsp; To avoid agency domains being used fraudulently (e.g. for spam or spear-phishing), the following should be implemented:</p>
<ul>
<li>Sender Policy Framework (SPF)</li>
<li>DomainKeys Identified Mail (DKIM)</li>
<li>Domain-based Message Authentication, Reporting &amp; Conformance (DMARC) records</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.5."


><![CDATA[<p>Implementation of these features will help other mail servers authenticate the email they receive from your domains.&nbsp; It is important to note that DMARC is designed to protect against direct domain spoofing only.&nbsp; DMARC does not eliminate the need for additional forms of protection and analysis.&nbsp; It does, however, provide a way for participating senders and receivers to coordinate protective activities and streamline security processes.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Domain-based Message Authentication, Reporting and Conformance (DMARC)"> <block title="Vocabulary"><paragraph
    title="15.2.6"


><![CDATA[<p>The terms “none”, “reject” and “quarantine” are used to describe DMARC actions based on policy modes.&nbsp; In this usage:</p>
<ul>
<li>“none” means no action on the transmission or receipt of the email but continue to collect data and send reports;</li>
<li>By default, email under a “reject” policy setting is not delivered.&nbsp; “Reject” either:
<ul>
<li>refuses to accept non-compliant email, or</li>
<li>initially accepts the non-compliant email but prevents an email reaching the user.&nbsp; The acceptance process can generate a Delivery Status Notification (block/“bounce”) or simply delete/drop the email (block/delete);</li>
</ul>
</li>
<li>“quarantine” prevents an email from reaching the user but safely storing it so it can be accessed if required (a potentially suspicious email and/or attachment subject to additional scrutiny).&nbsp; Quarantined items can be released following a review and release process.</li>
</ul>]]></paragraph>
</block>
<block title="What is DMARC"><paragraph
    title="15.2.7."


><![CDATA[<p>Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email authentication policy and reporting protocol that:</p>
<ul>
<li>complements and unifies the existing validation checks performed by SPF and DKIM;</li>
<li>checks the stated origin of inbound emails using a combination of <a rel="noopener noreferrer" href="https://www.gov.uk/government/publications/email-security-standards/sender-policy-framework-spf" target="_blank">Sender Policy Framework</a> (SPF) and <a rel="noopener noreferrer" href="https://www.gov.uk/government/publications/email-security-standards/domainkeys-identified-mail-dkim" target="_blank">DomainKeys Identified Mail</a> (DKIM);</li>
<li>establishes a recipient email response for emails that fail the check;</li>
<li>requests recipient email services to report email sources and origins;</li>
<li>provides visibility over potentially illegitimate or fraudulent email.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.8."


><![CDATA[<p>DMARC builds on SPF and DKIM protocols, adding links to the author (“From:”) domain name, published policies for recipient handling of authentication failures, and reporting from receivers to senders, in order to improve and monitor protection of the recipient domain from fraudulent email.</p>]]></paragraph>
<paragraph
    title="15.2.9."


><![CDATA[<p>Most email services will check your DMARC record and send aggregated reports including details of all email the service received from the agency, and its origin.&nbsp; This assists in identifying if an individual within the agency is sending email inappropriately or if the agency domain is being spoofed.</p>]]></paragraph>
</block>
<block title="Background, Reference and Implementation Guidance Sources"><paragraph
    title="15.2.10."


><![CDATA[<p>The IETF published RFC 7489, “Domain-based Message Authentication, Reporting, and Conformance (DMARC)” 18 March 2015. This is the principal standards guidance on the implementation and use of DMARC.&nbsp;Further guidance is available from The Global Cyber Alliance (GCA) - see References below.</p>]]></paragraph>
</block>
<block title="Using DMARC"><paragraph
    title="15.2.11."


><![CDATA[<p>The combination of DMARC, SPF, and DKIM records in DNS automates the ability of email service providers to confirm which servers should be legitimately sending email from the agency’s domain, and what action to take with mail received from any other domains.</p>]]></paragraph>
<paragraph
    title="15.2.12."


><![CDATA[<p>As a pre-requisite for implementing DMARC, agencies <strong>must</strong> publish an SPF and a DKIM record in DNS. Agencies must also ensure that emails sent by the agency (including from third party services sending on behalf of the agency) have a DKIM signature that matches the signature in the DKIM record.</p>]]></paragraph>
<paragraph
    title="15.2.13."


><![CDATA[<p>Agencies can choose to quarantine or reject messages that fail checks.&nbsp; More specifically:</p>
<ul>
<li>Sender Policy Framework (SPF) is used to specify legitimate locations of servers which can send email for your domain;</li>
<li>DomainKeys Identified Mail (DKIM) isn't supported by all mail servers, but if it is, it can be used to cryptographically sign outgoing mail sent by your servers to give email service providers further confidence that it's legitimate;</li>
<li>DMARC is used to inform email service providers what action they should take if SPF or DKIM (or both) validation fails;</li>
<li>One important aspect of DMARC is the action you ask email service providers to take when&nbsp;SPF or DKIM validation fails:
<ul>
<li>a policy of p=none means that they should allow non-compliant emails to be delivered but report the failure to the agency;</li>
<li>a policy of p=quarantine requests that they mark the email as spam;</li>
<li>a policy of p=reject requests the email service provider to refuse to deliver the email.</li>
</ul>
</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.14."


><![CDATA[<p>A text record published in DNS is used to notify other organisations of the use of DMARC. The following demonstrates an example DMARC record:</p>
<ul>
<li>v=DMARC1;</li>
<li>p=quarantine;</li>
<li>rua=mailto:dmarc@agency.govt.nz (where agency is the name of the respective agency).</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.15."


><![CDATA[<p>This informs email recipients that:</p>
<ul>
<li>you have a DMARC policy (v=DMARC1)</li>
<li>any messages that fail DMARC checks should be treated as spam (p=quarantine)</li>
<li>they should send reports of email received back to you (rua=mailto:dmarc@agency.govt.nz)</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.16."


><![CDATA[<p>It is not unusual to experience minor errors in syntax or other elements of DMARC configuration when first implementing DMARC.&nbsp; Some discussion on common problems, issues and solutions can be found on the DMARC website (see the References table below).</p>]]></paragraph>
<paragraph
    title="15.2.17."


><![CDATA[<p>For domains expected to be used for email, it is not recommended to move directly to a full implementation of DMARC until there is certainty that the configuration and implementation are stable and operating as intended. The following implementation outline is recommended by the GCA and DMARC organisations (<a title="References" href="http://nzism.gcsb.govt.nz/ism-document#SubSection-15279">see 15.2.19 References</a>):</p>
<ol>
<li>Deploy DKIM &amp; SPF;</li>
<li>Ensure mailers are correctly aligning the appropriate identifiers;</li>
<li>Publish a DMARC record with the “none” flag set for the policies, which requests data reports;</li>
<li>Analyse the data and modify mail streams as appropriate; and</li>
<li>Modify DMARC policy flags from “none” to “quarantine” to “reject” as experience dictates.</li>
</ol>]]></paragraph>
</block>
<block title="Securing non-email sending domains"><paragraph
    title="15.2.18."


><![CDATA[<p>Threat actors may attempt to spoof a domain that is not intended to send or receive email. Operators of domains that do not send mail can publish Sender Policy Framework (SPF) "-all" policies to make an explicit declaration that the domains send no mail. The following DNS entries create blank SPF and DKIM entries effectively forcing every email sent (spoofed) from a non-mail-enabled domain to fail all checks, giving the highest possible chance of these emails not reaching their intended destination.</p>
<ul>
<li>SPF&nbsp; &nbsp; &nbsp;“v=spf1 -all”</li>
<li>DKIM &nbsp; “v=DKIM1; p=”</li>
<li>DMARC&nbsp; “V=DMARC1;p=reject;sp=reject;adkim-s;aspf=s;rua=mailto:&lt;your dmarc report RUA email address&gt;;”</li>
</ul>]]></paragraph>
</block>
<block title="DMARC Reporting"><paragraph
    title="15.2.19"


><![CDATA[<p>DMARC reporting provides information to assist an agency’s IT system and email administrators.&nbsp; It can also provide an email asset inventory as well as providing data on spam, phishing and other email exploitation techniques.</p>]]></paragraph>
<paragraph
    title="15.2.20."


><![CDATA[<p>DMARC can be configured to produce an aggregate report and a forensic report.&nbsp; In some cases agencies may also send reports to an external organisation such as a DMARC reporting service or a third-party IT service provider.&nbsp; Discretion should be used when providing such information to third parties in order to maintain security and privacy.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Secure email transport"><paragraph
    title="15.2.21."


><![CDATA[<p>Over time, several protocols have emerged to support the encryption of email traffic in transit. Secure email transport protects your email from person-in-the middle attacks like eavesdropping, manipulation, and cryptographic downgrade.</p>]]></paragraph>
<paragraph
    title="15.2.22."


><![CDATA[<p>With parties that you contact regularly by email (eg, partner organisations), it is possible to configure connections so that TLS will always be used, and the certificates presented by both mail servers are authenticated, verifying the identities of both parties.</p>]]></paragraph>
 <block title="STARTTLS, Opportunistic TLS"><paragraph
    title="15.2.23."


><![CDATA[<p>Opportunistic TLS is configured on the sending server. STARTTLS (RFC 3207) is a protocol command that upgrades an insecure connection to a secure connection using TLS. Agencies must enable opportunistic TLS encryption.</p>]]></paragraph>
</block>
<block title="Using MTA-STS"><paragraph
    title="15.2.24."


><![CDATA[<p>SMTP MTA Strict Transport Security (MTA-STS) is a standard that adds support for strict encryption without relying on DNSSEC (RFC 8461). With MTA-STS, you can specify that mail traffic sent to a domain is encrypted with a specific public encryption key. Agencies should enable MTA-STS.</p>]]></paragraph>
<paragraph
    title="15.2.25."


><![CDATA[<p>The objectives of MTA-STS are to:&nbsp;</p>
<ul>
<li>make it harder for an attacker to intercept and redirect emails&nbsp;</li>
<li>make sure that TLS encryption is always used,</li>
<li>prevent attackers downgrading email encryption on emails to cleartext,</li>
<li>provide visibility reports through the TLS reporting protocol.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.26."


><![CDATA[<p>To achieve this, MTA-STS works in the following ways:</p>
<ul>
<li>Your organisation can advertise the mail server hostname on a separate secure web page, which means an attacker cannot subvert your DNS entry (specifically your MX record, which is the record that indicates how an email should be routed using the Simple Mail Transfer Protocol).<br><br></li>
<li>Your organisation can publish an ‘MTA-STS enforce policy’, which tells any server sending you emails to always send with TLS encryption, and to not allow connections to be downgraded. If there is a failure to establish a secure TLS connection, emails will not be delivered. Note that when your organisation sets up MTA-STS, you are securing inbound connections only.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.27."


><![CDATA[<p>MTA-STS is relatively simple to implement, but organisations must step through their implementation with care; if you switch on controls too quickly then inbound emails may not be delivered. To mitigate this risk, we always recommend using MTA-STS in ‘testing mode’ first, and to set up TLS-RPT (TLS Reporting) as a mechanism for getting feedback before you progress.</p>]]></paragraph>
<paragraph
    title="15.2.28."


><![CDATA[<p>The goal ultimately is to work towards implementing an MTA-STS policy of ‘enforce’. When a sending email service detects you have an MTA-STS policy of ‘enforce’, they should only send email to your domain if the connection is secure. Note however, that whilst many major email providers have built support for MTA-STS, there is not yet complete support from all vendors. For those that don’t yet support it, emails will continue to be delivered in all cases.</p>]]></paragraph>
<paragraph
    title="15.2.29."


><![CDATA[<p>While they achieve the same aim, DNS-based Authentication of Named Entities (DANE) and MTA-STS do not conflict and can be implemented in parallel. You can implement MTA-STS by deploying signed TLS certificates to a domain’s email and web servers, publishing an MTA-STS policy on the web server, and publishing MTA-STS records in DNS. Like DMARC, MTA-STS supports the delivery of aggregate reporting to system owners.&nbsp;</p>]]></paragraph>
<paragraph
    title="15.2.30."


><![CDATA[<p>MTA-STS (Mail Transfer Agent – Strict Transport Security) is configured on the receiving server, forcing inbound email connections to use TLS if the sending server supports MTA-STS; there is no drop down to cleartext. If the sending server does not support MTA-STS the connection can use opportunistic TLS, or even send in the clear.</p>]]></paragraph>
</block>
<block title="TLS reporting"><paragraph
    title="15.2.31."


><![CDATA[<p>Organisations should also enable TLS reporting when implementing MTA-STS (RFC 8460). By implementing TLS reporting, organisations will be able to see the performance of its domains, the success or failure rate, and the impact of the organisation’s MTA-STS and policies. This will give organisations important insight into which mail services it needs to configure to ensure no interruption in mail flow.&nbsp;</p>]]></paragraph>
</block>
<block title="Secure cryptography"><paragraph
    title="15.2.32."


><![CDATA[<p>Historically, network traffic between mail servers was unencrypted, leaving it vulnerable to interception or modification in transit. Although it is possible to encrypt individual emails using protocols like PGP or S/MIME, this requires the sender and recipient to have the necessary trust infrastructure in place. Approved implementation of S/MIME and OpenPGP are discussed in Chapter 17, 17.6 Secure Multipurpose Internet Mail Extension, and 17.7 OpenPGP Message Format.</p>]]></paragraph>
<paragraph
    title="15.2.33."


><![CDATA[<p>This is not likely to be possible for all the parties you communicate with. So, your email servers should be configured to support encryption of the communications channel that the email is sent over. This task is best handled by TLS. Agencies should use the current version of TLS, see [CID:2598]. When implementing MTA-STS, agencies should use TLS1.2 or above on email servers.</p>]]></paragraph>
<paragraph
    title="15.2.34."


><![CDATA[<p>Implementation details</p>
<ul>
<li>Configure all your email servers to support TLS, regardless of whether they are accessible from the internet or private networks only.</li>
<li>Ensure your email servers present a certificate with suitable cryptographic properties and that it is signed by a trusted Certificate Authority.</li>
<li>Ensure your email servers prefer to use a good cryptographic profile, but that lesser cryptographic profiles are supported too. You should support the case where TLS is not used at all, if you want to be confident you can receive emails from any entity.</li>
<li>Where possible, consider configuring your email service to force TLS between you and organisations you regularly communicate with.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="15.2.35"


><![CDATA[<p>Further information on email security is available from the following sources:</p>
<table class="table-main" style="width: 100%; height: 1449px;">
<tbody>
<tr style="height: 18px;">
<td style="width: 9.84204%; height: 18px;"><strong>Reference</strong></td>
<td style="width: 19.0765%; height: 18px;"><strong>Title</strong></td>
<td style="width: 9.35601%; height: 18px;"><strong>Publisher</strong></td>
<td style="width: 61.7254%; height: 18px;"><strong>Source</strong></td>
</tr>
<tr style="height: 90px;">
<td style="width: 9.84204%; height: 90px;"><strong><strong>RFC 3207</strong></strong></td>
<td style="width: 19.0765%; height: 90px;"><strong>SMTP Service Extension for Secure SMTP over Transport Layer Security</strong></td>
<td style="text-align: center; width: 9.35601%; height: 90px;"><span>IETF</span></td>
<td style="width: 61.7254%; height: 90px;"><a title="SMTP Service Extension for Secure SMTP over Transport Layer Security" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3207" target="_blank"></a><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc3207/" target="_blank">RFC 3207 - SMTP Service Extension for Secure SMTP over Transport Layer Security (ietf.org)</a><a title="SMTP Service Extension for Secure SMTP over Transport Layer Security" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3207" target="_blank"></a></td>
</tr>
<tr style="height: 90px;">
<td style="width: 9.84204%; height: 90px;"><strong>RFC 4686</strong></td>
<td style="width: 19.0765%; height: 90px;"><strong>Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)</strong></td>
<td style="text-align: center; width: 9.35601%; height: 90px;"><span>IETF</span></td>
<td style="width: 61.7254%; height: 90px;"><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc4686/" target="_blank">RFC 4686 - Analysis of Threats Motivating DomainKeys Identified Mail (DKIM) (ietf.org)</a></td>
</tr>
<tr style="height: 54px;">
<td style="width: 9.84204%; height: 54px;"><strong><strong>RFC 6376</strong></strong></td>
<td style="width: 19.0765%; height: 54px;"><strong>DomainKeys Identified Mail (DKIM) Signatures</strong></td>
<td style="text-align: center; width: 9.35601%; height: 54px;"><span>IETF</span></td>
<td style="width: 61.7254%; height: 54px;">
<p><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc6376/" target="_blank">RFC 6376 - DomainKeys Identified Mail (DKIM) Signatures (ietf.org)</a></p>
</td>
</tr>
<tr style="height: 90px;">
<td style="width: 9.84204%; height: 90px;"><strong><strong>RFC 5617</strong>&nbsp;</strong></td>
<td style="width: 19.0765%; height: 90px;"><strong>DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP)</strong></td>
<td style="text-align: center; width: 9.35601%; height: 90px;"><span>IETF</span></td>
<td style="width: 61.7254%; height: 90px;">
<p><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc5617/" target="_blank">RFC 5617 - DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP) (ietf.org)</a></p>
</td>
</tr>
<tr style="height: 126px;">
<td style="width: 9.84204%; height: 126px;"><strong><strong>RFC 7817</strong></strong></td>
<td style="width: 19.0765%; height: 126px;"><strong>Updated Transport Layer Security (TLS) Server Identity Check Procedure for Email-Related Protocols</strong></td>
<td style="text-align: center; width: 9.35601%; height: 126px;"><span>IETF</span></td>
<td style="width: 61.7254%; height: 126px;">
<p><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc7817/" target="_blank">RFC 7817 - Updated Transport Layer Security (TLS) Server Identity Check Procedure for Email-Related Protocols (ietf.org)</a></p>
</td>
</tr>
<tr style="height: 90px;">
<td style="width: 9.84204%; height: 90px;"><strong><strong>RFC 7208</strong></strong></td>
<td style="width: 19.0765%; height: 90px;"><strong>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</strong></td>
<td style="text-align: center; width: 9.35601%; height: 90px;"><span>IETF</span></td>
<td style="width: 61.7254%; height: 90px;">
<p><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc7208/" target="_blank">RFC 7208 - Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1 (ietf.org)</a></p>
</td>
</tr>
<tr style="height: 108px;">
<td style="width: 9.84204%; height: 108px;"><strong><strong>RFC 7489</strong></strong></td>
<td style="width: 19.0765%; height: 108px;"><strong>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</strong></td>
<td style="text-align: center; width: 9.35601%; height: 108px;"><span>IETF</span></td>
<td style="width: 61.7254%; height: 108px;">
<p><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc7489/" target="_blank">RFC 7489 - Domain-based Message Authentication, Reporting, and Conformance (DMARC) (ietf.org)</a></p>
</td>
</tr>
<tr style="height: 180px;">
<td style="width: 9.84204%; height: 180px;"><strong><strong>&nbsp;RFC 7960</strong></strong></td>
<td style="width: 19.0765%; height: 180px;"><strong>&nbsp;Interoperability Issues between Domain-based Message Authentication, Reporting, and Conformance (DMARC) and Indirect Email Flows</strong></td>
<td style="text-align: center; width: 9.35601%; height: 180px;"><span>IETF&nbsp;</span></td>
<td style="width: 61.7254%; height: 180px;">
<p><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc7960/" target="_blank">RFC 7960 - Interoperability Issues between Domain-based Message Authentication, Reporting, and Conformance (DMARC) and Indirect Email Flows (ietf.org)</a></p>
</td>
</tr>
<tr style="height: 108px;">
<td style="width: 9.84204%; height: 108px;"><strong><strong>&nbsp;RFC 8463</strong></strong></td>
<td style="width: 19.0765%; height: 108px;"><strong>&nbsp;A New Cryptographic Signature Method for DomainKeys Identified Mail (DKIM)</strong></td>
<td style="text-align: center; width: 9.35601%; height: 108px;"><span>IETF&nbsp;</span></td>
<td style="width: 61.7254%; height: 108px;">
<p><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc8463/" target="_blank">RFC 8463 - A New Cryptographic Signature Method for DomainKeys Identified Mail (DKIM) (ietf.org)</a></p>
</td>
</tr>
<tr style="height: 90px;">
<td style="width: 9.84204%; height: 90px;"><strong>NIST SP 800-45 Version 2</strong></td>
<td style="width: 19.0765%; height: 90px;"><strong>Guidelines on Electronic Mail Security</strong></td>
<td style="text-align: center; width: 9.35601%; height: 90px;">NIST</td>
<td style="width: 61.7254%; height: 90px;"><a rel="noopener noreferrer" href="https://csrc.nist.gov/pubs/sp/800/45/ver2/final" target="_blank">SP 800-45 Version 2, Guidelines on Electronic Mail Security | CSRC (nist.gov)</a></td>
</tr>
<tr style="height: 54px;">
<td style="width: 9.84204%; height: 54px;"><strong>NIST SP 800-177 Rev. 1</strong></td>
<td style="width: 19.0765%; height: 54px;"><strong>Trustworthy Email</strong></td>
<td style="text-align: center; width: 9.35601%; height: 54px;">NIST</td>
<td style="width: 61.7254%; height: 54px;"><a rel="noopener noreferrer" href="https://csrc.nist.gov/pubs/sp/800/177/r1/final" target="_blank">SP 800-177 Rev. 1, Trustworthy Email | CSRC (nist.gov)</a></td>
</tr>
<tr style="height: 90px;">
<td style="width: 9.84204%; height: 90px;"><strong>&nbsp;</strong></td>
<td style="width: 19.0765%; height: 90px;"><strong>Email Authentication Mechanisms: DMARC, SPF and DKIM</strong></td>
<td style="text-align: center; width: 9.35601%; height: 90px;">NIST</td>
<td style="width: 61.7254%; height: 90px;"><a rel="noopener noreferrer" href="https://www.nist.gov/publications/email-authentication-mechanisms-dmarc-spf-and-dkim" target="_blank">Email Authentication Mechanisms: DMARC, SPF and DKIM | NIST</a></td>
</tr>
<tr style="height: 36px;">
<td style="width: 9.84204%; height: 36px;"><strong>&nbsp;</strong></td>
<td style="width: 19.0765%; height: 36px;"><strong>DMARC</strong></td>
<td style="text-align: center; width: 9.35601%; height: 36px;">DMARC</td>
<td style="width: 61.7254%; height: 36px;"><a rel="noopener noreferrer" href="https://dmarc.org/" target="_blank">dmarc.org – Domain Message Authentication Reporting &amp; Conformance</a></td>
</tr>
<tr style="height: 45px;">
<td style="width: 9.84204%; height: 45px;"><strong>&nbsp;</strong></td>
<td style="width: 19.0765%; height: 45px;"><strong>Guidelines for Email</strong></td>
<td style="text-align: center; width: 9.35601%; height: 45px;">ASD</td>
<td style="width: 61.7254%; height: 45px;"><a rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism/cyber-security-guidelines/guidelines-email" target="_blank">Guidelines for Email | Cyber.gov.au</a></td>
</tr>
<tr style="height: 36px;">
<td style="width: 9.84204%; height: 36px;"><strong>&nbsp;</strong></td>
<td style="width: 19.0765%; height: 36px;"><strong>Enhance Email &amp; Web Security</strong></td>
<td style="text-align: center; width: 9.35601%; height: 36px;">CISA</td>
<td style="width: 61.7254%; height: 36px;"><a rel="noopener noreferrer" href="https://www.cisa.gov/resources-tools/resources/enhance-email-web-security" target="_blank">Enhance Email &amp; Web Security | CISA</a></td>
</tr>
<tr style="height: 54px;">
<td style="width: 9.84204%; height: 54px;"><strong>&nbsp;</strong></td>
<td style="width: 19.0765%; height: 54px;"><strong>Implementation guidance: email domain protection</strong></td>
<td style="text-align: center; width: 9.35601%; height: 54px;">CCCS</td>
<td style="width: 61.7254%; height: 54px;"><a rel="noopener noreferrer" href="https://www.cyber.gc.ca/en/guidance/implementation-guidance-email-domain-protection" target="_blank">Implementation guidance: email domain protection (ITSP.40.065 v1.1) - Canadian Centre for Cyber Security</a></td>
</tr>
<tr style="height: 18px;">
<td style="width: 9.84204%; height: 18px;"><strong>&nbsp;</strong></td>
<td style="width: 19.0765%; height: 18px;"><strong>Email security and anti-spoofing</strong></td>
<td style="text-align: center; width: 9.35601%; height: 18px;">NCSC-UK</td>
<td style="width: 61.7254%; height: 18px;"><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/collection/email-security-and-anti-spoofing" target="_blank">Email security and anti-spoofing - NCSC.GOV.UK</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Domain-based Message Authentication, Reporting and Conformance (DMARC)"><paragraph
    title="15.2.36.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Phishing and malware distribution attacks are common internet security threats.&nbsp; To limit the possibility of agency domains being used fraudulently (e.g. for spam or spear-phishing), agencies should implement:</p>
<ul>
<li>A Sender Policy Framework (SPF);</li>
<li>DomainKeys Identified Mail (DKIM); and</li>
<li>Domain-based Message Authentication, Reporting &amp; Conformance (DMARC) records.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.36.R.02."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>It is important to note that DMARC depends on the proper implementation of both SPF and DKIM.&nbsp; DMARC records are published in the DNS and provide guidance to the email receiver on actions to take when emails received do not conform to the published record.</p>]]></paragraph>
<paragraph
    title="15.2.36.C.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="6019"
><![CDATA[<p class="Default">Before implementing DMARC agencies MUST:</p>
<ul>
<li>Create a DMARC policy;</li>
<li>List all domains, in particular those used for the sending and/or receiving of email;</li>
<li>Review the configuration of SPF and DKIM for all active domains and all published domains; and</li>
<li>Establish one or more monitored inboxes to receive DMARC reports.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.36.C.02"


    classification="All Classifications"
    compliance="Must"
    cid="6020"
><![CDATA[<p>Agencies MUST enable DMARC with&nbsp;a policy of p=reject for all email originating from or received by their domain(s). <a rel="noopener noreferrer" href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-15275" target="_blank">See 15.2.16</a> for a recommended approach where a domain is used for sending and/or receiving email and disruption would cause a business impact.</p>]]></paragraph>
<paragraph
    title="15.2.36.C.03"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="7519"
><![CDATA[<p>Agencies MUST manage “received DMARC messages” in accordance with the agency’s published DMARC policy.</p>]]></paragraph>
<paragraph
    title="15.2.36.C.04"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="6021"
><![CDATA[<p>Agencies MUST review DMARC reports on a regular basis and address any identified anomalies or security issues.</p>]]></paragraph>
<paragraph
    title="15.2.36.C.05"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="7520"
><![CDATA[<p>Agencies SHOULD produce failure reports and aggregate reports according to the agency’s DMARC policies.</p>]]></paragraph>
</block>
<block title="Filtering suspicious emails and attachments"><paragraph
    title="15.2.37.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>The intent of blocking specific types of emails is to reduce the likelihood of phishing emails and emails or attachments containing malicious code entering the agency’s networks.</p>]]></paragraph>
<paragraph
    title="15.2.37.C.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1745"
><![CDATA[<p>Agencies SHOULD configure the following gateway filters:</p>
<ul>
<li>inbound and outbound email, including any attachments, that contain:
<ul>
<li>malicious code;</li>
<li>content in conflict with the agency’s email policy;</li>
<li>content that cannot be identified;</li>
<li>deny listed or unauthorised filetypes; and</li>
</ul>
</li>
<li>encrypted content, when that content cannot be inspected for malicious code or authenticated as originating from a trusted source;</li>
<li>emails addressed to internal-use only email aliases with source addresses located from outside the domain; and</li>
<li>all emails arriving via an external connection where the source address uses an internal agency domain name.</li>
</ul>]]></paragraph>
</block>
<block title="Active web addresses (URL) embedded in emails"><paragraph
    title="15.2.38.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Spoofed emails often contain an active (embedded) email address directing users to a malicious website in order to infect the workstation or agency systems with malicious code.</p>]]></paragraph>
<paragraph
    title="15.2.38.R.02."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>An effective defence is to strip and replace active addresses and hyperlinks with text only versions.</p>]]></paragraph>
<paragraph
    title="15.2.38.C.01"

    tags="Emanation Security,Technical,Email,Email Infrastructure"


    classification="All Classifications"
    compliance="Should"
    cid="1749"
><![CDATA[<p>Email servers SHOULD be configured to strip active addresses and URL’s and replace them with text only versions.</p>]]></paragraph>
</block>
<block title="Preventing unmarked or inappropriately marked emails"><paragraph
    title="15.2.39.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Unmarked or inappropriately marked emails can be blocked at two points, the workstation or the email server. The email server is often the preferred location to block emails as it is a single location under the control of system administrators that can enforce the requirement for the entire network. In addition email servers can apply controls for emails generated by applications.</p>]]></paragraph>
<paragraph
    title="15.2.39.R.02."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Whilst blocking at the email server is considered the most appropriate control there is an advantage in also blocking at the workstation. This approach adds an extra layer of security and will also reduce the likelihood of a data spill occurring on the email server.</p>]]></paragraph>
<paragraph
    title="15.2.39.R.03."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>For classified systems is it important to note that all emails containing classified information MUST be protectively marked. &nbsp;This requirement is outlined in <a title="Email applications" href="http://nzism.gcsb.govt.nz/ism-document#Section-15183">Section 15.1 - Email Applications</a>.</p>]]></paragraph>
<paragraph
    title="15.2.39.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="1754"
><![CDATA[<p>Agencies MUST prevent unmarked and inappropriately marked emails being sent to intended recipients by blocking the email at the email server, originating workstation or both.</p>]]></paragraph>
<paragraph
    title="15.2.39.C.02"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="1755"
><![CDATA[<p>Agencies MUST enforce protective marking of emails so that checking and filtering can take place.</p>]]></paragraph>
<paragraph
    title="15.2.39.C.03"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1756"
><![CDATA[<p>Agencies SHOULD enforce protective marking of emails so that checking and filtering can take place.</p>]]></paragraph>
</block>
<block title="Blocking of outbound emails"><paragraph
    title="15.2.40.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Blocking an outbound email with a valid protective marking or endorsement (e.g. NZEO) that indicates the email exceeds the classification of the communication path, stops data spills.</p>]]></paragraph>
<paragraph
    title="15.2.40.R.02."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Agencies may remove protective markings from emails destined for private citizens and businesses once they have been approved for release from the agency’s gateways.</p>]]></paragraph>
<paragraph
    title="15.2.40.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1760"
><![CDATA[<p>Agencies MUST configure systems to block any outbound emails with a protective marking or endorsement indicating that the content of the email exceeds the classification of the communication path.</p>]]></paragraph>
<paragraph
    title="15.2.40.C.02"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1761"
><![CDATA[<p>Agencies SHOULD configure systems to log every occurrence of a blocked email.</p>]]></paragraph>
</block>
<block title="Blocking of inbound emails"><paragraph
    title="15.2.41.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Blocking an inbound email with a valid protective marking that indicates the email or its attachment exceeds the classification the receiving system is accredited to process will prevent a data spill from occurring on the receiving system.</p>]]></paragraph>
<paragraph
    title="15.2.41.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1764"
><![CDATA[<p>Agencies MUST configure email systems to reject, log and report inbound emails with protective markings indicating that the content of the email exceeds the accreditation of the receiving system.</p>]]></paragraph>
<paragraph
    title="15.2.41.C.02"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1765"
><![CDATA[<p>Agencies SHOULD notify the intended recipient of any blocked emails.</p>]]></paragraph>
</block>
<block title="Undeliverable messages"><paragraph
    title="15.2.42.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Undeliverable or “bounce” emails are commonly sent by email servers to the original sender when the email cannot be delivered, often because the destination address is invalid. &nbsp;Because of the common spamming practice of spoofing sender addresses, this can result in a large amount of bounce emails being sent to an innocent third party. &nbsp;Sending bounces only to senders that can be verified via the Sender Policy Framework (SPF) or other trusted means avoids contributing to this problem and allows other government agencies and trusted parties to receive legitimate bounce messages. See also 15.2.15 - Sender Policy Framework.</p>]]></paragraph>
<paragraph
    title="15.2.42.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1768"
><![CDATA[<p>Agencies SHOULD <strong>only</strong> send notification of undeliverable, bounced, or blocked emails to senders that can be verified via SPF or other trusted means.</p>]]></paragraph>
</block>
<block title="Automatic forwarding of emails"><paragraph
    title="15.2.43.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Unsecured automatic forwarding of emails can pose a serious risk to the unauthorised disclosure of classified information, for example, a system user may set up a server-side rule to automatically forward all emails to a personal email account. This can result in classified emails being forwarded to the personal email account.&nbsp;This tactic may also be employed when an email account is compromised.</p>]]></paragraph>
<paragraph
    title="15.2.43.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1771"
><![CDATA[<p>Agencies MUST ensure that the requirements for blocking unmarked and outbound emails are also applied to automatically forwarded emails.</p>]]></paragraph>
</block>
<block title="Open relay email servers"><paragraph
    title="15.2.44.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>An open relay email server (or open mail relay) is a server that is configured to allow anyone on the Internet to send emails through the server. &nbsp;Such configurations are highly undesirable as they allow spammers and worms to exploit this functionality to send emails through the server.&nbsp;Although no longer considered a significant vector for spam email, mail servers identified as an open relay will still be added to reputation based block lists.</p>]]></paragraph>
<paragraph
    title="15.2.44.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1774"
><![CDATA[<p>Agencies MUST disable open email relaying so that email servers will only relay messages destined for the agency’s domain(s) and those originating from authorised systems or users within that domain.</p>]]></paragraph>
</block>
<block title="Email server maintenance activities"><paragraph
    title="15.2.45.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Email servers perform a critical business function for many agencies; as such it is important that agencies perform regular email server auditing, security reviews and vulnerability analysis activities.</p>]]></paragraph>
<paragraph
    title="15.2.45.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1777"
><![CDATA[<p>Agencies SHOULD perform regular email server auditing, security reviews and vulnerability analysis activities.</p>]]></paragraph>
</block>
<block title="Centralised email gateways"><paragraph
    title="15.2.46.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>Without a centralised email gateway it is exceptionally difficult to deploy Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM) and outbound email protective markings verification.<br>Attackers will almost invariably avoid using the primary email server when sending malicious emails. This is because the backup or alternative gateways are often poorly maintained with out-of-date deny lists and content filtering.</p>]]></paragraph>
<paragraph
    title="15.2.46.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1780"
><![CDATA[<p>Where an agency has system users that send email from outside the agency’s network, an authenticated and encrypted channel MUST be configured to allow email to be sent via the centralised email gateway.<br><br></p>]]></paragraph>
<paragraph
    title="15.2.46.C.02"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1781"
><![CDATA[<p>Agencies SHOULD route email through a centralised email gateway.</p>]]></paragraph>
<paragraph
    title="15.2.46.C.03"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1782"
><![CDATA[<p>Where backup or alternative email gateways are in place, additional email gateways SHOULD be maintained at the same standard as the primary email gateway.</p>]]></paragraph>
</block>
<block title="Transport Layer Security (TLS)"><paragraph
    title="15.2.47.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security,TLS"


><![CDATA[<p>Email can be intercepted anywhere between the originating email server and the destination email server. Email transport between organisations and agencies is usually over the internet or other unsecured public infrastructure so it is important that email interception is carefully managed and suitable controls applied. One effective measure is to use TLS to encrypt the email traffic<strong> between email servers</strong>.</p>]]></paragraph>
<paragraph
    title="15.2.47.R.02."

    tags="Technical,Email,Email Infrastructure,Email Security,TLS"


><![CDATA[<p>Enabling TLS on the originating and accepting email server will defeat passive attacks on the network, with the exception of cryptanalysis against email traffic. &nbsp;TLS encryption <strong>between email servers</strong> will not interfere with email content filtering schemes. &nbsp;Email servers will remain compatible with other email servers as IETF’s RFC 3207 specifies the encryption as opportunistic</p>]]></paragraph>
<paragraph
    title="15.2.47.C.01"

    tags="Technical,Email,Email Infrastructure,Email Security,TLS"


    classification="All Classifications"
    compliance="Must"
    cid="1786"
><![CDATA[<p>Agencies MUST enable opportunistic TLS encryption as defined in IETF’s RFC 3207 on email servers that make incoming or outgoing email connections over public infrastructure.</p>]]></paragraph>
<paragraph
    title="15.2.47.C.02"

    tags="Technical,Email,Email Infrastructure,Email Security,TLS"


    classification="All Classifications"
    compliance="Should"
    cid="1787"
><![CDATA[<p>Agencies SHOULD implement TLS between email servers where significant volumes of classified information are passed via email to other agencies.</p>]]></paragraph>
</block>
<block title="Mail transfer agent - strict transfer security"><paragraph
    title="15.2.48.R.01."


><![CDATA[<p>Where government-to-business and government-to-citizen communications require a higher level of transport security, organisations should consider implementing SMTP MTA Strict Transport Security (“MTA-STS”). MTA-STS provides organisations with a mechanism to encrypt communications between SMTP servers via TLS, preventing Person-In-The-Middle (PITM) attacks during email delivery.</p>]]></paragraph>
<paragraph
    title="15.2.48.R.02."


><![CDATA[<p>Organisations should verify the following prior to deploying MTA-STS:&nbsp;</p>
<ul>
<li>internet-facing mail relays support SMTP over TLS version 1.2 or later,</li>
<li>web server hosting the policy file supports TLS (HTTPS),</li>
<li>internet-facing mail relays use a TLS certificate issued by a root certificate authority that is not expired and matches its domain name.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.48.C.01."


    classification="All Classifications"
    compliance="Should"
    cid="7521"
><![CDATA[<p>Agencies SHOULD enable MTA-STS to prevent the unencrypted transfer of emails between complying servers.</p>]]></paragraph>
<paragraph
    title="15.2.48.C.02."


    classification="All Classifications"
    compliance="Must"
    cid="7522"
><![CDATA[<p>Agencies MUST use TLS 1.2 or above when implementing MTA-STS.</p>]]></paragraph>
<paragraph
    title="15.2.48.C.03."


    classification="All Classifications"
    compliance="Should"
    cid="7523"
><![CDATA[<p>Agencies SHOULD enable TLS reporting when implementing MTA-STS.</p>]]></paragraph>
</block>
<block title="Sender Policy Framework (SPF)"><paragraph
    title="15.2.49.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security,Sender Policy Framework"


><![CDATA[<p>The Sender Policy Framework (SPF) is an open standard specifying a technical method to prevent sender address forgery.<br>An SPF-protected domain is less attractive to spammers and phishers because the forged e-mails are more likely to be caught in spam filters which check the SPF record. Because an SPF-protected domain is less attractive as a spoofed address, it is less likely to be deny listed by spam filters and so is less disruptive to email traffic.</p>]]></paragraph>
<paragraph
    title="15.2.49.R.02."

    tags="Technical,Email,Email Infrastructure,Email Security,Sender Policy Framework"


><![CDATA[<p>Having a proper Sender Policy Framework (SPF) record increases the chances people will get emails you send. &nbsp;Without one, your email has a greater chance of being marked as Spam.</p>]]></paragraph>
<paragraph
    title="15.2.49.R.03."

    tags="Technical,Email,Email Infrastructure,Email Security,Sender Policy Framework"


><![CDATA[<p>SPF and alternatives such as Sender ID aid in the detection of spoofed email server address domains. &nbsp;The SPF record specifies a list of IP addresses or domains that are allowed to send mail from a specific domain. &nbsp;If the email server that transmitted the email is not in the list, the verification fails (there are a number of different fail types available).</p>]]></paragraph>
<paragraph
    title="15.2.49.C.01."

    tags="Technical,Email,Email Infrastructure,Email Security,Sender Policy Framework"


    classification="All Classifications"
    compliance="Must"
    cid="1792"
><![CDATA[<p>Agencies MUST:</p>
<ul>
<li>specify mail servers using SPF or Sender ID; and&nbsp;</li>
<li>mark, block or identify incoming emails that fail SPF checks for notification to the email recipient.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.49.C.02."

    tags="Technical,Email,Email Infrastructure,Email Security,Sender Policy Framework"


    classification="All Classifications"
    compliance="Must"
    cid="1793"
><![CDATA[<p>Agencies MUST:</p>
<ul>
<li>use a fail SPF record when specifying email servers; and&nbsp;</li>
<li>use SPF or Sender ID to verify the authenticity of incoming emails.</li>
</ul>]]></paragraph>
<paragraph
    title="15.2.49.C.03"

    tags="Technical,Email,Email Infrastructure,Email Security,Sender Policy Framework"


    classification="All Classifications"
    compliance="Should"
    cid="1794"
><![CDATA[<p>Agencies SHOULD refer to the SPF recommendations in IETF’s RFC 7208.</p>]]></paragraph>
</block>
<block title="DomainKeys Identified Mail (DKIM)"><paragraph
    title="15.2.50.R.01."

    tags="Technical,Email,Email Infrastructure,Email Security"


><![CDATA[<p>DKIM enables a method of determining spoofed email content. The DKIM record specifies a public key that will sign the content of the message. If the signed digest in the email header doesn't match the signed content of the email the verification fails.</p>]]></paragraph>
<paragraph
    title="15.2.50.C.01"


    classification="All Classifications"
    compliance="Must"
    cid="1798"
><![CDATA[<p>Agencies MUST enable DKIM signing on all email originating from their domain.</p>]]></paragraph>
<paragraph
    title="15.2.50.C.02"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Must"
    cid="1797"
><![CDATA[<p>Agencies MUST use DKIM in conjunction with SPF.</p>]]></paragraph>
<paragraph
    title="15.2.50.C.03"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1799"
><![CDATA[<p>Agencies SHOULD verify DKIM signatures on emails received, taking into account that email distribution list software typically invalidates DKIM signatures.</p>]]></paragraph>
<paragraph
    title="15.2.50.C.04"

    tags="Technical,Email,Email Infrastructure,Email Security"


    classification="All Classifications"
    compliance="Should"
    cid="1800"
><![CDATA[<p>Where agencies operate email distribution list software used by external senders, agencies SHOULD configure the software so that it does not impair the validity of the sender’s DKIM signature.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="16. Authentication and Access Controls"><section title="16.1. Identification, Authentication and Authorisation"><subsection title="Objective"><paragraph
    title="16.1.1."


><![CDATA[<p>Access to information and systems is securely controlled and only provided to authorised entities, at all times.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="16.1.2."


><![CDATA[<p><!--[endif]-->Identification and authentication requirements are implemented in order to provide a secure means of access to information and systems.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="16.1.3."


><![CDATA[<p>The NZ Government Department of Internal Affairs (DIA) publishes a set of Identification Standards that work together to provide assurance that an organisation has the right information about the right entities and can use that to make access control decisions to ensure access is only provided to authorised entities.</p>]]></paragraph>
<paragraph
    title="16.1.4."


><![CDATA[<p>Controls in these Identification Standards related to identification and authentication are provided to facilitate credential provider’s ability to manage credentials to a level that will reduce the introduction of systemic risk across the NZ Government. The controls are also broadly acceptable to relying parties that are managing access to NZ Government information and information systems.</p>]]></paragraph>
<paragraph
    title="16.1.5."


><![CDATA[<p class="NormS16C1" style="mso-list: l0 level1 lfo1;"><!-- [if !supportLists]-->Access Controls can be defined as any mechanism by which an individual, system, or application grants or revokes the right to access a location, system, data, or perform an action.</p>]]></paragraph>
<paragraph
    title="16.1.6."


><![CDATA[<p>Although access controls remain fundamentally the same in any context, specific guidance and controls around virtualisation, cloud environments, microservices and containerisation are documented in Chapter 22 – Enterprise Systems Security and Chapter 23 – Public Cloud Security.</p>]]></paragraph>
</block>
<block title="New Zealand Government Identification Standards"><paragraph
    title="16.1.7."


><![CDATA[<p class="NormS16C1" style="mso-list: l0 level1 lfo1;">The New Zealand Government publishes four Identification Standards:</p>
<ul>
<li><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/identification-management/identification-management-standards/information-assurance-standard/" target="_blank">Information Assurance</a></li>
<li><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/identification-management/identification-management-standards/binding-assurance-standard/" target="_blank">Binding Assurance</a></li>
<li><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/identification-management/identification-management-standards/authentication-assurance-standard/" target="_blank">Authentication Assurance</a></li>
<li><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/identification-management/identification-management-standards/federation-assurance-standard/" target="_blank">Federation Assurance</a></li>
</ul>]]></paragraph>
<paragraph
    title="16.1.8."


><![CDATA[<p>The first three standards are relevant to Relying Parties; all standards are relevant to Credential Providers.</p>]]></paragraph>
</block>
<block title="Methods for user identification and authentication"><paragraph
    title="16.1.9."


><![CDATA[<p>Authentication is detailed in the Authentication Assurance Standard and is the process by which an entity is verified before access permissions are confirmed, and access is granted to the entity requesting authentication.</p>]]></paragraph>
<paragraph
    title="16.1.10."


><![CDATA[<p>Authentication can be achieved by various means, including biometrics, cryptographic tokens, software tokens, passkeys, passphrases, passwords and smartcards.</p>
<p>NB: Where the NZISM refers to passwords it equally applies to passphrases.</p>]]></paragraph>
<paragraph
    title="16.1.11."


><![CDATA[<p class="NormS16C1" style="mso-list: l0 level1 lfo1;">Authentication mechanisms are invariably described in terms of factors of authentication as follows:</p>
<ul>
<li>Something the entity has – the possession factor.</li>
<li>Something the entity knows – the knowledge factor.</li>
<li>Something the entity is or does – the biometric factor.</li>
</ul>]]></paragraph>
<paragraph
    title="16.1.12."


><![CDATA[<p>These authentication mechanisms may not provide sufficient protection when used in isolation. Using two or more authentication mechanisms provides additional security and is strongly advised.</p>]]></paragraph>
</block>
<block title="Methods for identification and authentication management"><paragraph
    title="16.1.13."


><![CDATA[<p>There are two distinct roles performed for identification management – a credential provider, and a relying party.</p>
<ul>
<li><strong><span style="text-decoration: underline;">Credential providers</span></strong> establish credentials that are used by relying parties to identify and authenticate users and systems. Entities expect these credentials to enable provision of service to the right systems.</li>
<li><strong><span style="text-decoration: underline;">Relying parties</span></strong> provide the services that are being accessed by the authorised users (entities) and systems. Relying parties use an entities’ credentials to ensure the right authorisations are in place prior to access of data or systems.</li>
</ul>
<p>NB: <strong>Entities</strong> (eg, a person or system) use credentials from the credential provider to gain a service from a relying party. The entity can either present their credentials to a service provider or use the credential provider to directly present the credentials to the relying party.</p>]]></paragraph>
</block>
<block title="Authenticating across multiple sign-ons"><paragraph
    title="16.1.14."


><![CDATA[<p>Federation allows credential service providers to provide authentication and subscriber attributes to a number of separately administered relying parties. These relying parties may use more than one credential service provider.</p>]]></paragraph>
<paragraph
    title="16.1.15."


><![CDATA[<p>Definitions relating to Federation include:</p>
<ul>
<li>Federated Identification Management (FIM) - Where a credential from a single credential provider may be used by a number of relying parties through an agreement that signifies trust between parties. This trust agreement is usually implemented through a process of federation between the parties.</li>
<li>Single Sign On (SSO) - Where credentials, specifically authenticators, are used within the context of a single organisation/domain, system owners can exercise more discretion regarding the acceptance of risk associated with the selection of identification, authentication, and authorisation controls.</li>
</ul>]]></paragraph>
</block>
<block title="Identification and authentication controls with Zero Trust "><paragraph
    title="16.1.16."


><![CDATA[<p>Zero Trust (ZT) is a security concept based around a central principle of ‘never trust, always verify’, being maintained through enforcing accurate, least privilege per-request access decisions on systems, services and networks.</p>]]></paragraph>
<paragraph
    title="16.1.17."


><![CDATA[<p>ZT means continuous verification and enforcement of access controls, regardless of location. This includes continuous authentication of entities on internal network and zones.</p>]]></paragraph>
<paragraph
    title="16.1.18."


><![CDATA[<p class="NormS16C1" style="mso-list: l0 level1 lfo1;"><!-- [if !supportLists]-->Implementation of ZT principles requires policy and procedure changes within organisations. The principles also guide and control through Network Access (ZTNA). &nbsp;Zero Trust implemented at a micro level (eg, segmentation of networks, applications, environments, user and process-based) allows more granular control of access enforcement of least privilege access policies.</p>]]></paragraph>
<paragraph
    title="16.1.19."


><![CDATA[<p>SSO and FIM support ZT principles with a centralised model to approve and remove access to entities. The timely revocation of accesses when no longer required ensures strengthened security to services and data at a micro level.</p>]]></paragraph>
<paragraph
    title="16.1.20."


><![CDATA[<p>Cloud services have been using a Zero Trust approach to security where policy decisions and policy enforcement points are used to control access based on authentication and privilege assignments. More information can be found in Chapter 23 - Public Cloud Security (reference 23.3.12).</p>]]></paragraph>
<paragraph
    title="16.1.21."


><![CDATA[<p>Successful implementation of Access Controls for ZT at an organisation level can be supported by the following methods:</p>
<ul>
<li>Implementation of Multi-Factor Authentication (MFA).</li>
<li>Use of adaptive authentication based on contextual factors (e.g. location, device, behaviour).</li>
<li>Least Privilege Access – enforced at a micro level within systems and networks. This may also include just-in-time (JIT) delivery of privileges.</li>
<li>Centralisation of user accounts and accesses.</li>
<li>Passwordless authentication models adopted within organisations.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="16.1.22."


><![CDATA[<p>Additional information relating to Identification, Authentication and Authorisation can be found at:</p>
<table class="table-main" style="width: 100%; height: 493.4px;">
<tbody>
<tr style="height: 29.4px;">
<td style="width: 33.032%; height: 29.4px;"><strong>Title</strong></td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 29.4px;"><strong>Publisher</strong></td>
<td style="width: 51.4604%; height: 29.4px;"><strong>Source</strong></td>
</tr>
<tr style="height: 68.8px;">
<td style="width: 33.032%; height: 68.8px;">
<p class="no-uppercase"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Identification Standards</span></strong></p>
</td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 68.8px;">
<p><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">DIA</span></p>
</td>
<td style="width: 51.4604%; height: 68.8px;">
<p><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/identity/identification-management/identification-management-standards/" target="_blank">Identification Management Standards | NZ Digital government</a></span></p>
</td>
</tr>
<tr style="height: 68.8px;">
<td style="width: 33.032%; height: 68.8px;">
<p><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Authentication Assurance Standard</span></span></strong></p>
</td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 68.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">DIA</span></span></td>
<td style="width: 51.4604%; height: 68.8px;"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><a href="https://www.digital.govt.nz/standards-and-guidance/identity/identification-management/identification-management-standards/authentication-assurance-standard/">Authentication Assurance Standard | NZ Digital government</a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.032%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Assurance Services Panel</span></span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 36.8px;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">GCDO</span></td>
<td style="width: 51.4604%; height: 36.8px;"><span style="color: white; mso-themecolor: background1;"><a rel="noopener noreferrer" href="https://www.nist.gov/identity-access-management/nist-special-publication-800-63-digital-identity-guidelines" target="_blank"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">GCDO Assurance Services Panel | NZ Digital government</span></a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.032%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Mitigating the use of stolen credentials</span></span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 36.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">ASD</span></span></td>
<td style="width: 51.4604%; height: 36.8px;"><span style="color: black; mso-color-alt: windowtext;"><a rel="noopener noreferrer" href="https://oauth.net/2/" target="_blank"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">PROTECT - Mitigating the Use of Stolen Credentials (October 2021).pdf (cyber.gov.au)</span></a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.032%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Identity &amp; Access Management</span></span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 36.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">NIST</span></span></td>
<td style="width: 51.4604%; height: 36.8px;"><span><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/collection/cloud/the-cloud-security-principles/principle-10-identity-and-authentication" target="_blank"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Identity &amp; Access Management | NIST</span></a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.032%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Implementing a Zero Trust Architecture</span></span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 36.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">NIST - NCCoE</span></span></td>
<td style="width: 51.4604%; height: 36.8px;"><span style="color: black; mso-color-alt: windowtext;"><a rel="noopener noreferrer" href="https://fidoalliance.org/specifications/" target="_blank"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Implementing a Zero Trust Architecture | NCCoE</span></a></span></td>
</tr>
<tr style="height: 55.2px;">
<td style="width: 33.032%; height: 55.2px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Passwordless Authentication</span></span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 55.2px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">Microsoft Security</span></span></td>
<td style="width: 51.4604%; height: 55.2px;"><span><a rel="noopener noreferrer" href="https://learn.microsoft.com/en-us/entra/identity/authentication/concept-mfa-howitworks" target="_blank"></a><a href="https://www.microsoft.com/en-us/security/business/solutions/passwordless-authentication?msockid=29ee405a98e26a061932539299fc6ba4">Passwordless authentication | Microsoft Security</a></span></td>
</tr>
<tr style="height: 50.4px;">
<td style="width: 33.032%; height: 50.4px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">AWS Identity and Access Management</span></span></strong></td>
<td class="text-center" style="height: 50.4px;" width="142" valign="top">
<p><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">AWS</span></p>
</td>
<td style="width: 51.4604%; height: 50.4px;"><span style="color: black; mso-color-alt: windowtext;"><a rel="noopener noreferrer" href="https://cheatsheetseries.owasp.org/cheatsheets/Multifactor_Authentication_Cheat_Sheet.html" target="_blank"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Access Management- AWS Identity and Access Management (IAM) - AWS</span></a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.032%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Identity and Network Access</span></span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 36.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Microsoft</span></td>
<td style="width: 51.4604%; height: 36.8px;"><span><a rel="noopener noreferrer" href="https://www.cisa.gov/sites/default/files/publications/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf" target="_blank"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Identity and Access Management System | Microsoft Security</span></a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.032%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Password Storage Cheat Sheet</span></span></strong></td>
<td class="text-center" style="height: 36.8px;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">OWASP</span></td>
<td style="width: 51.4604%; height: 36.8px;"><span><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><a href="https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#:~:text=This%20cheat%20sheet%20advises%20you%20on%20the%20proper,even%20if%20the%20application%20or%20database%20is%20compromised.">Password Storage - OWASP Cheat Sheet Series</a></span></span></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="16.1.23."


><![CDATA[<p class="NormS10C7">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 136.806%; height: 262.903px;">
<tbody>
<tr style="height: 62.4306px;">
<td style="width: 13.9736%; height: 62.4306px;"><strong>Reference</strong></td>
<td style="width: 21.0874%; height: 62.4306px;"><strong>Title</strong></td>
<td style="width: 64.9136%; height: 62.4306px;"><strong>Source</strong></td>
</tr>
<tr style="height: 200.472px;">
<td style="width: 13.9736%; height: 200.472px;"><strong>PSR Mandatory Requirements</strong></td>
<td style="width: 21.0874%; height: 200.472px;">
<p>GOV5,&nbsp;GOV6, GOV7,&nbsp;</p>
<p>INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4,</p>
<p>PERSEC1, PERSEC2, PERSEC3, PERSEC4,</p>
<p>PHYSEC1, PHYSEC2</p>
</td>
<td style="width: 64.9136%; height: 200.472px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<p><a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></p>
<p><a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Policies and procedures"><paragraph
    title="16.1.24.R.01."

    tags="Information Security Documentation,Access Control,Passwords,Authentication"


><![CDATA[<p>Developing policies and procedures will ensure consistency in managing identification, authentication and authorisation across agency systems. Refer also to&nbsp;<a title="Privileged Access Management" href="/ism-document">Section 16.4 – Privileged Access Management</a>.</p>]]></paragraph>
<paragraph
    title="16.1.24.C.01."

    tags="Information Security Documentation,Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1827"
><![CDATA[<p>Agencies MUST:</p>
<ul>
<li>develop, implement and maintain a set of policies and procedures covering all system users’:
<ul>
<li>identification;</li>
<li>authentication;&nbsp;</li>
<li>authorisation;</li>
<li>privileged access identification and management; and</li>
</ul>
</li>
<li>make their system users aware of the agency’s policies and procedures.</li>
</ul>]]></paragraph>
</block>
<block title="Implement zero trust principles"><paragraph
    title="16.1.25.R.01."

    tags="Network Security,Access Control,Authentication"


><![CDATA[<p>Agencies can be especially vulnerable to threats when internal systems can be accessed externally from the organisation. Implementing access through Zero Trust principles and architecture provides organisations with an enhanced security posture to ensure potential access threats on systems are minimised.</p>]]></paragraph>
<paragraph
    title="16.1.25.C.01."

    tags="Network Security,Technical,Access Control,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="7541"
><![CDATA[<p>Agencies SHOULD design and implement Zero Trust principles and architecture to strengthen identification management.</p>]]></paragraph>
</block>
<block title="Unique system user identification"><paragraph
    title="16.1.26.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Having uniquely identifiable system users ensures accountability.</p>]]></paragraph>
<paragraph
    title="16.1.26.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1829"
><![CDATA[<p>Agencies MUST ensure that all system users are:</p>
<ul>
<li>uniquely identifiable; and</li>
<li>authorised&nbsp;<span>and authenticated on each occasion that access is granted to a system.</span></li>
</ul>]]></paragraph>
</block>
<block title="Shared accounts"><paragraph
    title="16.1.27.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Sharing of credentials (eg, passwords and UserIDs) may be convenient but doing so is highly risky. Shared credentials can defeat accountability and the attribution and non-repudiation principles of access controls.&nbsp; The risk increases when shared credentials are used for administrative privileges or access to classified information.</p>]]></paragraph>
<paragraph
    title="16.1.27.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="Secret, Confidential, Top Secret"
    compliance="Must Not"
    cid="1832"
><![CDATA[<p>Agencies MUST NOT use shared credentials to access accounts.</p>]]></paragraph>
<paragraph
    title="16.1.27.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must Not"
    cid="7542"
><![CDATA[<p>Agencies MUST NOT use shared credentials to access administrator or privileged access accounts.</p>
<p>NB: Break Glass accounts are exempt from this control. For further guidance on Break Glass accounts see Emergency accounts (Break Glass accounts section).</p>]]></paragraph>
<paragraph
    title="16.1.27.C.03."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should Not"
    cid="1833"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies SHOULD NOT use shared credentials to access accounts.</span></p>]]></paragraph>
</block>
<block title="System user identification for shared accounts"><paragraph
    title="16.1.28.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Agencies may have a compelling business reason for the use of shared accounts.&nbsp; These may include anonymous, guest and temporary employee credentials.</p>]]></paragraph>
<paragraph
    title="16.1.28.R.02."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>As shared accounts are non-entity specific, agencies will need to determine an appropriate method for attributing actions undertaken using such accounts to specific personnel, and these are recorded or documented.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.1.28.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1837"
><![CDATA[<p>If agencies choose to allow shared, non user-specific accounts they MUST ensure that an independent means of determining the identification of the system user is implemented and logged.</p>]]></paragraph>
</block>
<block title="Methods for system user identification and authentication"><paragraph
    title="16.1.29.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>A personal identification number (PIN) is typically short in length and employs a small character set, making it susceptible to brute force attacks.</p>]]></paragraph>
<paragraph
    title="16.1.29.R.02."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Combining multiple methods when authenticating users can help to create a layered defence, making it harder for successful brute force attacks. Eg, a PIN connected to a hardware backed security measure like a trusted platform module (TPM) means the PIN is bound to a specific device.</p>]]></paragraph>
<paragraph
    title="16.1.29.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must Not"
    cid="1840"
><![CDATA[<p>Agencies MUST NOT use a numerical password (or personal identification number) as the sole method of authenticating a system user to access a system.</p>]]></paragraph>
<paragraph
    title="16.1.29.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="1841"
><![CDATA[<p>Agencies SHOULD use multi-factor authentication (MFA) when identifying and authenticating system users.</p>]]></paragraph>
</block>
<block title="Centralisation of Identification and Authentication Management"><paragraph
    title="16.1.30.R.01."


><![CDATA[<p>Centralising authentication and the reliance on single credentials to access multiple systems and wider organisations (eg, SSO, FIM) enhances an organisation’s security posture through:</p>
<ul>
<li>centralisation to control access (joiners, movers, leavers);</li>
<li>reducing risk of password fatigue;</li>
<li>enforcing strong access controls;</li>
<li>enforcing password policies; and</li>
<li>reducing the risk of misconfiguration.</li>
</ul>]]></paragraph>
<paragraph
    title="16.1.30.R.02."


><![CDATA[<p>Centralised access management systems are beneficial to agencies; however, they also have the potential to introduce additional system risk to organisations. FIM may introduce additional risk due to sharing of credentials across external organisations.</p>]]></paragraph>
<paragraph
    title="16.1.30.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="7543"
><![CDATA[<p>Agencies SHOULD assess and determine the risk of centralised access management systems, including SSO, to safely manage integration into systems and when using FIM.</p>]]></paragraph>
</block>
<block title="Passwords and policies"><paragraph
    title="16.1.31.R.01."


><![CDATA[<p>Passwords have historically been the primary authentication mechanism for almost all information systems and are a fundamental part of access and authentication.&nbsp; While there are other forms of authentication mechanisms available that can provide more robust security to attack vectors and threats in the environment, passwords remain a cost-effective baseline for authentication systems.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.02."


><![CDATA[<p>Passwords have traditionally been the terminology used for the memorised secrets allowing access and authorisation onto systems. The term ‘passphrases’ is often referred to in place of ‘passwords’, as it denotes longer (more secure), easier to remember memorised secrets.</p>
<p>Where the NZISM references passwords, it equally applies to passphrases.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.03."


><![CDATA[<p>Passwords are subject to three primary groups of risks:</p>
<p><!-- [if !supportLists]-->1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->Intentional sharing.</p>
<p><!-- [if !supportLists]-->2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->Theft, loss or compromise.</p>
<p><!-- [if !supportLists]-->3.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->Guessing and cracking.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.04."


><![CDATA[<p>Associated with these risk groups are four principal methods of attacking passwords:</p>
<ol>
<li>Interactive attempts including brute force attacks or some knowledge of the user or organisation.</li>
<li>Obtaining through social engineering or phishing.</li>
<li>Compromising through oversight, observation, use of keyloggers, cameras etc.</li>
<li>Decryption of network traffic interception, misconfiguration, data capture etc.</li>
</ol>]]></paragraph>
<paragraph
    title="16.1.31.R.05."


><![CDATA[<p>Password controls detailed in this section are designed to manage and mitigate these risk groups and attack methods. These controls will only be effective alongside organisation specific password policies and mandatory training for all system users.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.06."


><![CDATA[<p>Whilst passwords provide some security to systems, they still carry inherent risks. A layered approach to authentication is essential to ensuring systems and organisations are not made vulnerable from the authentication mechanisms used.<br><br>This includes establishing additional system controls alongside passwords. For example, ensuring MFA is mandatory in organisations, or mandating secure storage of passwords within organisations.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.07."


><![CDATA[<p>Mandatory training for all employees, including senior management, on these policies is essential to manage and mitigate risks associated with password attacks.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.08."


><![CDATA[<p>While implementing long and complex passwords is regarded as a fundamental security practice, it does not fully mitigate the risks associated with password-related attacks. A primary challenge can come from human behaviours. Unless password generators are employed, users often create non-unique passwords based on predictable patterns, even for lengthy credentials.</p>
<p>Multi-layered approaches such as MFA, passwordless authentication, and password expiries can help to mitigate these attacks.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.09."


><![CDATA[<p>Ensure a balance of security and usability considerations when deciding on implementing a password expiry policy for the organisation.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.10."


><![CDATA[<p>It is vital that the security posture of a system is not weakened through authentication mechanisms. This relies on increasing the authentication and authorisation controls, including moving to appropriate multi-factor authentication, and stronger identify access management.</p>]]></paragraph>
<paragraph
    title="16.1.31.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7544"
><![CDATA[<p>Agencies MUST ensure adequate password policies are implemented and enforced across all systems.</p>]]></paragraph>
<paragraph
    title="16.1.31.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7545"
><![CDATA[<p>Agencies MUST implement a password policy enforcing <strong>at least annual</strong> password changes on systems that <strong>have not</strong> implemented MFA or passwordless authentication.</p>]]></paragraph>
<paragraph
    title="16.1.31.C.03."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7546"
><![CDATA[<p>Agencies MUST implement a password policy enforcing:</p>
<ul>
<li>A minimum password length of 16 characters (e.g four words).</li>
<li>Passwords must be <strong>long, strong and unique</strong>. This means passwords must be a minimum character length, and are a combination of unique random words, characters or numbers.</li>
</ul>
<p>NB: no explicit complexity requirements are enforced (e.g. numbers or special characters), however passwords must be unique, or random and <strong>may</strong> include special characters and numbers to achieve this.</p>]]></paragraph>
<paragraph
    title="16.1.31.C.04."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7547"
><![CDATA[<p>To ensure security of systems are not weakened through authentication mechanisms, at a minimum, agencies MUST:</p>
<ul>
<li>apply MFA appropriately (refer to controls in Section 16.7);</li>
<li>ensure authentication secrets (including passwords) are securely stored;</li>
<li>remove knowledge-based questions from authentication process (eg, dog’s name, first school etc.);</li>
<li>new passwords are screened to reduce the likelihood of previously compromised passwords;</li>
<li>remove hints from authentication process; and</li>
<li>change passwords when a suspected or known compromise of an account has occurred.</li>
</ul>]]></paragraph>
<paragraph
    title="16.1.31.C.05."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must Not"
    cid="1869"
><![CDATA[<p>Agencies MUST NOT:</p>
<ul>
<li>allow predictable reset passwords;</li>
<li>store passwords in the clear on the system; and</li>
<li>reuse passwords when resetting multiple accounts.</li>
</ul>]]></paragraph>
<paragraph
    title="16.1.31.C.06."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="7548"
><![CDATA[<p>Agencies SHOULD consider the use of location-based factors in the authentication process, (e.g., Users must be at an expected location (city, country, IP address) and provide the correct credentials for the authentication to succeed).</p>]]></paragraph>
<paragraph
    title="16.1.31.C.07."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="7549"
><![CDATA[<p>When creating password policies, agencies SHOULD consider implementing annual password changes.</p>]]></paragraph>
</block>
<block title="Protecting stored authentication information"><paragraph
    title="16.1.32.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>When moving to passwordless authentication, agencies SHOULD carry out a risk assessment and evaluate passwordless authentication models to choose authentication mechanisms and factors that best fit the organisation’s security and authentication requirements.</p>]]></paragraph>
<paragraph
    title="16.1.32.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must Not"
    cid="1844"
><![CDATA[<p>Agencies MUST NOT allow storage of unprotected authentication information that grants system access, or decrypts an encrypted device, to be located on, or with the system or device, to which the authentication information grants access.</p>]]></paragraph>
</block>
<block title="Protecting authentication data in transit"><paragraph
    title="16.1.33.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Secure transmission of authentication information will reduce the risk of interception and subsequent use of the authentication information by an attacker to access a system under the guise of a valid system user.</p>]]></paragraph>
<paragraph
    title="16.1.33.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1847"
><![CDATA[<p>Agencies MUST ensure that system authentication data is protected when in transit on organisation networks or All-of-Government systems.</p>]]></paragraph>
</block>
<block title="Hashing"><paragraph
    title="16.1.34.R.01."

    tags="Approved Cryptographic Algorithms,Access Control,Passwords,Authentication"


><![CDATA[<p>Hashing is a means of protecting stored passwords or other authentication secrets by cryptographically converting the password to fixed length ciphertext.&nbsp; This protects against incidents where an unsanctioned copy of the password or authentication database has been made, exported or the database otherwise compromised.&nbsp; Approved cryptographic protocols are discussed in <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 - Cryptography</a>. See also section&nbsp;<a title="Approved Cryptographic Algorithms" href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">17.2 - Approved Cryptographic Algorithms</a>&nbsp;for discussion on the use of salts to strengthen the cryptographic resistance of a hash.</p>]]></paragraph>
<paragraph
    title="16.1.34.C.01."

    tags="Approved Cryptographic Algorithms,Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="6553"
><![CDATA[<p>Password and other authentication secrets MUST be hashed before storage using an approved cryptographic protocol and algorithm. <span>See Chapter 17 – Cryptography. </span></p>]]></paragraph>
<paragraph
    title="16.1.34.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7562"
><![CDATA[<p>Passwords and other authentication secrets MUST be stored securely including being:</p>
<ul>
<li>salted (32 bits or more),
<ul>
<li>salts should be unique to each password and should be randomly generated.</li>
</ul>
</li>
<li>hashed (HMAC using SHA-2/3), and</li>
<li>“stretched” (such as PBKDF2 with at least:
<ul>
<li>600k iterations with internal hash function of HMAC-SHA-256; or</li>
<li>210k iterations with internal hash function of HMAC-SHA-512).</li>
</ul>
</li>
</ul>]]></paragraph>
</block>
<block title="Identification of foreign nationals"><paragraph
    title="16.1.35.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Where systems contain NZEO or other nationalities releasability marked or protectively marked information, and foreign nationals have access to such systems, it is important that agencies implement appropriate security measures to assist in identifying users that are foreign nationals. &nbsp;Such measures will assist in preventing the release of sensitive information to those not authorised to access it.</p>]]></paragraph>
<paragraph
    title="16.1.35.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1850"
><![CDATA[<p>Where systems contain NZEO or other nationalities releasability marked or protectively marked information, agencies MUST provide a mechanism that allows system users and processes to identify users who are foreign nationals, including seconded foreign nationals.</p>]]></paragraph>
<paragraph
    title="16.1.35.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="1851"
><![CDATA[<p>Agencies using NZEO systems SHOULD ensure that identification includes specific nationality for all foreign nationals, including seconded foreign nationals.</p>]]></paragraph>
</block>
<block title="Resetting passwords and authentication vectors"><paragraph
    title="16.1.36.R.01."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>To reduce the likelihood of social engineering attacks aimed at service desks, agencies will need to ensure that system users provide sufficient evidence to prove they are the owner of the system account when requesting a password reset for their system account.&nbsp;</p>
<p>This evidence could be in the form of:</p>
<ul>
<li class="MsoListParagraph" style="text-indent: -1cm;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<!--[endif]-->the system user physically presenting themselves and their security pass to service desk personnel who then reset their password;</li>
<li>physically presenting themselves to a known authorised colleague who uses an approved online tool to reset their password; or</li>
<li>providing a MFA code.</li>
</ul>]]></paragraph>
<paragraph
    title="16.1.36.R.02."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>Issuing complex reset passwords maintains the security of the user account during the reset process. &nbsp;This can also present an opportunity to demonstrate the selection of strong passwords.</p>]]></paragraph>
<paragraph
    title="16.1.36.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1875"
><![CDATA[<p class="Normal-nonumbering">Agencies MUST ensure system users provide sufficient evidence to prove they are the owner of the account when requesting a password reset for their system account or making changes to their multi-factor authenticators.</p>]]></paragraph>
<paragraph
    title="16.1.36.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7551"
><![CDATA[<p>Where passwords are not set by the account holder, agencies MUST use temporary passwords when resetting system user accounts.</p>]]></paragraph>
<paragraph
    title="16.1.36.C.03."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should Not"
    cid="7552"
><![CDATA[<p>Agencies SHOULD NOT use single factor authentication when changing users’ Multi-Factor Authentication details.</p>]]></paragraph>
</block>
<block title="Securing Passwords"><paragraph
    title="16.1.37.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Security of passwords is fundamental to ensuring system security across organisations. Password policies need to include how passwords are kept secure while passwords are in transit, stored or being used.</p>]]></paragraph>
<paragraph
    title="16.1.37.R.02."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Use of password managers within agencies provide employees a system to generate, secure, store, and distribute passwords. The paradigm behind a password manager is for an individual to store passwords and memorised secrets securely in a vault behind a single strong password. This generally means authentication secrets are at less risk of attacks and help to support a strengthened organisation security posture.</p>]]></paragraph>
<paragraph
    title="16.1.37.R.03."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Password managers store highly sensitive data, therefore it is imperative that agencies have completed a risk analysis and due diligence to ensure that passwords are suitably protected with the password manager, and are not accessible to third parties.</p>]]></paragraph>
<paragraph
    title="16.1.37.R.04."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>When using password managers, passwords may be stored in an encrypted form rather than salted and hashed. This is required for a password manager to function, and the technical risks associated with this are considered acceptable when addressing the risks of password re-use due to users needing to remember many different passwords. To mitigate this additional technical risk we recommend using MFA on the password manager.</p>]]></paragraph>
<paragraph
    title="16.1.37.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7558"
><![CDATA[<p>Password managers provide no additional security to the sign-in password. Agencies using password managers MUST ensure sign-in passwords adhere to the password security policies used by the organisation.</p>]]></paragraph>
<paragraph
    title="16.1.37.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="7559"
><![CDATA[<p>Agencies using password managers SHOULD consider the use of MFA to access the password manager.</p>]]></paragraph>
</block>
<block title="Passwordless Authentication"><paragraph
    title="16.1.38.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Use of passwords are a common method of authenticating entities. Due to high reliance (from organisations) on passwords to control accesses, threat actors commonly use passwords as an attack vector to gain access into networks.</p>]]></paragraph>
<paragraph
    title="16.1.38.R.02."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Passwordless authentication provides additional security mechanisms by moving away from ‘something you know’ and placing emphasis on other verification factors such as ‘something you have’ or ‘something you are’. These alternative authentication models can rely on other factors such as something you are or something you have (eg, biometrics, tokens, and authentication applications).</p>]]></paragraph>
<paragraph
    title="16.1.38.R.03."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Implementation of these alternative authentication models can be accomplished based on systems requirements and the access controls needs of organisations and systems.&nbsp; These alternative authentication models provide a range of security levels. Security levels of these passwordless authentication models, and how these are implemented in agencies have a significant impact on the level of security provided.</p>]]></paragraph>
<paragraph
    title="16.1.38.R.04."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Prior to moving to passwordless authentication, agencies will need to consider cost, risks, and benefits to identify which authentication models are best suited to their systems.</p>]]></paragraph>
<paragraph
    title="16.1.38.R.05."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Passwordless authentication <span style="text-decoration: underline;"><strong>does not</strong></span> mean ‘no authentication’.</p>]]></paragraph>
<paragraph
    title="16.1.38.R.06."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Passwordless authentication moves systems toward possession factors (something you have or something you are) and away from using memorised secrets (something you know) as the primary way to authenticate users. This can provide additional security measures to ensure adequate authentication, and when used in conjunction with adequate controls and security policies, passwordless authentication can minimise the success of a phishing attack.</p>]]></paragraph>
<paragraph
    title="16.1.38.R.07."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Security strength of passwordless authentication models rely on what and how organisations implement architecture to support this. Although implementation of passwordless authentication by itself can be more secure than passwords, MFA used in conjunction with this architecture will significantly minimise the risk of compromise within agencies by adding another layer of security.</p>]]></paragraph>
<paragraph
    title="16.1.38.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="7556"
><![CDATA[<p>When moving to passwordless authentication, agencies SHOULD carry out a risk assessment and evaluate passwordless authentication models to choose authentication mechanisms and factors that best fit the organisation’s security and authentication requirements.</p>]]></paragraph>
</block>
<block title="Disabling vulnerable authentication mechanisms"><paragraph
    title="16.1.39.R.01."

    tags="Technical,Access Control,Passwords,Authentication"


><![CDATA[<p>The use of adequate and secure authentication mechanisms is an essential part of ensuring and maintaining secure systems and user accounts. Replacing mechanisms with known vulnerabilities for products with stronger authentication protocols should be considered.</p>]]></paragraph>
<paragraph
    title="16.1.39.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7554"
><![CDATA[<p>Agencies MUST ensure authentication methods that are susceptible to replay attacks are disabled.</p>]]></paragraph>
<paragraph
    title="16.1.39.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1878"
><![CDATA[<p>Agencies MUST disable LAN Manager for password authentication on workstations and servers.</p>]]></paragraph>
</block>
<block title="Session termination"><paragraph
    title="16.1.40.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Developing a policy to automatically logout workstations after an appropriate time of inactivity will assist in preventing the compromise of unattended workstations.</p>]]></paragraph>
<paragraph
    title="16.1.40.R.02."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Restarting of workstations after automatically logging out ensures cached credentials, authentication tokens or session keys that may persist after logging out are removed. It can also ensure any services and drivers are securely reloaded on systems.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.1.40.R.03."


><![CDATA[<p>Session tokens are a vector for account compromise. &nbsp;The session length of a session token is the lifespan of the token; specifically, how long the user remains authenticated before reauthentication is required. The length of these session tokens should be considered to minimise risk of attacks through this mechanism. Length of session tokens will be different across organisations and systems, based on risk appetite and specific requirements.</p>]]></paragraph>
<paragraph
    title="16.1.40.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="1881"
><![CDATA[<p>Agencies SHOULD develop and implement a policy to automatically logout and shutdown workstations after an appropriate time of inactivity. This includes invalidating any session tokens.</p>]]></paragraph>
</block>
<block title="Screen and session locking"><paragraph
    title="16.1.41.R.01."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>Screen and session locking will prevent access to an unattended workstation.</p>]]></paragraph>
<paragraph
    title="16.1.41.R.02."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>Ensuring that the screen does not appear to be turned off before entering the locked state will prevent system users from forgetting they are still logged in and will prevent other system users from mistakenly thinking there is a problem with a workstation and resetting it.</p>]]></paragraph>
<paragraph
    title="16.1.41.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="1885"
><![CDATA[<p class="Normal-nonumbering" style="margin-bottom: 6.0pt;"><span>Agencies MUST:</span></p>
<ul>
<li class="Normal-nonumbering">configure systems with a screen and session lock;</li>
<li>configure the lock to activate:
<ul>
<li>after a maximum of 10 minutes of system user inactivity; or</li>
<li>if manually activated by the system user;</li>
</ul>
</li>
<li>configure the lock to completely conceal all information on the screen;</li>
<li>ensure that the screen is not turned off or enters a power saving state before the screen or session lock is activated;</li>
<li>have the user reauthenticate to unlock the system; and deny users the ability to disable the locking mechanism.</li>
</ul>]]></paragraph>
<paragraph
    title="16.1.41.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="1886"
><![CDATA[<p>Agencies SHOULD:</p>
<ul>
<li>configure systems with a session or screen lock;</li>
<li>configure the lock to activate:
<ul>
<li>after a maximum of 10 minutes of system user inactivity; or</li>
<li>if manually activated by the system user;</li>
</ul>
</li>
<li>configure the lock to completely conceal all information on the screen;</li>
<li>ensure that the screen is not turned off or enters a power saving state before the screen or session lock is activated;</li>
<li>have the system user reauthenticate to unlock the system; and</li>
<li>deny system users the ability to disable the locking mechanism.</li>
</ul>]]></paragraph>
</block>
<block title="Suspension of access"><paragraph
    title="16.1.42.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Locking a user account after a specified number of failed logon attempts will reduce the success of brute force attacks.</p>]]></paragraph>
<paragraph
    title="16.1.42.R.02."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Removing a system user account when it is no longer required will prevent personnel from accessing their old account and reduce the number of accounts that an attacker can target.</p>]]></paragraph>
<paragraph
    title="16.1.42.R.03."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Suspending inactive accounts after a specified number of days will reduce the number of accounts that an attacker can target.</p>]]></paragraph>
<paragraph
    title="16.1.42.R.04."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Investigating repeated account lockouts will reduce the security risk of any ongoing brute force logon attempts or inappropriate use of user accounts for services and allow security management to act accordingly.</p>]]></paragraph>
<paragraph
    title="16.1.42.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1892"
><![CDATA[<p>Agencies MUST:</p>
<ul>
<li>Record all successful and failed logon attempts;</li>
<li>lock system user accounts after three failed logon attempts;</li>
<li>use a temporary lock out feature to unlock system (max [] times);</li>
<li>have a system administrator reset locked accounts if [] times is superseded;</li>
<li>remove or suspend system user accounts as soon as possible when personnel no longer need access due to changing roles or leaving the organisation; and</li>
<li>remove or suspend inactive accounts after a specified number of days.</li>
</ul>
<p>NB: Agencies can determine the risk of using a temporary lock out feature on their specific systems.</p>
<p>[] indicates the chosen 'value of times' an agency has decided to use for the temporary lock out feature.</p>]]></paragraph>
</block>
<block title="Investigating repeated account lockouts"><paragraph
    title="16.1.43.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Repeated account lockouts may be an indicator of attempted account compromise.</p>]]></paragraph>
<paragraph
    title="16.1.43.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="Confidential, Secret, Top Secret"
    compliance="Should"
    cid="1896"
><![CDATA[<p>Agencies SHOULD ensure that repeated account lockouts are investigated before reauthorising access.</p>]]></paragraph>
</block>
<block title="Logon banner"><paragraph
    title="16.1.44.R.01."

    tags="Access Control"


><![CDATA[<p>A logon banner for a system serves to remind system users of their responsibilities when using the system.&nbsp; It may also be described as a “Splash Screen”, “Acceptable Use Policy” or “User Consent Screen”.</p>]]></paragraph>
<paragraph
    title="16.1.44.C.01."

    tags="Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="1899"
><![CDATA[<p>Agencies SHOULD have a logon banner that requires a system user to acknowledge and accept their security responsibilities before access to the system is granted.</p>]]></paragraph>
<paragraph
    title="16.1.44.C.02."

    tags="Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="1900"
><![CDATA[<p>Agencies SHOULD seek legal advice on the exact wording of logon banners.</p>]]></paragraph>
<paragraph
    title="16.1.44.C.03."

    tags="Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="1901"
><![CDATA[<p>Agency logon banners SHOULD cover issues such as:</p>
<ul>
<li>the system’s classification;</li>
<li>access only being permitted to authorised system users;</li>
<li>the system user’s agreement to abide by relevant security policies;</li>
<li>the system user’s awareness of the possibility that system usage is being monitored;</li>
<li>the definition of acceptable use for the system; and</li>
<li>legal ramifications of violating the relevant policies.</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
<section title="16.2. System Access"><subsection title="Objective"><paragraph
    title="16.2.1."


><![CDATA[<p>Access to information on systems is controlled in accordance with agency policy and the NZISM.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="16.2.2."


><![CDATA[<p>This section covers information on accessing systems for all system users.</p>]]></paragraph>
<paragraph
    title="16.2.3."


><![CDATA[<p>Additional information on privileged users can be found in <a title="Privileged user access" href="http://nzism.gcsb.govt.nz/ism-document#Section-15503">Section 16.3 - Privileged User Access </a>and additional information on security clearance, briefing and authorisation requirements can be found in <a title="Authorisations, Security Clearances and Briefings" href="http://nzism.gcsb.govt.nz/ism-document#Section-13391">Section 9.2 - Authorisations, Security Clearances and Briefings</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Access control lists"><paragraph
    title="16.2.4.R.01."

    tags="Technical,Access Control,Passwords,System Access"


><![CDATA[<p><span class="TextRun Highlight SCXW58590109 BCX8"><span class="NormalTextRun SCXW58590109 BCX8">A </span><span class="NormalTextRun SCXW58590109 BCX8">clearly </span><span class="NormalTextRun SCXW58590109 BCX8">defined </span><span class="NormalTextRun SCXW58590109 BCX8">process </span><span class="NormalTextRun SCXW58590109 BCX8">will </span><span class="NormalTextRun SCXW58590109 BCX8">a</span><span class="NormalTextRun SCXW58590109 BCX8">ssist</span><span class="NormalTextRun SCXW58590109 BCX8"> an</span> <span class="NormalTextRun SCXW58590109 BCX8">organisation</span><span class="NormalTextRun SCXW58590109 BCX8"> in the </span></span><strong><span class="TextRun Highlight SCXW58590109 BCX8"><span class="NormalTextRun SCXW58590109 BCX8">consistent development</span></span></strong><span class="TextRun Highlight SCXW58590109 BCX8"><span class="NormalTextRun SCXW58590109 BCX8"> of access control lists for their systems.</span></span></p>]]></paragraph>
<paragraph
    title="16.2.4.C.01."

    tags="Technical,Access Control,Passwords,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1930"
><![CDATA[<p><span class="TextRun Highlight SCXW46013679 BCX8"><span class="NormalTextRun SCXW46013679 BCX8">Agencies</span> <span class="NormalTextRun SCXW46013679 BCX8">MUST</span><span class="NormalTextRun SCXW46013679 BCX8"> follow </span><span class="NormalTextRun SCXW46013679 BCX8">a</span> <span class="NormalTextRun SCXW46013679 BCX8">defined </span><span class="NormalTextRun SCXW46013679 BCX8">process for developing an access control list</span><span class="NormalTextRun SCXW46013679 BCX8">, such as </span><span class="NormalTextRun SCXW46013679 BCX8">described</span><span class="NormalTextRun SCXW46013679 BCX8"> in the table below</span><span class="NormalTextRun SCXW46013679 BCX8">.</span></span></p>
<table class="table-main">
<tbody>
<tr>
<td>Stage</td>
<td>Description</td>
</tr>
<tr>
<td>1</td>
<td><span class="TextRun SCXW185856795 BCX8"><span class="NormalTextRun SCXW185856795 BCX8">Establish groups of all system resources based on similar security </span><span class="NormalTextRun SCXW185856795 BCX8">objectives</span><span class="NormalTextRun SCXW185856795 BCX8">.</span></span></td>
</tr>
<tr>
<td>2</td>
<td><span class="TextRun SCXW90153667 BCX8"><span class="NormalTextRun SCXW90153667 BCX8">Determine</span><span class="NormalTextRun SCXW90153667 BCX8"> the information owner for each group of resources.</span></span></td>
</tr>
<tr>
<td>3</td>
<td>
<p><span class="TextRun SCXW99713774 BCX8"><span class="NormalTextRun SCXW99713774 BCX8">Obtain agreement from system owners.</span></span></p>
</td>
</tr>
<tr>
<td>4</td>
<td>
<p>Establish groups encompassing all system users based on similar functions or security objectives.</p>
</td>
</tr>
<tr>
<td>5</td>
<td>
<p>Determine the group owner or manager for each group of system users.</p>
</td>
</tr>
<tr>
<td>6</td>
<td>
<p>Determine the degree of access to the resource for each system user group<span class="TextRun SCXW83405406 BCX8"><span class="NormalTextRun SCXW83405406 BCX8">, incorporating the principal of least-privilege access</span></span>.</p>
</td>
</tr>
<tr>
<td>7</td>
<td>
<p>Decide on the level of access for security administration, based on the internal security policy.</p>
</td>
</tr>
<tr>
<td>8</td>
<td>
<p>Identify any classification, protective markings, and releasability indicators (such as NZEO or compartmented information).</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Enforcing authorisations on systems"><paragraph
    title="16.2.5.R.01."

    tags="Technical,Access Control,Passwords,System Access"


><![CDATA[<p><span class="NormalTextRun SCXW64295392 BCX8">Use of access controls on a system will </span><span class="NormalTextRun SCXW64295392 BCX8">assist</span><span class="NormalTextRun SCXW64295392 BCX8"> in enforcing the need-to-know principle. How </span><span class="NormalTextRun SCXW64295392 BCX8">access controls are set up in </span><span class="NormalTextRun SCXW64295392 BCX8">organisations</span> <span class="NormalTextRun SCXW64295392 BCX8">are becoming </span><span class="NormalTextRun SCXW64295392 BCX8">increasin</span><span class="NormalTextRun SCXW64295392 BCX8">g important to mitigate threats and minimise attack surfaces.</span></p>]]></paragraph>
<paragraph
    title="16.2.5.C.01."

    tags="Technical,Access Control,Passwords,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1924"
><![CDATA[<p>Agencies MUST have authorisation of system users enforced by access controls.</p>]]></paragraph>
</block>
<block title="Protecting compartmented information on systems"><paragraph
    title="16.2.6.R.01."

    tags="Technical,Access Control,Passwords,System Access"


><![CDATA[<p>Compartmented information is particularly sensitive and as such extra measures need to be put in place on systems to restrict access to those with sufficient authorisation, briefings and a demonstrated need-to-know or need- to access.</p>]]></paragraph>
<paragraph
    title="16.2.6.C.01."

    tags="Technical,Access Control,Passwords,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1927"
><![CDATA[<p>Agencies MUST restrict access to compartmented information. Such restriction MUST be enforced by the system.</p>]]></paragraph>
</block>
<block title="Access from foreign controlled systems and facilities"><paragraph
    title="16.2.7.R.01."

    tags="Technical,Access Control,Passwords,System Access,NZEO"


><![CDATA[<p>If a New Zealand system is to be accessed overseas it will need to be from at least a facility owned by a country that New Zealand has a multilateral or bilateral agreement with. NZEO systems can be accessed only from facilities under the sole control of the government of New Zealand and by New Zealand citizens.</p>]]></paragraph>
<paragraph
    title="16.2.7.C.01."

    tags="Technical,Access Control,Passwords,System Access,NZEO"


    classification="All Classifications"
    compliance="Must Not"
    cid="1920"
><![CDATA[<p>Agencies MUST NOT allow access to NZEO information from systems and facilities not under the sole control of the government of New Zealand and New Zealand citizens.</p>]]></paragraph>
<paragraph
    title="16.2.7.C.02."

    tags="Technical,Access Control,Passwords,System Access,NZEO"


    classification="All Classifications"
    compliance="Should Not"
    cid="1921"
><![CDATA[<p>Unless a multilateral or bilateral security agreement is in place, agencies SHOULD NOT allow access to classified information from systems and facilities not under the sole control of the government of New Zealand and New Zealand citizens.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="16.3. Privileged User Access"><subsection title="Objective"><paragraph
    title="16.3.1."


><![CDATA[<p>Only trusted personnel are granted privileged access to systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="16.3.2."


><![CDATA[<p>This section covers information relating specifically to personnel that are granted privileged access to systems.&nbsp;Refer also to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15526">Section 16.4 – Privileged Access Management.</a></p>]]></paragraph>
</block>
<block title="Privileged access"><paragraph
    title="16.3.3."


><![CDATA[<p>Within this section, privileged access is, considered to be access which can give a system user:</p>
<ul>
<li>the ability to change key system configurations;</li>
<li>the ability to change control parameters;</li>
<li>access to audit and security monitoring information;</li>
<li>the ability to circumvent security measures;</li>
<li>access to all data, files and accounts used by other system users, including backups and media; or</li>
<li>special access for troubleshooting the system.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="16.3.4."


><![CDATA[<p>Additional information relating to privileged and system accounts, including monitoring, is contained in:</p>
<table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Restricting administrative privileges</strong></p>
</td>
<td style="text-align: center;">ASD</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/restricting-administrative-privileges" target="_blank">Restricting Administrative Privileges | Cyber.gov.au</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Use of privileged accounts"><paragraph
    title="16.3.5.R.01."

    tags="Access Control,Passwords"


><![CDATA[<p><span class="NormalTextRun SCXW209248292 BCX8">Inappropriate use of any </span><span class="NormalTextRun SCXW209248292 BCX8">aspect</span><span class="NormalTextRun SCXW209248292 BCX8"> of a system that enables a privileged user to override system or application controls can be a major co</span><span class="NormalTextRun SCXW209248292 BCX8">ntributory factor to failures,</span> <span class="NormalTextRun SCXW209248292 BCX8">information security incidents, or</span><span class="NormalTextRun SCXW209248292 BCX8"> system</span><span class="NormalTextRun SCXW209248292 BCX8"> breache</span><span class="NormalTextRun SCXW209248292 BCX8">s.</span></p>]]></paragraph>
<paragraph
    title="16.3.5.R.02."

    tags="Access Control,Passwords"


><![CDATA[<p><span class="TextRun SCXW134020089 BCX8"><span class="NormalTextRun SCXW134020089 BCX8">Privileged access rights allow for system wide changes to be made</span><span class="NormalTextRun SCXW134020089 BCX8">, </span><span class="NormalTextRun SCXW134020089 BCX8">as such</span><span class="NormalTextRun SCXW134020089 BCX8"> loggin</span><span class="NormalTextRun SCXW134020089 BCX8">g</span><span class="NormalTextRun SCXW134020089 BCX8">, monitoring</span><span class="NormalTextRun SCXW134020089 BCX8"> and strong change management </span><span class="NormalTextRun SCXW134020089 BCX8">practice</span><span class="NormalTextRun SCXW134020089 BCX8"> provide greater accountability and auditing capability.</span></span></p>]]></paragraph>
<paragraph
    title="16.3.5.C.01."

    tags="Technical,Access Control,Passwords"


    classification="All Classifications"
    compliance="Must"
    cid="1945"
><![CDATA[<p>Agencies MUST:</p>
<ul>
<li>ensure strong change management practices are implemented;</li>
<li>ensure that the use of privileged accounts is controlled and accountable;</li>
<li>ensure that system administrators are assigned, and consistently use, an individual account for the performance of their administration tasks;</li>
<li>keep privileged accounts to a minimum; and</li>
<li>allow the use of privileged accounts for administrative work only.</li>
</ul>]]></paragraph>
</block>
<block title="Privileged system access by foreign nationals"><paragraph
    title="16.3.6.R.01."

    tags="Access Control,Passwords"


><![CDATA[<p>As privileged users may have the ability to bypass controls on a system it is strongly encouraged that foreign nationals are not given privileged access to systems processing particularly sensitive information.</p>]]></paragraph>
<paragraph
    title="16.3.6.C.01."

    tags="Technical,Access Control,Passwords,NZEO"


    classification="All Classifications"
    compliance="Must Not"
    cid="1949"
><![CDATA[<p>Agencies MUST NOT allow foreign nationals, including seconded foreign nationals, to have privileged access to systems that process, store or communicate NZEO information.</p>]]></paragraph>
<paragraph
    title="16.3.6.C.02."

    tags="Technical,Access Control,Passwords"


    classification="All Classifications"
    compliance="Should Not"
    cid="1950"
><![CDATA[<p>Agencies SHOULD NOT allow foreign nationals, including seconded foreign nationals, to have privileged access to systems that process, store or communicate classified information.</p>]]></paragraph>
</block>
<block title="Security clearances for privileged users"><paragraph
    title="16.3.7.R.01."

    tags="Access Control,Passwords"


><![CDATA[<p>When frequent data transfers occur between systems of different classifications, having privileged users from the lesser system cleared to the classification of the higher system will assist in any actions that need to be taken resulting from any data spill.</p>]]></paragraph>
<paragraph
    title="16.3.7.C.01."

    tags="Technical,Access Control,Passwords"


    classification="All Classifications"
    compliance="Should"
    cid="1953"
><![CDATA[<p><span class="TextRun SCXW201738623 BCX8"><span class="NormalTextRun SCXW201738623 BCX8">Agencies</span><span class="NormalTextRun SCXW201738623 BCX8"> involved in frequent transfers of data from another system to their system with a lesser classification </span><span class="NormalTextRun SCXW201738623 BCX8">SHOULD </span><span class="NormalTextRun SCXW201738623 BCX8">ensure at</span><span class="NormalTextRun SCXW201738623 BCX8"> least one privileged user </span><span class="NormalTextRun SCXW201738623 BCX8">has a security clearance level </span><span class="NormalTextRun SCXW201738623 BCX8">commensurate</span><span class="NormalTextRun SCXW201738623 BCX8"> the classification of the higher system.</span></span></p>]]></paragraph>
</block>
</subsection>
</section>
<section title="16.4. Privileged Access Management"><subsection title="Objective"><paragraph
    title="16.4.1."


><![CDATA[<p class="NormS16C4">To ensure Privileged Access Management (PAM) is incorporated into IT Governance and that privileged accounts are managed in accordance with agency’s PAM policy.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="16.4.2."


><![CDATA[<p class="NormS16C4">This section provides information and guidance on the establishment and operation of an agency’s Privileged Access Management policy and control mechanisms.  This is sometimes also described as Privileged Account Management.  In the context of this section the terms are synonymous.</p>]]></paragraph>
<paragraph
    title="16.4.3."


><![CDATA[<p class="NormS16C4">Reference to other sections in this document is essential.&nbsp; In particular:</p>
<ul>
<li><a title="System users" href="http://nzism.gcsb.govt.nz/ism-document#Section-12444">3.5&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; System Users</a>;</li>
<li><a title="Documentation fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-12683">5.1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Documentation Fundamentals</a>;</li>
<li><a title="Change management" href="http://nzism.gcsb.govt.nz/ism-document#Section-13048">6.3&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Change Management</a>;</li>
<li><a title="Information security awareness and training" href="http://nzism.gcsb.govt.nz/ism-document#Section-13361">9.1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Information Security Awareness and Training</a>;</li>
<li><a title="Identification, authentication and authorisation" href="http://nzism.gcsb.govt.nz/ism-document#Section-15349">16.1&nbsp;&nbsp;&nbsp; Identification, Authentication, and Authorisation</a>;</li>
<li><a title="System access" href="http://nzism.gcsb.govt.nz/ism-document#Section-15483">16.2&nbsp;&nbsp;&nbsp; System Access</a>;</li>
<li><a title="Privileged user access" href="http://nzism.gcsb.govt.nz/ism-document#Section-15503">16.3&nbsp;&nbsp;&nbsp; Privileged User Access</a>;</li>
<li><a title="MFA" href="http://nzism.gcsb.govt.nz/ism-document#Section-15681">16.7&nbsp;&nbsp;&nbsp; Multi-Factor Authentication</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="16.4.4."


><![CDATA[<p class="NormS16C4"><strong>Privileged Access Management (PAM)</strong> – sometimes also described as Privileged Account Management, refers to a set of processes and tools for granting, controlling, monitoring, and auditing privileged access.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.4.5."


><![CDATA[<p class="NormS16C4">A <strong>Privileged Account</strong> is a user account with high levels of access to systems, devices and data.&nbsp; Privileged accounts may, for example, be able to install or remove software, delete data, upgrade operating systems, or modify system or application configurations.&nbsp; They may also have access to data that is not normally accessible to standard users.</p>]]></paragraph>
<paragraph
    title="16.4.6."


><![CDATA[<p class="NormS16C4">Privileged accounts invariably have direct or indirect access to most or all IT assets of an agency or organisation.&nbsp; When used improperly or maliciously, privileged accounts represent a significant security threat to operations, often exposing sensitive data, impeding operations or damaging IT systems.&nbsp; Any compromise of these accounts is, therefore, a significant business, operational and reputational risk.</p>]]></paragraph>
<paragraph
    title="16.4.7."


><![CDATA[<p class="NormS16C4"><span class="TextRun SCXW257963467 BCX8"><span class="NormalTextRun SCXW257963467 BCX8">Risks associated with privileged accounts have increased in recent years with the expansion of endpoints and use of </span><span class="NormalTextRun SCXW257963467 BCX8">new technologies</span><span class="NormalTextRun SCXW257963467 BCX8"> including Cloud, Internet of Things (IoT) and the rapid and significant increase in remote and working from home</span><span class="NormalTextRun SCXW257963467 BCX8"> environments</span><span class="NormalTextRun SCXW257963467 BCX8">.</span></span></p>]]></paragraph>
<paragraph
    title="16.4.8."


><![CDATA[<p class="NormS16C4">Managing, controlling, monitoring and reviewing privileged access is fundamental to mitigating the risks posed by insider and external threats, privilege escalation threats, preventing unauthorised data access and data breaches, and meeting compliance requirements.</p>]]></paragraph>
<paragraph
    title="16.4.9."


><![CDATA[<p class="NormS16C4">There are many types of privileged access including:</p>
<ul>
<li><strong>Root</strong>, <strong>Domain </strong>and other <strong>Administrator </strong>accounts are typically used for installing, updating and removing software, changing configurations and administering system passwords.</li>
<li><strong>Service Accounts</strong>, which may include local or domain accounts, are typically used for running processes, such as web servers, database servers, and application servers.&nbsp; These may also include the ability to change passwords.</li>
<li><strong>Emergency Accounts</strong>, sometimes referred to as “DRP”, “firecall”, or “breakglass” accounts. <span class="NormalTextRun SCXW182070699 BCX8">These are highly privileged accounts that are critical for </span><span class="NormalTextRun SCXW182070699 BCX8">maintaining</span><span class="NormalTextRun SCXW182070699 BCX8"> administrative access in case of emergency. While access to these accounts normally requires managerial approval as a security measure, they should only ever be used when normal administrative accounts are unavailable and when critically necessary.</span></li>
<li><strong>System </strong>or <strong>Application Accounts </strong>are characteristically used by devices and systems for running operating system components and owning related files.</li>
</ul>]]></paragraph>
<paragraph
    title="16.4.10."


><![CDATA[<p class="NormS16C4">Traditional administrative or management solutions are typically based on strong password management.&nbsp; Modern systems, especially in a cloud environment, require a more structured and robust means of access control and management.&nbsp; This should include the use of Multi-Factor Authentication (See Section 16.7 - Multi-factor Authentication) to provide access to privileged accounts.</p>]]></paragraph>
<paragraph
    title="16.4.11."


><![CDATA[<p class="NormS16C4">In secure environments, privileged accounts should be reserved for network and system administrators to manage the access to and oversight of sensitive information and resources in support of normal agency or organisational operations.</p>]]></paragraph>
<paragraph
    title="16.4.12."


><![CDATA[<p class="NormS16C4">The characteristics and capability of privileged accounts are described at 16.3.3.  It is important to note that systems themselves, as well as human users, may have privileged account access.  As such it is important to clearly and individually identify all real persons, systems and devices with privileged account access.</p>]]></paragraph>
<paragraph
    title="16.4.13."


><![CDATA[<p class="NormS16C4">Access accounts or channels may have the following characteristics:</p>
<ul>
<li><strong>Regular access channels</strong>—protected channels that are subject to standard IT controls;</li>
<li><strong>Privileged access channels (PACs)</strong>— channels that might circumvent regular controls but are deemed necessary and legitimate operational channels for reasons of practicality or cost;</li>
<li><strong>Unintended channels</strong>—not demanded by any technical or business requirement and represent a vulnerability.</li>
</ul>]]></paragraph>
</block>
<block title="Emergency accounts (Break glass accounts) "><paragraph
    title="16.4.14."


><![CDATA[<p><span class="TextRun Highlight SCXW64583340 BCX8"><span class="NormalTextRun SCXW64583340 BCX8">Emergency </span><span class="NormalTextRun SCXW64583340 BCX8">accounts</span><span class="NormalTextRun SCXW64583340 BCX8"> (also known as break glass accounts) are highly privileged accounts and should only be used for </span><span class="NormalTextRun SCXW64583340 BCX8">maintaining</span><span class="NormalTextRun SCXW64583340 BCX8"> access to </span><span class="NormalTextRun SCXW64583340 BCX8">an </span><span class="NormalTextRun SCXW64583340 BCX8">organisation</span><span class="NormalTextRun SCXW64583340 BCX8">’</span><span class="NormalTextRun SCXW64583340 BCX8">s </span><span class="NormalTextRun SCXW64583340 BCX8">critical systems in emergencies. These accounts require </span><span class="NormalTextRun SCXW64583340 BCX8">additional</span><span class="NormalTextRun SCXW64583340 BCX8"> layers of protection and</span><span class="NormalTextRun SCXW64583340 BCX8">&nbsp;should never be used for regular administrative functions.</span></span></p>]]></paragraph>
<paragraph
    title="16.4.15."


><![CDATA[<div class="SCXW4082012 BCX8">
<div class="ListContainerWrapper SCXW4082012 BCX8">
<p class="Paragraph SCXW4082012 BCX8"><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">Additional</span><span class="NormalTextRun SCXW4082012 BCX8"> protections include:&nbsp;</span></span><span class="EOP SCXW4082012 BCX8">&nbsp;</span></p>
</div>
<div class="ListContainerWrapper SCXW4082012 BCX8">
<ul>
<li class="Paragraph SCXW4082012 BCX8"><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">Break glass accounts are </span></span><strong><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">only</span></span></strong><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8"><strong> </strong>used when normal authentication processes cannot be used, </span></span><strong><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">and</span></span></strong><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8"><strong> </strong>when there is a critical need to access systems</span> <span class="NormalTextRun SCXW4082012 BCX8">(or testing these for disa</span><span class="NormalTextRun SCXW4082012 BCX8">s</span><span class="NormalTextRun SCXW4082012 BCX8">ter r</span><span class="NormalTextRun SCXW4082012 BCX8">ecovery)</span><span class="NormalTextRun SCXW4082012 BCX8">.</span></span></li>
<li class="Paragraph SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8"><strong>Use of non-expiring passwords</strong>:</span><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8"> passwords for break glass accounts should not expire. This helps prevent lockouts during emergencies.</span></span></li>
<li class="Paragraph SCXW4082012 BCX8"><strong><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">No individual association</span></span></strong><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">: </span><span class="NormalTextRun SCXW4082012 BCX8">ensure</span><span class="NormalTextRun SCXW4082012 BCX8"> emergency accounts are not associated to an individual user.</span></span></li>
<li class="Paragraph SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">Central logging</span><span class="NormalTextRun SCXW4082012 BCX8"> and auditing</span><span class="NormalTextRun SCXW4082012 BCX8"> of all actions related to use of break glass </span><span class="NormalTextRun SCXW4082012 BCX8">accounts</span> <span class="NormalTextRun SCXW4082012 BCX8">should be </span><span class="NormalTextRun SCXW4082012 BCX8">performed</span><span class="NormalTextRun SCXW4082012 BCX8">.</span> <span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">Accounts are tested after credentials are changed.</span></span><span class="EOP SCXW4082012 BCX8">&nbsp;</span></li>
</ul>
</div>
</div>]]></paragraph>
<paragraph
    title="16.4.16."


><![CDATA[<p><span class="TextRun Highlight SCXW165431320 BCX8"><span class="NormalTextRun SCXW165431320 BCX8">E</span><span class="NormalTextRun SCXW165431320 BCX8">mergency accounts</span><span class="NormalTextRun SCXW165431320 BCX8"> should be excluded </span><span class="NormalTextRun SCXW165431320 BCX8">from MFA policy. MFA </span><span class="NormalTextRun SCXW165431320 BCX8">on </span><span class="NormalTextRun SCXW165431320 BCX8">break glass</span><span class="NormalTextRun SCXW165431320 BCX8"> accounts </span><span class="NormalTextRun SCXW165431320 BCX8">should be managed through other mechanisms outside system policy</span><span class="NormalTextRun SCXW165431320 BCX8">.</span></span></p>]]></paragraph>
<paragraph
    title="16.4.17."


><![CDATA[<div class="ListContainerWrapper SCXW222682364 BCX8">
<p class="Paragraph SCXW222682364 BCX8"><span class="TextRun Highlight SCXW222682364 BCX8"><span class="NormalTextRun SCXW222682364 BCX8">Emergency accounts should have MFA without being associated to any user. </span><span class="NormalTextRun SCXW222682364 BCX8">Examples of</span> <span class="NormalTextRun SCXW222682364 BCX8">how this can be </span><span class="NormalTextRun SCXW222682364 BCX8">accomplished</span><span class="NormalTextRun SCXW222682364 BCX8"> are</span><span class="NormalTextRun SCXW222682364 BCX8">:&nbsp;</span></span><span class="EOP SCXW222682364 BCX8">&nbsp;</span></p>
</div>
<div class="ListContainerWrapper SCXW222682364 BCX8">
<ul>
<li class="Paragraph SCXW222682364 BCX8"><span class="TextRun Highlight SCXW222682364 BCX8"><span class="NormalTextRun SCXW222682364 BCX8">Utilisation of a </span><span class="NormalTextRun SCXW222682364 BCX8">password</span></span>
<ul>
<li class="Paragraph SCXW222682364 BCX8"><span class="TextRun Highlight SCXW222682364 BCX8"><span class="NormalTextRun SCXW222682364 BCX8">Pass</span><span class="NormalTextRun SCXW222682364 BCX8">word</span><span class="NormalTextRun SCXW222682364 BCX8">s can be split into </span><span class="NormalTextRun SCXW222682364 BCX8">two and</span><span class="NormalTextRun SCXW222682364 BCX8"> stored in separate safes with strict limitations on authorised personnel accessing each safe.<br><br></span></span></li>
</ul>
</li>
<li class="Paragraph SCXW222682364 BCX8"><span class="NormalTextRun SCXW222682364 BCX8">Use of FIDO2 security keys</span>
<ul>
<li class="Paragraph SCXW222682364 BCX8"><span class="NormalTextRun SCXW222682364 BCX8">Two separate keys can be registered and stored in separate safes with strict limitations on authorised personnel accessing each safe.<br><br></span></li>
</ul>
</li>
<li class="Paragraph SCXW222682364 BCX8">Virtualisation<span class="NormalTextRun SCXW222682364 BCX8">, </span><span class="NormalTextRun SCXW222682364 BCX8">noting this option cannot be associated to an individual user</span><span class="NormalTextRun SCXW222682364 BCX8">.</span></li>
</ul>
</div>]]></paragraph>
<paragraph
    title="16.4.18."


><![CDATA[<p><span class="TextRun Highlight SCXW181059006 BCX8"><span class="NormalTextRun SCXW181059006 BCX8">It is important to consider adequate </span><span class="NormalTextRun SCXW181059006 BCX8">storage and access of </span><span class="NormalTextRun SCXW181059006 BCX8">break glass</span><span class="NormalTextRun SCXW181059006 BCX8"> accounts </span><span class="NormalTextRun SCXW181059006 BCX8">in disaster recovery plans</span><span class="NormalTextRun SCXW181059006 BCX8">.</span> <span class="NormalTextRun SCXW181059006 BCX8">Storage, including how (and when) to access these accounts should be included in disaster recovery planning (DRP) (Chapter 3)</span><span class="NormalTextRun SCXW181059006 BCX8">.</span></span></p>]]></paragraph>
</block>
<block title="Attacks on privileged accounts"><paragraph
    title="16.4.19."


><![CDATA[<p>Privileged accounts frequently allow unrestricted access the IT infrastructure, often including data residing on those systems.&nbsp; The very high level of access and capability associated with privileged accounts makes them a prime target for external attackers and malicious insiders.&nbsp; A compromise of a privileged account can be extremely damaging and may even take down systems, such as in ransomware attacks.</p>]]></paragraph>
<paragraph
    title="16.4.20."


><![CDATA[<p>Compromised privileged accounts represent one of the largest security vulnerabilities an organisation. A compromise may allow attackers to take full control of an organisation’s IT infrastructure, disable security controls, steal confidential information, commit financial fraud and disrupt operations.&nbsp; Stolen, abused or misused privileged credentials are identified in a very high proportion of successful breaches.</p>]]></paragraph>
<paragraph
    title="16.4.16."


><![CDATA[<p class="NormS16C4">Common attack methods may include:</p><ul>
<li>Probes and scans;</li>
<li>endpoint targeting;</li>
<li>System and design vulnerability exploitation;</li>
<li>Social engineering (including phishing, email spoofing, etc); and</li>
<li>Malware implants.</li>
</ul>]]></paragraph>
<paragraph
    title="16.4.22."


><![CDATA[<p><span class="TextRun Highlight SCXW124756854 BCX8"><span class="NormalTextRun SCXW124756854 BCX8">These attack methods are </span><span class="NormalTextRun SCXW124756854 BCX8">essentially the</span><span class="NormalTextRun SCXW124756854 BCX8"> same as attack methods on standard accounts. The difference, however, is the level of access an attacker gains once successful, and the increase of risk to entities and </span><span class="NormalTextRun SCXW124756854 BCX8">organisations</span><span class="NormalTextRun SCXW124756854 BCX8">.</span></span></p>]]></paragraph>
</block>
<block title="Governance and Control"><paragraph
    title="16.4.23."


><![CDATA[<p class="NormS16C4">Privileged accounts are frequently used to deploy and maintain IT systems and necessarily exist in nearly every connected device, server, database, and application.&nbsp; Privileged accounts may extend beyond an agency-controlled IT infrastructure to include, for example, employee-managed corporate social media accounts.&nbsp; Most agencies and other organisations can typically have many more privileged accounts than employees, sometimes as many as two or three times the number of employees.&nbsp; It is not unusual for some privileged accounts to be unidentified, overlooked, unmanaged, and therefore unprotected.</p>]]></paragraph>
<paragraph
    title="16.4.24."


><![CDATA[<p class="NormS16C4">Governance ensures that privileged accounts are properly approved, controlled, monitored and decommissioned throughout their entire lifecycle.&nbsp; A PAM policy defines the roles, policies and mechanisms for access requests, as well as the workflow for privileged access approvals and delivery.&nbsp; Monitoring and auditing ensure that account permissions and usage remain appropriate over time.&nbsp; PAM governance is a fundamental part of IT Governance as it can influence other IT security systems, such as identity and access management systems.</p>]]></paragraph>
<paragraph
    title="16.4.25."


><![CDATA[<p class="NormS16C4"><span class="TextRun SCXW172537762 BCX8"><span class="NormalTextRun SCXW172537762 BCX8">To support strong IT Governance, it is vital that security efforts are </span><span class="NormalTextRun SCXW172537762 BCX8">coordinated,</span><span class="NormalTextRun SCXW172537762 BCX8"> and technology investment managed</span><span class="NormalTextRun SCXW172537762 BCX8">.&nbsp; </span><span class="NormalTextRun SCXW172537762 BCX8">This includes the integration of PAM into the Information Security Policy, Systems Architecture, IT Security Strategy and Risk Management Plan. The sensitivity of data and operations should be assessed by undertaking an impact assessment.</span></span><span class="EOP SCXW172537762 BCX8">&nbsp;</span></p>]]></paragraph>
<paragraph
    title="16.4.26."


><![CDATA[<p class="NormS16C4">Underpinning any PAM is the principle of enforcement of least privilege.&nbsp; This is defined as the minimisation of access rights and permissions for users, accounts, applications, systems, devices and computing processes to the absolute minimum necessary in order to perform routine, authorised activities and maintain the safe and secure operation of agency or organisational systems.</p>]]></paragraph>
<paragraph
    title="16.4.27."


><![CDATA[<p><span class="TextRun SCXW230104649 BCX8"><span class="NormalTextRun SCXW230104649 BCX8">Enforcing the principle of least privilege </span><span class="NormalTextRun SCXW230104649 BCX8">assists</span> <span class="NormalTextRun SCXW230104649 BCX8">organisations</span><span class="NormalTextRun SCXW230104649 BCX8"> in minimising their systems attack surface</span><span class="NormalTextRun SCXW230104649 BCX8"> and </span><span class="NormalTextRun SCXW230104649 BCX8">supporting audit and compliance</span><span class="NormalTextRun SCXW230104649 BCX8"> within </span><span class="NormalTextRun SCXW230104649 BCX8">agencies</span><span class="NormalTextRun SCXW230104649 BCX8">.</span><span class="NormalTextRun SCXW230104649 BCX8">&nbsp; </span><span class="NormalTextRun SCXW230104649 BCX8">This also can reduce risk, complexity, and costs for </span><span class="NormalTextRun SCXW230104649 BCX8">organisations</span><span class="NormalTextRun SCXW230104649 BCX8">.</span></span></p>]]></paragraph>
<paragraph
    title="16.4.28."


><![CDATA[<p class="NormS16C4">Provision of unnecessary system privileges or data access rights will magnify the impact of misuse or compromise of that users account and can even be devastating. &nbsp;Account privileges should be established to provide a reasonable but minimal level of system privileges and rights needed in order to support the purpose and role. &nbsp;The granting of elevated or excessive system privileges should be carefully controlled and managed.</p>]]></paragraph>
<paragraph
    title="16.4.29."


><![CDATA[<p class="NormS16C4">Risks associated with access to privileged accounts include:</p>
<ul>
<li>Misuse of privileges;</li>
<li>Increased attacker capability;</li>
<li>Circumventing established security and oversight controls;</li>
<li>Severe system disruption or failure; and</li>
<li>Significant data compromise and/or loss.</li>
</ul>]]></paragraph>
<paragraph
    title="16.4.30."


><![CDATA[<div class="SCXW148547555 BCX8">
<div class="ListContainerWrapper SCXW148547555 BCX8">
<p class="Paragraph SCXW148547555 BCX8"><span class="TextRun SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">The principles of PAM controls are to:</span></span><span class="EOP SCXW148547555 BCX8">&nbsp;</span></p>
</div>
<div class="ListContainerWrapper SCXW148547555 BCX8">
<ul>
<li class="Paragraph SCXW148547555 BCX8"><span class="TextRun SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Establish and </span><span class="NormalTextRun SCXW148547555 BCX8">maintain</span><span class="NormalTextRun SCXW148547555 BCX8"> an inventory of privileged </span><span class="NormalTextRun SCXW148547555 BCX8">accounts;</span></span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Assess the risk</span><span class="NormalTextRun SCXW148547555 BCX8">(s)</span><span class="NormalTextRun SCXW148547555 BCX8"> of each privileged </span><span class="NormalTextRun SCXW148547555 BCX8">account</span><span class="NormalTextRun SCXW148547555 BCX8">;</span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="TextRun Highlight SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Enforce the principle of least&nbsp;</span><span class="NormalTextRun SCXW148547555 BCX8">privilege</span><span class="NormalTextRun SCXW148547555 BCX8">;</span></span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Use Multi-Factor Authentication for access to privileged a</span><span class="NormalTextRun SCXW148547555 BCX8">ccounts;</span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="TextRun SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Minimise access to only essential&nbsp;</span><span class="NormalTextRun SCXW148547555 BCX8">activities</span><span class="NormalTextRun SCXW148547555 BCX8">;</span></span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="TextRun SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Minimise the number of privileged&nbsp;</span><span class="NormalTextRun SCXW148547555 BCX8">access</span> <span class="NormalTextRun SCXW148547555 BCX8">channels</span><span class="NormalTextRun SCXW148547555 BCX8">;</span></span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Ensure each channel and user can be uniquely&nbsp;</span><span class="NormalTextRun SCXW148547555 BCX8">identified</span><span class="NormalTextRun SCXW148547555 BCX8"> (prevent or minimise sharing of credentials, particularly with accounts such as “root” or “admin”</span><span class="NormalTextRun SCXW148547555 BCX8">);</span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Ensure&nbsp;</span><span class="NormalTextRun SCXW148547555 BCX8">all </span><span class="NormalTextRun SCXW148547555 BCX8">logs are periodically </span><span class="NormalTextRun SCXW148547555 BCX8">reviewed</span><span class="NormalTextRun SCXW148547555 BCX8">;</span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Ensure strong and strict change control procedures are&nbsp;</span><span class="NormalTextRun SCXW148547555 BCX8">implemented</span><span class="NormalTextRun SCXW148547555 BCX8">;</span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Ensure the a</span><span class="NormalTextRun SCXW148547555 BCX8">uthorisation, activation and deactivation of privileged access channels is strictly enforced</span><span class="NormalTextRun SCXW148547555 BCX8">;&nbsp;</span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Regularly audit and review PAM controls</span><span class="NormalTextRun SCXW148547555 BCX8">; and</span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Reduce scope creep through regular reviewing of privilege user accounts.</span><span class="EOP SCXW148547555 BCX8">&nbsp;</span></li>
</ul>
</div>
</div>]]></paragraph>
<paragraph
    title="16.4.31."


><![CDATA[<p class="NormS16C4">It is also important to define all privileged accounts used by an agency or by other organisations, particularly where outsource arrangements are in place. &nbsp;It is fundamental for robust security to identify and record the business functions, related data, systems and access privileges.&nbsp; This is particularly important for agencies that create, store and process classified data.</p>]]></paragraph>
<paragraph
    title="16.4.32."


><![CDATA[<p class="NormS16C4">Without a comprehensive privileged accounts inventory, agencies and other organisations may overlook <strong>“backdoor”</strong> accounts which allow users to bypass proper controls and auditing. &nbsp;These may have been created during system development, by malicious insiders or by external attackers.&nbsp; Such unregistered accounts may be undetected for months or even years and can create a means of unauthorised and unmonitored access.&nbsp; Such accounts may also be used to erase activity logs to avoid detection.</p>]]></paragraph>
<paragraph
    title="16.4.33."


><![CDATA[<p class="NormS16C4">A privileged access inventory should include a description of the IT system, information asset, privilege description, privileged users and risk classification.&nbsp; This is essential information for assessing risk, the determining of controls and for identifying and managing use and misuse.<strong>&nbsp; </strong>Of note are:</p>
<ul>
<li>Local or Domain Server Admin accounts;</li>
<li>Domain Admin accounts that typically control Active Directory users;</li>
<li>System Admin accounts that manage databases;</li>
<li>Root accounts that manage Unix/Linux platforms;</li>
<li>Accounts that run and manage Windows applications, services, and scheduled tasks;</li>
<li>IIS application pools (.NET applications);</li>
<li>Networking equipment accounts that give access to firewalls, routers, switches, session border controllers, gateways and other similar devices, whether physical or virtual.</li>
</ul>]]></paragraph>
<paragraph
    title="16.4.34."


><![CDATA[<p class="NormS16C4">Privileged Access Management systems provide many of the capabilities and controls briefly described above and can facilitate PAM, as well as supporting strong IT Governance.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="16.4.35."


><![CDATA[<p>Additional information relating to Privileged Account and access management, including some policy examples, can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p class="hero-text "><span class="TextRun SCXW135158925 BCX8"><span class="NormalTextRun SCXW135158925 BCX8">ISO/IEC 27001</span></span><span class="EOP SCXW135158925 BCX8">&nbsp;</span></p>
</td>
<td><span class="TextRun SCXW30954663 BCX8"><span class="NormalTextRun SCXW30954663 BCX8">ISO/IEC/ Standards NZ</span></span><span class="EOP SCXW30954663 BCX8">&nbsp;</span></td>
<td><a class="Hyperlink SCXW159235573 BCX8" rel="noopener noreferrer" href="https://www.standards.govt.nz/shop/ISOIEC-270012022" target="_blank"><span class="TextRun Underlined SCXW159235573 BCX8"><span class="NormalTextRun SCXW159235573 BCX8">Standards New Zealand</span></span></a><span class="EOP SCXW159235573 BCX8">&nbsp;</span></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span class="TextRun SCXW68462380 BCX8"><span class="NormalTextRun SCXW68462380 BCX8">Restrict Administrative Privileges</span></span><span class="EOP SCXW68462380 BCX8">&nbsp;</span></td>
<td><span class="TextRun SCXW10020922 BCX8"><span class="NormalTextRun SCXW10020922 BCX8">ASD</span></span><span class="EOP SCXW10020922 BCX8">&nbsp;</span></td>
<td><a class="Hyperlink SCXW43543802 BCX8" rel="noopener noreferrer" href="https://blueprint.asd.gov.au/security-and-governance/essential-eight/restrict-administrative-privileges/#:~:text=This%20page%20provides%20a%20template%20and%20guidance%20to,for%20Secure%20Cloud.%20Estimated%20reading%20time%3A%207%20minutes" target="_blank"><span class="TextRun Underlined SCXW43543802 BCX8"><span class="NormalTextRun SCXW43543802 BCX8">Restrict Administrative Privileges | ASD's Blueprint for Secure Cloud</span></span></a><span class="EOP SCXW43543802 BCX8">&nbsp;</span></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span class="TextRun SCXW5018897 BCX8"><span class="NormalTextRun SCXW5018897 BCX8">Identity and access management</span></span><span class="EOP SCXW5018897 BCX8">&nbsp;</span></td>
<td>NCSC - UK</td>
<td><a class="Hyperlink SCXW170278289 BCX8" rel="noopener noreferrer" href="https://www.ncsc.gov.uk/collection/10-steps/identity-and-access-management" target="_blank"><span class="TextRun Underlined SCXW170278289 BCX8"><span class="NormalTextRun SCXW170278289 BCX8">Identity and access management - NCSC.GOV.UK</span></span></a><span class="EOP SCXW170278289 BCX8">&nbsp;</span></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Securing privileged access</td>
<td>Microsoft</td>
<td><a class="Hyperlink SCXW217191223 BCX8" rel="noopener noreferrer" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/overview" target="_blank"><span class="TextRun Underlined SCXW217191223 BCX8"><span class="NormalTextRun SCXW217191223 BCX8">Securing privileged access overview - Privileged access | Microsoft Learn</span></span></a><span class="EOP SCXW217191223 BCX8">&nbsp;</span></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span class="TextRun SCXW154616449 BCX8"><span class="NormalTextRun SCXW154616449 BCX8">Manage emergency accounts in Microsoft Entra ID&nbsp;</span></span><span class="EOP SCXW154616449 BCX8">&nbsp;</span></td>
<td><span class="TextRun SCXW73268727 BCX8"><span class="NormalTextRun SCXW73268727 BCX8">Microsoft</span></span><span class="EOP SCXW73268727 BCX8">&nbsp;</span></td>
<td><span class="TextRun Underlined SCXW217191223 BCX8"><span class="NormalTextRun SCXW217191223 BCX8"><a class="Hyperlink SCXW101186309 BCX8" rel="noopener noreferrer" href="https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/security-emergency-access" target="_blank"><span class="TextRun Underlined SCXW101186309 BCX8"><span class="NormalTextRun SCXW101186309 BCX8">Manage emergency access admin accounts - Microsoft Entra ID | Microsoft Learn</span></span></a><span class="EOP SCXW101186309 BCX8">&nbsp;</span></span></span></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span class="TextRun SCXW22399984 BCX8"><span class="NormalTextRun SCXW22399984 BCX8">Privileged Account Management</span></span><span class="EOP SCXW22399984 BCX8">&nbsp;</span></td>
<td>MITRE Corporation</td>
<td><a class="Hyperlink SCXW244217405 BCX8" rel="noopener noreferrer" href="https://attack.mitre.org/mitigations/M1026/" target="_blank"><span class="TextRun Underlined SCXW244217405 BCX8"><span class="NormalTextRun SCXW244217405 BCX8">Privileged Account Management, Mitigation M1026 - Enterprise | MITRE ATT&amp;CK®</span></span></a><span class="EOP SCXW244217405 BCX8">&nbsp;</span></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title=" Policy Creation and Implementation"><paragraph
    title="16.4.36.R.01."

    tags="Information Security Documentation,Access Control"


><![CDATA[<p class="NormS22C2">The requirement for an agency security policy is discussed and described in <strong>Chapter 5 – Information Security Documentation</strong>.&nbsp; A fundamental part of any security policy is the inclusion of requirements for the treatment of Privileged Accounts.&nbsp; This is most conveniently contained in a Privileged Access Management (PAM) section within the agency’s security policy.&nbsp; A PAM policy is a fundamental component of an agency’s IT Governance.</p>]]></paragraph>
<paragraph
    title="16.4.36.C.01."

    tags="Governance,Information Security Documentation,Access Control"


    classification="All Classifications"
    compliance="Must"
    cid="6835"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies </span><span>MUST establish a Privileged Access Management (PAM) policy</span><span>.</span></p>]]></paragraph>
<paragraph
    title="16.4.36.C.02."

    tags="Governance,Information Security Documentation,Access Control"


    classification="All Classifications"
    compliance="Must"
    cid="6836"
><![CDATA[<p class="Normal-nonumbering">Within the context of agency operations, the agency’s PAM policy MUST define:</p>
<ul>
<li>a privileged account; and</li>
<li>privileged access.</li>
</ul>]]></paragraph>
<paragraph
    title="16.4.36.C.03."

    tags="Governance,Information Security Documentation,Access Control"


    classification="All Classifications"
    compliance="Must"
    cid="6837"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies </span><span>MUST manage privileged accounts in accordance with the agency’s PAM policy</span><span>.</span></p>]]></paragraph>
</block>
<block title=" The Principle of Least Privilege"><paragraph
    title="16.4.37.R.01."

    tags="Access Control,privileged access"


><![CDATA[<p>The Principle of Least Privilege is discussed in the <strong>Context </strong>part of this section.&nbsp; This principle stipulates the minimisation of access rights and permissions for users, accounts, applications, systems, devices and computing processes to the absolute minimum necessary in order to perform routine, authorised activities and maintain the safe and secure operation of agency or organisational systems.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.4.37.R.02."

    tags="Access Control,privileged access"


><![CDATA[<p>The implementation of the Principle of Least Privilege requires limitations on the number and use of privileged accounts as well as minimising the numbers of users with these privileges.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.4.37.R.03."

    tags="Access Control,MFA,privileged access"


><![CDATA[<p>The use of privileged access should also follow the principle of least privilege by ensuring the use of two-factor or Multi-Factor Authentication for access to privileged accounts and ensuring that only activity requiring such access is undertaken.&nbsp; Refer to <a title="16.7 Multi-Factor Authentication" href="http://nzism.gcsb.govt.nz/ism-document#Section-15681">Section 16.7 – Multi-Factor Authentication</a>.&nbsp; User accounts without privileged access should be used for all other activities.&nbsp; Refer to <a title="16.3 Privileged User Access (PAM)" href="http://nzism.gcsb.govt.nz/ism-document#Section-15503">Section 16.3 – Privileged User Access</a>.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.4.37.C.01."

    tags="Governance,Access Control,PAM,privileged access"


    classification="All Classifications"
    compliance="Must"
    cid="6842"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies </span><span>MUST apply the </span><span>Principle of Least Privilege when developing and implementing a Privileged </span><span>Access Management (PAM) policy</span><span>.</span></p>]]></paragraph>
<paragraph
    title="16.4.37.C.02."

    tags="Governance,Access Control,MFA,PAM,privileged access"


    classification="All Classifications"
    compliance="Must"
    cid="6843"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies </span><span>MUST use two-factor or Multi-Factor Authentication to allow access to privileged accounts</span><span>.</span></p>]]></paragraph>
<paragraph
    title="16.4.37.C.03."

    tags="Technical,Access Control,privileged access"


    classification="All Classifications"
    compliance="Should"
    cid="7550"
><![CDATA[<p><span class="NormalTextRun SCXW132241447 BCX8">Agencies</span> <span class="NormalTextRun SCXW132241447 BCX8">SHOULD</span><span class="NormalTextRun SCXW132241447 BCX8"> consider the use of </span><span class="NormalTextRun SCXW132241447 BCX8">time bound revocation to privileged accounts.</span></p>]]></paragraph>
</block>
<block title=" Strong Authentication process"><paragraph
    title="16.4.38.R.01."

    tags="Access Control,authorisation,PAM,privileged access"


><![CDATA[<p class="Normal-nonumbering"><span class="TextRun SCXW119438814 BCX8"><span class="NormalTextRun SCXW119438814 BCX8">T</span><span class="NormalTextRun SCXW119438814 BCX8">he</span></span><span class="TextRun SCXW119438814 BCX8"> <span class="NormalTextRun SCXW119438814 BCX8">approval and authorisation process for the granting of p</span><span class="NormalTextRun SCXW119438814 BCX8">rivilege</span><span class="NormalTextRun SCXW119438814 BCX8">d access should be based on the requirement to m</span></span><span class="TextRun SCXW119438814 BCX8"><span class="NormalTextRun SCXW119438814 BCX8">anage and protect </span><span class="NormalTextRun SCXW119438814 BCX8">organisational</span> <span class="NormalTextRun SCXW119438814 BCX8">systems and assets or as an operational necessity only</span><span class="NormalTextRun SCXW119438814 BCX8">.</span></span><span class="EOP SCXW119438814 BCX8">&nbsp;</span></p>]]></paragraph>
<paragraph
    title="16.4.38.C.01."

    tags="Governance,Access Control,authorisation,PAM,privileged access"


    classification="All Classifications"
    compliance="Must"
    cid="6846"
><![CDATA[<p class="Normal-nonumbering"><span>As part of a </span><span>Privileged </span><span>Access Management (PAM) policy, agencies MUST establish and implement a strong approval and authorisation process before any privileged access credentials are issued</span><span>.</span></p>]]></paragraph>
<paragraph
    title="16.4.38.C.02."

    tags="Governance,Access Control,authorisation,PAM,privileged access"


    classification="All Classifications"
    compliance="Must Not"
    cid="6847"
><![CDATA[<p>Privileged Access credentials MUST NOT be issued until approval has been formally granted.</p>]]></paragraph>
</block>
<block title=" Suspension and Revocation of Privileged Access Credentials"><paragraph
    title="16.4.39.R.01."

    tags="Access Control,privileged access"


><![CDATA[<p>Because privileged accounts have high levels of trust associated with the issue of related credentials, any indication that credentials or accounts have been compromised or that credentials have been misused must be immediately investigated.&nbsp; Actions may include the immediate suspension of credentials.&nbsp; Revocation may follow depending on the outcome of the investigation.</p>]]></paragraph>
<paragraph
    title="16.4.39.R.02."

    tags="Access Control,Passwords"


><![CDATA[<p>The privileged access credentials for staff and other users (such as authorised contractors) should be suspended or revoked as part of exit procedures when staff leave the agency and when other users no longer undertake duties for the agency.&nbsp; This ensures the numbers of credentials are controlled, credentials are revoked when no longer required for operational purposes and that the risk of unauthorised activities and access is minimised.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.4.39.C.01."

    tags="Governance,Access Control,Passwords"


    classification="All Classifications"
    compliance="Must"
    cid="6852"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies </span><span>MUST establish robust credential suspension and revocation procedures as part of the agency’s </span><span>Privileged </span><span>Access Management (PAM) policy</span><span>.</span></p>]]></paragraph>
<paragraph
    title="16.4.39.C.02."

    tags="Technical,Access Control"


    classification="All Classifications"
    compliance="Must"
    cid="7553"
><![CDATA[<p><span class="TextRun Highlight SCXW17435025 BCX8"><span class="NormalTextRun SCXW17435025 BCX8">Agencies</span> </span><span class="TextRun Highlight SCXW17435025 BCX8"><span class="NormalTextRun SCXW17435025 BCX8">MUST </span><span class="NormalTextRun SCXW17435025 BCX8">investigate any </span><span class="NormalTextRun SCXW17435025 BCX8">indication</span><span class="NormalTextRun SCXW17435025 BCX8"> of compromise or misuse </span><span class="NormalTextRun SCXW17435025 BCX8">of systems credentials or accounts</span></span><span class="TextRun Highlight SCXW17435025 BCX8"><span class="NormalTextRun SCXW17435025 BCX8">.</span></span></p>]]></paragraph>
</block>
<block title=" Privileged Account, Rights and Credential Inventory"><paragraph
    title="16.4.40.R.01."

    tags="Governance,Access Control,Passwords"


><![CDATA[<p>Account and credential “sprawl” is a continuing challenge as the number of users constantly changes and the number and variety of devices evolves and grows.&nbsp; The growing use of the Internet of Things (IoT) is a good example of this.&nbsp; A primary tool in the management and containment of sprawl is the creation and maintenance of an inventory of privileged accounts and the access rights and credential associated with those accounts together with a process of continuous discovery.&nbsp; This will assist in curbing privileged account sprawl, identifying potential insider abuse, and exposing external threats and malicious activity.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.4.40.C.01."

    tags="Governance,Access Control,Passwords"


    classification="All Classifications"
    compliance="Must"
    cid="6855"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST create and maintain a comprehensive inventory of privileged accounts and the associated access rights and credentials.</span></p>]]></paragraph>
</block>
<block title=" Monitoring and Review"><paragraph
    title="16.4.41.R.01."

    tags="Access Control,privileged access"


><![CDATA[<p>Privileged Accounts have high levels of system and data access and are a “high value target” for malicious cyber-attacks and insider misuse.&nbsp; Access to privileged accounts can be extremely damaging to systems and can cause data and privacy breaches as well as data loss.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.4.41.R.02."

    tags="Access Control,privileged access"


><![CDATA[<p>A key control in the ongoing integrity of privileged accounts and their associated credentials is a robust system of monitoring and review in order to maintain the inventory of privileged accounts and implement a process of continuous discovery to curb privileged account sprawl, identify potential insider abuse, and reveal external threats.&nbsp; This includes continuous data and operations impact assessments.</p>]]></paragraph>
<paragraph
    title="16.4.41.C.01."

    tags="Governance,Access Control,Passwords,Event Logging,privileged access"


    classification="All Classifications"
    compliance="Must"
    cid="6859"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST create, implement and maintain a robust system of continuous discovery, monitoring and review of privileged accounts and the access rights and credentials associated with those accounts.</span></p>]]></paragraph>
<paragraph
    title="16.4.41.C.02."

    tags="Governance,Access Control,Incident Management,Passwords,Event Logging,Information Security Incidents,privileged access"


    classification="All Classifications"
    compliance="Must"
    cid="6860"
><![CDATA[<p class="Normal-nonumbering">Privileged account monitoring systems MUST monitor and record:</p>
<ul>
<li>individual user activity, including exceptions such as out of hours access;</li>
<li>activity from unauthorised sources;</li>
<li>any unusual use patterns; and</li>
<li>any creation of unauthorised privileges access credentials.</li>
</ul>]]></paragraph>
<paragraph
    title="16.4.41.C.03."

    tags="Governance,Access Control,Incident Management,Passwords,Event Logging,Information Security Incidents,privileged access"


    classification="All Classifications"
    compliance="Must"
    cid="6861"
><![CDATA[<p>Agencies MUST protect and limit access to activity and audit logs and records.</p>]]></paragraph>
</block>
<block title=" Response and Remediation"><paragraph
    title="16.4.42.R.01."

    tags="Access Control,Incident Management,privileged access"


><![CDATA[<p>Because privileged accounts have high levels of system and data access, a rapid response to unusual or anomalous activity is fundamental to the maintenance of the integrity of an agency’s systems and data.&nbsp; Any response must take urgent action to protect compromised accounts and systems based on defined policy and breach intelligence.&nbsp; This may include, for example, the immediate suspension of credentials, password rotation or deactivation of credentials.</p>]]></paragraph>
<paragraph
    title="16.4.42.C.01."

    tags="Governance,Access Control,Incident Management,Information Security Incidents,PAM,privileged access"


    classification="All Classifications"
    compliance="Must"
    cid="6864"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST develop and implement a response and remediation policy and procedure as part of an agency’s Privileged Access Management (PAM) policy.</span></p>]]></paragraph>
</block>
<block title=" User Education and Awareness"><paragraph
    title="16.4.43.R.01."

    tags="Information Security Documentation,Access Control,PAM,privileged access,training &amp; awareness"


><![CDATA[<p><span class="NormalTextRun SCXW42666293 BCX8">Privileged Account access may have procedures </span><span class="NormalTextRun SCXW42666293 BCX8">additional</span><span class="NormalTextRun SCXW42666293 BCX8"> to or that vary from an </span><span class="NormalTextRun SCXW42666293 BCX8">organisation’s</span><span class="NormalTextRun SCXW42666293 BCX8"> usual account security and maintenance processes and procedures</span><span class="NormalTextRun SCXW42666293 BCX8">.&nbsp; </span><span class="NormalTextRun SCXW42666293 BCX8">As an </span><span class="NormalTextRun SCXW42666293 BCX8">agency</span><span class="NormalTextRun SCXW42666293 BCX8"> will have </span><span class="NormalTextRun SCXW42666293 BCX8">established</span><span class="NormalTextRun SCXW42666293 BCX8"> a Privileged Account Management (PAM) policy, this can be conveniently dealt with as a separate or </span><span class="NormalTextRun SCXW42666293 BCX8">additional</span><span class="NormalTextRun SCXW42666293 BCX8"> component of user training and awareness</span><span class="NormalTextRun SCXW42666293 BCX8">. </span>Refer also to <a title="3.5 System Users" href="http://nzism.gcsb.govt.nz/ism-document#Section-12444">Section 3.5 - System Users</a> and <a title="9.1 Information Security Awareness and Training" href="http://nzism.gcsb.govt.nz/ism-document#Section-13361">Section 9.1 - Information Security Awareness and Training</a>.</p>]]></paragraph>
<paragraph
    title="16.4.43.R.02."

    tags="Governance,Access Control,privileged access,training &amp; awareness"


><![CDATA[<p><span class="TextRun SCXW247016944 BCX8"><span class="NormalTextRun SCXW247016944 BCX8">User training and awareness is necessary to provide specific training to users of privileged accounts. This training should provide detailed information specific to users of privileged accounts. This includes awareness of the characteristics and value of privileged accounts, the </span><span class="NormalTextRun SCXW247016944 BCX8">additional</span><span class="NormalTextRun SCXW247016944 BCX8"> responsibilities of users of these accounts, and the risk to </span><span class="NormalTextRun SCXW247016944 BCX8">organisations</span><span class="NormalTextRun SCXW247016944 BCX8"> and systems if these accounts get breached.</span></span></p>]]></paragraph>
<paragraph
    title="16.4.43.C.01."

    tags="Governance,Access Control,Passwords,PAM,privileged access,training &amp; awareness"


    classification="All Classifications"
    compliance="Must"
    cid="6868"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST implement a Privileged Access Management (PAM) policy training module as part of the agency’s overall user training and awareness requirement.</span></p>]]></paragraph>
</block>
</subsection>
</section>
<section title="16.5. Remote Access"><subsection title="Objective"><paragraph
    title="16.5.1."


><![CDATA[<p><span class="TextRun SCXW46699965 BCX8"><span class="NormalTextRun SCXW46699965 BCX8">Remote access to systems is</span> <span class="NormalTextRun SCXW46699965 BCX8">secure, controlled</span><span class="NormalTextRun SCXW46699965 BCX8"> and</span><span class="NormalTextRun SCXW46699965 BCX8"> authorised.</span></span></p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="16.5.2."


><![CDATA[<p>This section covers information relating to the methods used by personnel to access an agency system from a remote location.</p>]]></paragraph>
</block>
<block title="Remote access"><paragraph
    title="16.5.3."


><![CDATA[<p>Remote access is defined as user access to agency systems originating outside an agency network. &nbsp;It does not include web–based access to DMZ resources. &nbsp;Further information on working off–site can be found in <a title="Distributed working" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-17003">Chapter 21 – Distributed working</a>. &nbsp;The requirements for using multi–factor authentication are described in the Identification and Authentication section of this chapter.</p>]]></paragraph>
</block>
<block title="Remote privileged access"><paragraph
    title="16.5.4."


><![CDATA[<p>Remote access by a privileged user to an agency system via a less trusted security domain (for example, the Internet) may present additional risks.  Controls in this section are designed to prevent escalation of user privileges from a compromised remote access account.</p>]]></paragraph>
<paragraph
    title="16.5.5."


><![CDATA[<p><span class="TextRun SCXW186714649 BCX8"><span class="NormalTextRun SCXW186714649 BCX8">Remote privileged access does </span></span><span class="TextRun SCXW186714649 BCX8"><span class="NormalTextRun SCXW186714649 BCX8">not </span></span><span class="TextRun SCXW186714649 BCX8"><span class="NormalTextRun SCXW186714649 BCX8">include privileged access across disparate physical sites that are within the same security domain or privileged access across remote sites that are connected via trusted infrastructure</span><span class="NormalTextRun SCXW186714649 BCX8">.&nbsp; </span><span class="NormalTextRun SCXW186714649 BCX8">Privileged access of this nature faces different threats to those discussed above</span><span class="NormalTextRun SCXW186714649 BCX8">.&nbsp; </span><span class="NormalTextRun SCXW186714649 BCX8">Ensuring robust processes and procedures are in place within an </span><span class="NormalTextRun SCXW186714649 BCX8">organis</span><span class="NormalTextRun SCXW186714649 BCX8">ation</span><span class="NormalTextRun SCXW186714649 BCX8"> to </span><span class="NormalTextRun SCXW186714649 BCX8">monitor</span><span class="NormalTextRun SCXW186714649 BCX8"> and detect the threat of a malicious insider are the most important measure for this scenario.</span></span></p>]]></paragraph>
</block>
<block title="Encryption"><paragraph
    title="16.5.6."


><![CDATA[<p>Cryptography is used to provide confidentiality and preserve integrity of data transmitted over networks where it may be intercepted or examined and is outside the control of the sender and recipient.</p>]]></paragraph>
<paragraph
    title="16.5.7."


><![CDATA[<p>With the increases in speed and computing power and the cost reductions of modern computing, older cryptographic algorithms are increasingly vulnerable.  It is vital that recommendations and controls in the NZISM are followed.</p>]]></paragraph>
<paragraph
    title="16.5.8."


><![CDATA[<p>The use of approved cryptographic algorithms to encrypt authentication, session establishment and data for all remote access connections is considered good practice (See <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 - Cryptography</a> and <a title="Distributed working" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-17003">Chapter 21 - Distributed Working</a>).</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="16.5.9."


><![CDATA[<p class="NormS10C7">Further references can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td>Title</td>
<td>Publisher</td>
<td>Source</td>
</tr>
<tr>
<td>
<p><span class="TextRun SCXW106064733 BCX8"><span class="NormalTextRun SCXW106064733 BCX8">Multi-Site Connectivity</span></span><span class="EOP SCXW106064733 BCX8">&nbsp;</span></p>
</td>
<td>NSA</td>
<td>
<p><a href="https://www.nsa.gov/Resources/Commercial-Solutions-for-Classified-Program/Capability-Packages/#multi-site">Capability Packages (nsa.gov)</a></p>
</td>
</tr>
<tr>
<td>
<p><span class="TextRun SCXW138605928 BCX8"><span class="NormalTextRun SCXW138605928 BCX8">NIST Special Publication 800-114</span><span class="NormalTextRun SCXW138605928 BCX8">: </span><span class="NormalTextRun SCXW138605928 BCX8">User’s Guide to Telework and Bring Your Own Device (BYOD) Security</span></span><span class="EOP SCXW138605928 BCX8">&nbsp;</span></p>
</td>
<td>NIST</td>
<td>
<p><a class="Hyperlink SCXW213998247 BCX8" rel="noopener noreferrer" href="https://csrc.nist.gov/pubs/sp/800/46/r2/final" target="_blank"><span class="TextRun Underlined SCXW213998247 BCX8"><span class="NormalTextRun SCXW213998247 BCX8">SP 800-46 Rev. 2, Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security | CSRC</span></span></a><span class="EOP SCXW213998247 BCX8">&nbsp;</span></p>
</td>
</tr>
</tbody>
</table>
<p class="NormS10C7">&nbsp;</p>
<p class="NormS10C7">&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Authentication"><paragraph
    title="16.5.10.R.01."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>Authenticating remote system users and devices ensures that only authorised system users and devices are allowed to connect to agency systems.</p>]]></paragraph>
<paragraph
    title="16.5.10.C.01."

    tags="Technical,Access Control,Passwords"


    classification="All Classifications"
    compliance="Must"
    cid="1973"
><![CDATA[<p>Agencies MUST authenticate each remote connection and user prior to permitting access to an agency system.</p>]]></paragraph>
<paragraph
    title="16.5.10.C.02."

    tags="Technical,Access Control,Passwords"


    classification="All Classifications"
    compliance="Should"
    cid="1974"
><![CDATA[<p>Agencies SHOULD authenticate both the remote system user and device during the authentication process.</p>]]></paragraph>
</block>
<block title="Remote privileged access"><paragraph
    title="16.5.11.R.01."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>A compromise of remote access to a system can be limited by preventing the use of remote privileged access from an untrusted domain.</p>]]></paragraph>
<paragraph
    title="16.5.11.C.01."

    tags="Technical,Access Control,Passwords"


    classification="Top Secret, Secret, Confidential"
    compliance="Must Not"
    cid="1977"
><![CDATA[<p>Agencies MUST NOT allow the use of remote privileged access from an untrusted domain, including logging in as an unprivileged system user and then escalating privileges.</p>]]></paragraph>
<paragraph
    title="16.5.11.C.02."

    tags="Technical,Access Control,Passwords"


    classification="All Classifications"
    compliance="Should Not"
    cid="1978"
><![CDATA[<p>Agencies SHOULD NOT allow the use of remote privileged access from an untrusted domain, including logging in as an unprivileged system user and then escalating privileges.</p>]]></paragraph>
</block>
<block title="Virtual Private Networks (VPNs)"><paragraph
    title="16.5.12.R.01."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>Virtual Private Networks (VPN’s) use a tunnelling protocol to create a secure connection over an intermediate (public) network such as the internet. &nbsp;A VPN uses techniques such as encryption, authentication, authorisation and access control to achieve a secure connection. See Chapter 17 for details on cryptographic selection and implementation.</p>]]></paragraph>
<paragraph
    title="16.5.12.R.02."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>A VPN can connect remote or mobile workers or remote locations to a private (agency) network.</p>]]></paragraph>
<paragraph
    title="16.5.12.R.03."


><![CDATA[<p><span class="TextRun Highlight SCXW191307459 BCX8"><span class="NormalTextRun SCXW191307459 BCX8">Using Zero Trust principles alongside the use of VPNs provides </span><span class="NormalTextRun SCXW191307459 BCX8">additional</span><span class="NormalTextRun SCXW191307459 BCX8"> security to </span><span class="NormalTextRun SCXW191307459 BCX8">agency</span> <span class="NormalTextRun SCXW191307459 BCX8">systems. For example, if a compromised device connects through a VPN to an </span><span class="NormalTextRun SCXW191307459 BCX8">organisation</span> <span class="NormalTextRun SCXW191307459 BCX8">enforcing Zero Trust principles, potential damage to the </span><span class="NormalTextRun SCXW191307459 BCX8">organisation</span> <span class="NormalTextRun SCXW191307459 BCX8">will be minimised through limiting the access of the potential compromise</span><span class="NormalTextRun SCXW191307459 BCX8">.</span></span></p>]]></paragraph>
<paragraph
    title="16.5.12.C.01."

    tags="Technical,Access Control,Passwords"


    classification="All Classifications"
    compliance="Should"
    cid="1982"
><![CDATA[<p>Agencies SHOULD establish VPN connections for all remote access connections.</p>]]></paragraph>
<paragraph
    title="16.5.12.C.02."

    tags="Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="7555"
><![CDATA[<p><span class="TextRun Highlight SCXW162426022 BCX8"><span class="NormalTextRun SCXW162426022 BCX8">Agencies</span> <span class="NormalTextRun SCXW162426022 BCX8">SHOULD use Zero Trust principles alongside the use of VPN connections to enhance the security posture of the </span><span class="NormalTextRun SCXW162426022 BCX8">organisation</span><span class="NormalTextRun SCXW162426022 BCX8">.</span><span class="NormalTextRun SCXW162426022 BCX8"> This should include removing the ability for a standard user to disable the VPN connection.</span></span></p>]]></paragraph>
</block>
</subsection>
</section>
<section title="16.6. Event Monitoring, Logging and Auditing"><subsection title="Objective"><paragraph
    title="16.6.1."


><![CDATA[<p><span class="TextRun SCXW207310985 BCX8"><span class="NormalTextRun SCXW207310985 BCX8">Information security related events are </span><span class="NormalTextRun SCXW207310985 BCX8">logged</span></span><span class="TextRun SCXW207310985 BCX8"><span class="NormalTextRun SCXW207310985 BCX8">, </span></span><span class="TextRun Highlight SCXW207310985 BCX8"><span class="NormalTextRun SCXW207310985 BCX8">monitored</span></span> <span class="TextRun SCXW207310985 BCX8"><span class="NormalTextRun SCXW207310985 BCX8">and</span><span class="NormalTextRun SCXW207310985 BCX8"> audited for accountability, incident management, forensic and system </span><span class="NormalTextRun SCXW207310985 BCX8">monitoring</span><span class="NormalTextRun SCXW207310985 BCX8"> purposes.</span></span></p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="16.6.2."


><![CDATA[<p>This section covers information on the automatic logging of information relating to network activities. &nbsp;Information regarding manual logging of system management activities can be found in <a title="Privileged user access" href="http://nzism.gcsb.govt.nz/ism-document#Section-15503">Section 16.3 - Privileged User Access</a>. &nbsp;See also <a title="Information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter7 - Information Security Incidents</a>.</p>]]></paragraph>
<paragraph
    title="16.6.3."


><![CDATA[<p>A security event is a change to normal or expected behaviour of a network, network component, system, device or user.  Event logging helps improve the security posture of a system by increasing the accountability of all user actions, thereby improving the chances that malicious behaviour will be detected.</p>]]></paragraph>
<paragraph
    title="16.6.4."


><![CDATA[<p>It is important that sufficient details are recorded in order for the logs to be useful when reviewed or when an investigation is in progress.  Retention periods are also important to ensure sufficient log history is available.  Conducting audits of event logs is an integral part of the security and maintenance of systems, since they will help detect and attribute any violations of information security policy, including cyber security incidents, breaches and intrusions.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="16.6.5."


><![CDATA[<p>Additional information relating to event logging is contained in:</p>
<table class="table-main">
<tbody>
<tr>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p class="no-uppercase"><strong><span class="TextRun SCXW152791976 BCX8"><span class="NormalTextRun SCXW152791976 BCX8">ISO/IEC 27001</span></span></strong></p>
</td>
<td style="text-align: center;">
<p><span class="TextRun SCXW113598929 BCX8"><span class="NormalTextRun SCXW113598929 BCX8">ISO</span><span class="NormalTextRun SCXW113598929 BCX8">/</span><span class="NormalTextRun SCXW113598929 BCX8">IEC</span><span class="NormalTextRun SCXW113598929 BCX8">/ </span><span class="NormalTextRun SCXW113598929 BCX8">Standards NZ</span></span><span class="EOP SCXW113598929 BCX8">&nbsp;</span></p>
</td>
<td>
<p><a class="Hyperlink SCXW253474471 BCX8" rel="noopener noreferrer" href="https://www.standards.govt.nz/shop/ISOIEC-270012022" target="_blank"><span class="TextRun Underlined SCXW253474471 BCX8"><span class="NormalTextRun SCXW253474471 BCX8">Standards New Zealand</span></span></a><span class="EOP SCXW253474471 BCX8">&nbsp;</span></p>
</td>
</tr>
<tr>
<td>
<p><strong>Standard Time for a New Zealand Network</strong></p>
</td>
<td style="text-align: center;">
<p>Measurement Standards Laboratory</p>
</td>
<td><a class="Hyperlink SCXW95605750 BCX8" rel="noopener noreferrer" href="https://www.measurement.govt.nz/about-us/official-new-zealand-time/about-time" target="_blank"><span class="TextRun Underlined SCXW95605750 BCX8"><span class="NormalTextRun SCXW95605750 BCX8">MSL NTP Server | Measurement Standards Laboratory</span></span></a><span class="EOP SCXW95605750 BCX8">&nbsp;</span></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Maintaining system management logs"><paragraph
    title="16.6.6.R.01."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>Having comprehensive information on the operations of a system can assist system administration, support information security and assist incident investigation and management.  In some cases forensic investigations will rely on the integrity, continuity and coverage of system logs.</p>]]></paragraph>
<paragraph
    title="16.6.6.R.02."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>It will be impractical and costly to store all system logs indefinitely. An agency retention policy may consider:</p><ul>
<li>Legislative and regulatory requirements;</li>
<li>Ensure adequate retention for operational support and efficiency; </li>
<li>Minimise costs and storage requirements; and</li>
<li>An adequate historical archive is maintained.</li>
</ul><p>Care should be taken to ensure that these considerations are properly balanced.<br>Some practices dictate retention periods, for example good DNSSEC practice requires log information is stored in log servers for 4 months, then archived and retained for at least 2 years.</p>]]></paragraph>
<paragraph
    title="16.6.6.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="Top Secret"
    compliance="Must"
    cid="1997"
><![CDATA[<p>Agencies MUST maintain system management logs for the life of a system.</p>]]></paragraph>
<paragraph
    title="16.6.6.C.02."

    tags="Governance,Information Security Documentation,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="1998"
><![CDATA[<p>Agencies SHOULD determine a policy for the retention of system management logs.</p>]]></paragraph>
</block>
<block title="Content of system management logs"><paragraph
    title="16.6.7.R.01."

    tags="Governance,Access Control,Key Management,Passwords,Event Logging"


><![CDATA[<p>Comprehensive system management logs will assist in logging key management activities conducted on systems.</p>]]></paragraph>
<paragraph
    title="16.6.7.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2001"
><![CDATA[<p>A system management log SHOULD record the following minimum information:</p>
<ul>
<li><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">all&nbsp;</span><span class="NormalTextRun SCXW70528927 BCX8">system start</span><span class="NormalTextRun SCXW70528927 BCX8">-</span><span class="NormalTextRun SCXW70528927 BCX8">up and </span><span class="NormalTextRun SCXW70528927 BCX8">shutdown</span><span class="NormalTextRun SCXW70528927 BCX8">;</span></span></li>
<li><span class="TextRun Highlight SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">all system </span><span class="NormalTextRun SCXW70528927 BCX8">changes</span></span><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">;</span></span></li>
<li><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">user&nbsp;</span><span class="NormalTextRun SCXW70528927 BCX8">changes;</span></span></li>
<li><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">service, application,&nbsp;</span><span class="NormalTextRun SCXW70528927 BCX8">component</span><span class="NormalTextRun SCXW70528927 BCX8"> or system </span><span class="NormalTextRun SCXW70528927 BCX8">failures;</span></span></li>
<li><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">maintenance&nbsp;</span><span class="NormalTextRun SCXW70528927 BCX8">activities;</span></span></li>
<li><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">backup and archival&nbsp;</span><span class="NormalTextRun SCXW70528927 BCX8">activities;</span></span></li>
<li><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">system recovery activities; and</span></span></li>
<li><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">special or out of hours activities.</span></span><span class="LineBreakBlob BlobObject DragDrop SCXW70528927 BCX8"><span class="SCXW70528927 BCX8">&nbsp;</span><br class="SCXW70528927 BCX8"></span></li>
</ul>]]></paragraph>
</block>
<block title="Logging requirements"><paragraph
    title="16.6.8.R.01."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p><span class="TextRun SCXW41788053 BCX8"><span class="NormalTextRun SCXW41788053 BCX8">Event logging</span> </span><span class="TextRun Highlight SCXW41788053 BCX8"><span class="NormalTextRun SCXW41788053 BCX8">and monitoring</span></span><span class="TextRun SCXW41788053 BCX8"><span class="NormalTextRun SCXW41788053 BCX8"> can help raise the security posture of a system by increasing the accountability for all system user actions.</span></span></p>]]></paragraph>
<paragraph
    title="16.6.8.R.02."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p><span class="TextRun SCXW148229708 BCX8"><span class="NormalTextRun SCXW148229708 BCX8">Event logging</span> </span><span class="TextRun Highlight SCXW148229708 BCX8"><span class="NormalTextRun SCXW148229708 BCX8">and monitoring</span></span><span class="TextRun SCXW148229708 BCX8"><span class="NormalTextRun SCXW148229708 BCX8"> can increase the chances that malicious behaviour will be detected by logging the actions of a malicious party.</span></span></p>]]></paragraph>
<paragraph
    title="16.6.8.R.03."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>Well configured event logging allows for easier and more effective auditing and forensic examination if an information security incident occurs.</p>]]></paragraph>
<paragraph
    title="16.6.8.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="2006"
><![CDATA[<p>Agencies MUST develop and document logging requirements covering:</p><ul>
<li>the logging facility, including:
<ul>
<li>log server availability requirements; and</li>
<li>the reliable delivery of log information to the log server;</li>
</ul>
</li>
<li>the list of events associated with a system or software component to be logged; and</li>
<li>event log protection and archival requirements.</li>
</ul>]]></paragraph>
</block>
<block title="Events to be logged"><paragraph
    title="16.6.9.R.01."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>The events to be logged are key elements in the monitoring of the security posture of systems and contributing to reviews, audits, investigations and incident management.</p>]]></paragraph>
<paragraph
    title="16.6.9.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2009"
><![CDATA[<div class="SCXW11263710 BCX8">
<div class="OutlineElement Ltr SCXW11263710 BCX8">
<p class="Paragraph SCXW11263710 BCX8"><span class="TextRun SCXW11263710 BCX8"><span class="NormalTextRun SCXW11263710 BCX8">Agencies</span> <span class="NormalTextRun SCXW11263710 BCX8">MUST</span><span class="NormalTextRun SCXW11263710 BCX8"> log, at minimum, the following events for all software components:</span></span><span class="EOP SCXW11263710 BCX8">&nbsp;</span></p>
</div>
<div class="ListContainerWrapper SCXW11263710 BCX8">
<ul>
<li><span class="TextRun Highlight SCXW11263710 BCX8"><span class="NormalTextRun SCXW11263710 BCX8">a</span><span class="NormalTextRun SCXW11263710 BCX8">ny login activity or </span><span class="NormalTextRun SCXW11263710 BCX8">attempts</span></span><span class="TextRun SCXW11263710 BCX8"><span class="NormalTextRun SCXW11263710 BCX8">;</span></span><span class="EOP SCXW11263710 BCX8">&nbsp;</span></li>
<li><span class="TextRun SCXW11263710 BCX8"><span class="NormalTextRun SCXW11263710 BCX8">date and&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">time;</span></span></li>
<li><span class="NormalTextRun SCXW11263710 BCX8">all privileged&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">operations</span><span class="NormalTextRun SCXW11263710 BCX8">;</span></li>
<li><span class="NormalTextRun SCXW11263710 BCX8">failed attempts to elevate&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">privileges;</span></li>
<li><span class="NormalTextRun SCXW11263710 BCX8">security related system alerts and&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">failures;</span></li>
<li><span class="NormalTextRun SCXW11263710 BCX8">software upgrades and/or software&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">patching</span><span class="NormalTextRun SCXW11263710 BCX8">;</span></li>
<li><span class="NormalTextRun SCXW11263710 BCX8">system recovery&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">activities;</span></li>
<li><span class="NormalTextRun SCXW11263710 BCX8">system user and group additions,&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">deletions</span><span class="NormalTextRun SCXW11263710 BCX8"> and modification to permissions; and</span><span class="EOP SCXW11263710 BCX8">&nbsp;</span></li>
<li><span class="NormalTextRun SCXW11263710 BCX8">unauthorised or failed access attempts to systems and files identified as critical to the&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">organisation</span><span class="NormalTextRun SCXW11263710 BCX8">.</span></li>
</ul>
</div>
</div>]]></paragraph>
</block>
<block title="Additional events to be logged"><paragraph
    title="16.6.10.R.01."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>The additional events to be logged can be useful for reviewing, auditing or investigating software components of systems.</p>]]></paragraph>
<paragraph
    title="16.6.10.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2012"
><![CDATA[<p>Agencies SHOULD log the events listed in the table below for specific software components.</p><table class="table-control">
<tbody>
<tr>
<td>Software component</td>
<td>Events to log</td>
</tr>
<tr>
<td>Database</td>
<td>
<p>System user access to the database.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Attempted access that is denied.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Changes to system user roles or database rights.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Addition of new system users, especially privileged users.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Modifications to the data.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Modifications to the format or structure of the database.</p>
</td>
</tr>
<tr>
<td>Network/operating system</td>
<td>
<p>Successful and failed attempts to logon and logoff.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Changes to system administrator and system user accounts.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Failed attempts to access data and system resources.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Attempts to use special privileges.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Use of special privileges.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>System user or group management.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Changes to the security policy.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Service failures and restarts.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>System startup and shutdown.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Changes to system configuration data.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Access to sensitive data and processes.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Data import/export operations.</td>
</tr>
<tr>
<td>
<p>Web application</p>
</td>
<td>
<p>System user access to the Web application.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Attempted access that is denied.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>System user access to the Web documents.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Search engine queries initiated by system users.</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="16.6.10.C.02."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2013"
><![CDATA[<div class="OutlineElement Ltr SCXW80200118 BCX8">
<p class="Paragraph SCXW80200118 BCX8"><span class="TextRun SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">Agencies</span> <span class="NormalTextRun SCXW80200118 BCX8">SHOULD </span><span class="NormalTextRun SCXW80200118 BCX8">log, at minimum, the following events for all software components:</span></span><span class="EOP SCXW80200118 BCX8">&nbsp;</span></p>
</div>
<div class="ListContainerWrapper SCXW80200118 BCX8">
<ul>
<li class="Paragraph SCXW80200118 BCX8"><span class="TextRun Highlight SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">Any login activity or </span><span class="NormalTextRun SCXW80200118 BCX8">attempts</span></span><span class="TextRun SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">;</span></span><span class="EOP SCXW80200118 BCX8">&nbsp;</span><span class="TextRun SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">all privileged </span><span class="NormalTextRun SCXW80200118 BCX8">operations</span><span class="NormalTextRun SCXW80200118 BCX8">;</span></span></li>
<li class="Paragraph SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">failed attempts to elevate&nbsp;</span><span class="NormalTextRun SCXW80200118 BCX8">privileges</span><span class="NormalTextRun SCXW80200118 BCX8">;</span><span class="EOP SCXW80200118 BCX8">&nbsp;</span></li>
<li class="Paragraph SCXW80200118 BCX8"><span class="TextRun SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">security related system alerts and&nbsp;</span><span class="NormalTextRun SCXW80200118 BCX8">failures</span><span class="NormalTextRun SCXW80200118 BCX8">;</span></span><span class="EOP SCXW80200118 BCX8">&nbsp;</span></li>
<li class="Paragraph SCXW80200118 BCX8"><span class="TextRun Highlight SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">all software</span><span class="NormalTextRun SCXW80200118 BCX8"> updates and/or patching;</span></span></li>
<li class="Paragraph SCXW80200118 BCX8"><span class="TextRun SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">system user and group additions,&nbsp;</span><span class="NormalTextRun SCXW80200118 BCX8">deletions</span><span class="NormalTextRun SCXW80200118 BCX8"> and modification to permissions; and</span></span><span class="EOP SCXW80200118 BCX8">&nbsp;</span></li>
<li class="Paragraph SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">unauthorised&nbsp;</span><span class="NormalTextRun SCXW80200118 BCX8">or failed </span><span class="NormalTextRun SCXW80200118 BCX8">access attempts to systems and files identified as critical to the </span><span class="NormalTextRun SCXW80200118 BCX8">organisation</span><span class="NormalTextRun SCXW80200118 BCX8">.</span></li>
</ul>
</div>]]></paragraph>
</block>
<block title="Event log facility"><paragraph
    title="16.6.11.R.01."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>The act of logging events is not enough in itself.  For each event logged, sufficient detail needs to be recorded in order for the logs to be useful when reviewed.  An authoritative external time source, a local <strong>Time Source Master Clock or server or</strong> Co-ordinated Universal Time (UTC) is essential for the time-stamping of events and later inspection or forensic examination.  The NZ Interoperability Framework (e-GIF) recognises the time standard for New Zealand as UTC (MSL), with Network Time Protocol (NTP) v.4 as the delivery method over the Internet.</p>]]></paragraph>
<paragraph
    title="16.6.11.R.02."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>New Zealand standard time is maintained by the Measurement Standards Laboratory of New Zealand (MSL), a part of Industrial Research Limited (IRL).  New Zealand standard time is based on UTC, a worldwide open standard used by all modern computer operating systems.  UTC (MSL) is kept within 200 nanoseconds of the international atomic time scale maintained by the Bureau International des Poids et Mesures (BIPM) in Paris.</p>]]></paragraph>
<paragraph
    title="16.6.11.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="2017"
><![CDATA[<p>For each event identified as needing to be logged, agencies MUST ensure that the log facility records at least the following details, where applicable:</p><ul>
<li>date and time of the event;</li>
<li>relevant system user(s) or processes;</li>
<li>event description;</li>
<li>success or failure of the event;</li>
<li>event source (e.g. application name); and</li>
<li>IT equipment location/identification.</li>
</ul>]]></paragraph>
<paragraph
    title="16.6.11.C.02."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2018"
><![CDATA[<p>Agencies SHOULD establish an authoritative time source.</p>]]></paragraph>
<paragraph
    title="16.6.11.C.03."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2019"
><![CDATA[<p>Agencies SHOULD synchronise all logging and audit trails with the time source to allow accurate time stamping of events.</p>]]></paragraph>
</block>
<block title="Event log protection"><paragraph
    title="16.6.12.R.01."

    tags="Technical,Access Control,Passwords,Event Logging"


><![CDATA[<p>Effective log protection and storage (possibly involving the use of a dedicated event logging server) will help ensure the integrity and availability of the collected logs when they are audited.</p>]]></paragraph>
<paragraph
    title="16.6.12.C.01."

    tags="Technical,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="2022"
><![CDATA[<div class="OutlineElement Ltr SCXW123026381 BCX8">
<p class="Paragraph SCXW123026381 BCX8"><span class="TextRun SCXW123026381 BCX8"><span class="NormalTextRun SCXW123026381 BCX8">Event logs </span><span class="NormalTextRun SCXW123026381 BCX8">MUST</span><span class="NormalTextRun SCXW123026381 BCX8"> be protected from:</span></span><span class="EOP SCXW123026381 BCX8">&nbsp;</span></p>
</div>
<div class="ListContainerWrapper SCXW123026381 BCX8">
<ul>
<li class="Paragraph SCXW123026381 BCX8"><span class="TextRun SCXW123026381 BCX8"><span class="NormalTextRun SCXW123026381 BCX8">m</span><span class="NormalTextRun SCXW123026381 BCX8">odification</span><span class="NormalTextRun SCXW123026381 BCX8">;</span></span></li>
<li class="Paragraph SCXW123026381 BCX8"><span class="TextRun SCXW123026381 BCX8"><span class="NormalTextRun SCXW123026381 BCX8">unauthorised access</span><span class="NormalTextRun SCXW123026381 BCX8">;</span><span class="NormalTextRun SCXW123026381 BCX8"> and</span></span></li>
<li class="Paragraph SCXW123026381 BCX8"><span class="TextRun SCXW123026381 BCX8"><span class="NormalTextRun SCXW123026381 BCX8">whole or partial loss within the defined retention period.</span></span><span class="EOP SCXW123026381 BCX8">&nbsp;</span></li>
</ul>
</div>]]></paragraph>
<paragraph
    title="16.6.12.C.02."

    tags="Technical,Access Control,Passwords,Event Logging"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2023"
><![CDATA[<p>Agencies MUST configure systems to save event logs to separate secure servers as soon as possible after each event occurs.</p>]]></paragraph>
<paragraph
    title="16.6.12.C.03."

    tags="Technical,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2024"
><![CDATA[<p>Agencies SHOULD ensure that:</p><ul>
<li>systems are configured to save event logs to a separate secure log server; and</li>
<li>event log data is archived in a manner that maintains its integrity.</li>
</ul>]]></paragraph>
</block>
<block title="Event log archives"><paragraph
    title="16.6.13.R.01."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>It is important that agencies determine the appropriate length of time to retain DNS, proxy, event systems and other operational logs.  Logs are an important information source in reviews, audits and investigations ideally these should be retained for the life of the system or longer. </p>]]></paragraph>
<paragraph
    title="16.6.13.R.02."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>The Archives, Culture, and Heritage Reform Act 2000, the Public Records Act 2005 and the Official Information Act 1982  may determine or influence the length of time that logs need to be retained and if they should be archived.</p>]]></paragraph>
<paragraph
    title="16.6.13.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="2028"
><![CDATA[<p>Event logs MUST be archived and retained for an appropriate period as determined by the agency.</p>]]></paragraph>
<paragraph
    title="16.6.13.C.02."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="2029"
><![CDATA[<p>Disposal or archiving of DNS, proxy, event, systems and other operational logs MUST be in accordance with the provisions of the relevant legislation.</p>]]></paragraph>
<paragraph
    title="16.6.13.C.03."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2030"
><![CDATA[<p>Agencies SHOULD seek advice and determine if their logs are subject to legislation.</p>]]></paragraph>
<paragraph
    title="16.6.13.C.04."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2031"
><![CDATA[<p><span class="TextRun SCXW245589667 BCX8"><span class="NormalTextRun SCXW245589667 BCX8">Agencies</span><span class="NormalTextRun SCXW245589667 BCX8"> SHOULD </span><span class="NormalTextRun SCXW245589667 BCX8">retain</span><span class="NormalTextRun SCXW245589667 BCX8"> DNS, </span><span class="NormalTextRun SCXW245589667 BCX8">proxy</span><span class="NormalTextRun SCXW245589667 BCX8"> and event logs for a</span><span class="NormalTextRun SCXW245589667 BCX8"> minimum of</span></span><span class="TextRun Highlight SCXW245589667 BCX8"><span class="NormalTextRun SCXW245589667 BCX8"> 1</span><span class="NormalTextRun SCXW245589667 BCX8">2</span><span class="NormalTextRun SCXW245589667 BCX8"> months</span></span><span class="TextRun SCXW245589667 BCX8"><span class="NormalTextRun SCXW245589667 BCX8">.</span></span></p>]]></paragraph>
<paragraph
    title="16.6.13.C.05."

    tags="Technical,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="7557"
><![CDATA[<p><span class="TextRun Highlight SCXW250297705 BCX8"><span class="NormalTextRun SCXW250297705 BCX8">Agencies</span><span class="NormalTextRun SCXW250297705 BCX8"> should prioritise their log retention </span><span class="NormalTextRun SCXW250297705 BCX8">requirements based on the risks surrounding their most sensitive systems</span><span class="NormalTextRun SCXW250297705 BCX8">.</span></span></p>]]></paragraph>
</block>
<block title="Event log auditing"><paragraph
    title="16.6.14.R.01."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>Conducting audits of event logs is seen as an integral part of the maintenance of systems, as they will assist in the detection and attribution of any violations of agency security policy, including information security incidents, breaches and intrusions.</p>]]></paragraph>
<paragraph
    title="16.6.14.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="2034"
><![CDATA[<p>Agencies MUST develop and document event log audit requirements covering:</p><ul>
<li>the scope of audits;</li>
<li>the audit schedule;</li>
<li>action to be taken when violations are detected;</li>
<li>reporting requirements; and</li>
<li>roles and specific responsibilities.</li>
</ul>]]></paragraph>
</block>
<block title="Event log monitoring"><paragraph
    title="16.6.15.R.01."


><![CDATA[<div class="OutlineElement Ltr SCXW90464468 BCX8">
<p class="Paragraph SCXW90464468 BCX8"><span class="TextRun Highlight SCXW90464468 BCX8"><span class="NormalTextRun SCXW90464468 BCX8">Event log monitoring is </span><span class="NormalTextRun AdvancedProofingIssueV2Themed SCXW90464468 BCX8">similar to</span> <span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW90464468 BCX8">auditing,</span><span class="NormalTextRun SCXW90464468 BCX8"> however monitoring is conducted in near-real time. This provides early detection of any incidents and potential authentication violations and incidents.&nbsp;</span></span><span class="EOP SCXW90464468 BCX8">&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW90464468 BCX8">
<p class="Paragraph SCXW90464468 BCX8"><span class="TextRun Highlight SCXW90464468 BCX8"><span class="NormalTextRun SCXW90464468 BCX8">Early identification of anomalies can protect the security posture of a system.</span></span></p>
</div>]]></paragraph>
<paragraph
    title="16.6.15.R.02."


><![CDATA[<p><span class="TextRun Highlight SCXW224985548 BCX8"><span class="NormalTextRun SCXW224985548 BCX8">Monitoring of event logs is essential to understand what system ‘normal’ look like to be able to detect future authentication violations and anomalies.</span></span></p>]]></paragraph>
<paragraph
    title="16.6.15.C.01."

    tags="Technical,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="7560"
><![CDATA[<p><span class="TextRun Highlight SCXW245238288 BCX8"><span class="NormalTextRun SCXW245238288 BCX8">Agencies</span><span class="NormalTextRun SCXW245238288 BCX8"> SHOULD have a monitoring solution implemented that enables detection of incidents as they occur so that </span><span class="NormalTextRun SCXW245238288 BCX8">appropriate responses</span><span class="NormalTextRun SCXW245238288 BCX8"> can be taken in adequate </span><span class="NormalTextRun SCXW245238288 BCX8">timeframes</span><span class="NormalTextRun SCXW245238288 BCX8">.</span></span></p>]]></paragraph>
<paragraph
    title="16.6.15.C.02."

    tags="Technical,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="7561"
><![CDATA[<p><span class="TextRun Highlight SCXW216480023 BCX8"><span class="NormalTextRun SCXW216480023 BCX8">Agencies</span><span class="NormalTextRun SCXW216480023 BCX8"> SHOULD have systems available for processing system event logs to </span><span class="NormalTextRun SCXW216480023 BCX8">identify</span><span class="NormalTextRun SCXW216480023 BCX8"> and correlate events which </span><span class="NormalTextRun SCXW216480023 BCX8">indicate</span><span class="NormalTextRun SCXW216480023 BCX8"> behavioural anomalies or potential security compromise in the systems, in a near real-time manner.</span></span></p>]]></paragraph>
</block>
</subsection>
</section>
<section title="16.7. Multi-Factor Authentication"><subsection title="Objective"><paragraph
    title="16.7.1."


><![CDATA[<p>Multi-Factor Authentication (MFA) mechanisms are adequately implemented to enhance and maintain security.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="16.7.2."


><![CDATA[<p>This section provides information and guidance on the establishment and operation of MFA.&nbsp; It is a critical component of Identity and Access Management (IAM).</p>]]></paragraph>
<paragraph
    title="16.7.3."


><![CDATA[<p class="NormS16C7">Reference to other chapters and sections in this document is essential.&nbsp; In particular:</p>
<ul>
<li><a title="Information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information Security Incidents</a>;</li>
<li><a title="Information security awareness and training" href="http://nzism.gcsb.govt.nz/ism-document#Section-13361">Section 9.1 – Information Security Awareness and Training</a>;</li>
<li><a title="Identification, authentication and authorisation" href="http://nzism.gcsb.govt.nz/ism-document#Section-15349">Section 16.1 – Identification, Authentication and Authorisation;</a></li>
<li><a title="System access" href="http://nzism.gcsb.govt.nz/ism-document#Section-15483">Section 16.2 – System Access</a>;</li>
<li><a title="Privileged user access" href="http://nzism.gcsb.govt.nz/ism-document#Section-15503">Section 16.3 – Privileged User Access</a>;</li>
<li><a title="Privileged access management" href="http://nzism.gcsb.govt.nz/ism-document#Section-15526">Section 16.4 – Privileged Access Management</a>; and</li>
<li><a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 - Cryptography</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="16.7.4."


><![CDATA[<p><!-- [if !supportLists]-->Authentication is a key element of security that provides confirmation of a returning user to a system when making a transaction.&nbsp; In this context a transaction may include browsing, financial operations, and all types of data access, creation, copying and deletion.</p>]]></paragraph>
<paragraph
    title="16.7.5."


><![CDATA[<p>MFA is a security system that verifies a returning user by requiring multiple credentials, which are typically in the form of another factor or type.&nbsp; Initial authentication often requires a username and password followed by a requirement for other (additional) credentials.&nbsp; MFA can enable, for example, valid users’ access to permit credential reset, even if they are using a username and password that may have been compromised.</p>]]></paragraph>
<paragraph
    title="16.7.6."


><![CDATA[<p>Through adequate implementation, MFA can be a strong defence and deterrent against many credential attacks, including brute-force, credential stuffing, and password spraying attacks.&nbsp; It is also an additional defence against many social engineering attacks seeking user credentials.</p>]]></paragraph>
<paragraph
    title="16.7.7."


><![CDATA[<p>MFA requires two or more authentication factors (from a single entity) before authorising system access.&nbsp; MFA requires two elements from any of the three categories of authentication and with the second factor from a different group to the first factor selected.&nbsp;</p>
<p>These factors or groups are:</p>
<ol>
<li><strong>The possession/ownership factor</strong> - Something you have, preferably NOT the device itself but a SEPARATE authentication device such as a token, RFID card or smartcard;</li>
<li><strong>The knowledge factor</strong> - Something you know such as a passcode, One-Time password (OTP), reusable password, pattern or other component of a standard authentication mechanism;</li>
<li><strong>The inherence factor</strong> - Something you are, biological or behavioural characteristics of various types.</li>
</ol>]]></paragraph>
<paragraph
    title="16.7.8."


><![CDATA[<p>Using MFA increases attack resistance by increasing the difficulty of obtaining all necessary authenticators. It is important to note, however, that the strength of an MFA solution is contingent on how robust any of the authentication factors are.</p>]]></paragraph>
<paragraph
    title="16.7.9."


><![CDATA[<p>&nbsp;<!--[endif]-->It is important to use a variety of factors to strengthen attack resistance in order to increase confidence levels in the chosen authentication system.&nbsp; For example, using two factors from the knowledge group is not considered 2FA and is less effective than using factors from two different groups.&nbsp; The knowledge group is the most exposed to attack and compromise through social engineering.</p>]]></paragraph>
<paragraph
    title="16.7.10."


><![CDATA[<p>Additional authentication also assists in managing Privileged Access (refer to Section 16.4 – Privileged Access Management).</p>]]></paragraph>
</block>
<block title="Phishing resistant MFA"><paragraph
    title="16.7.11."


><![CDATA[<p>Although the use of MFA provides improved levels of security than the traditional single-factor authentication, it is imperative to recognise that not all methods provide adequate protection against all attacks.</p>]]></paragraph>
<paragraph
    title="16.7.12."


><![CDATA[<p>The majority of credential stealing is obtained through phishing attacks and adversary in the middle attacks (AiTM). Some traditional MFA is vulnerable to interception or AiTM attacks, where an access token is stolen that contains the MFA claim and can be replayed by the attacker. These types of traditional MFA do not provide the adequate security to mitigate against many advanced phishing attacks.</p>]]></paragraph>
<paragraph
    title="16.7.13."


><![CDATA[<p>Phishing resistant MFA are types of authentication methods that are designed to mitigate these phishing attacks found in some traditional MFA approaches.</p>]]></paragraph>
<paragraph
    title="16.7.14."


><![CDATA[<p>Phishing resistant MFA are methods where attackers cannot replay the stolen access token or manipulate the authentication process. This includes mitigating against social engineering attacks, phishing attacks, and AiTM attacks.</p>]]></paragraph>
<paragraph
    title="16.7.15."


><![CDATA[<p>Phishing resistant MFA relies on cryptographic keys which eliminate the risk of interception and phishing attacks. Methods include:</p>
<ol>
<li>FIDO2/WebAuthn.</li>
<li>Smartcards.</li>
<li>PKI-Based Authentication.</li>
</ol>]]></paragraph>
<paragraph
    title="16.7.16."


><![CDATA[<p>Due to the reliance on cryptographic keys, this typically can involve additional infrastructure and can add additional time and cost to implement across organisations.</p>]]></paragraph>
<paragraph
    title="16.7.17."


><![CDATA[<p>Agencies need to understand what systems and data needs to be protected. Not all entities or transactions may need to implement phishing resistant MFA, however it is essential to consider implementing phishing resistant MFA to sensitive information, where entities have elevated privileges within organisations, and consider adding phishing resistant MFA to PAM policies.</p>]]></paragraph>
<paragraph
    title="16.7.18."


><![CDATA[<p><strong>Traditional MFA with known vulnerabilities</strong></p>
<p>Some methods of MFA are known to be susceptible to phishing threats. Methods, such as SMS based one-time passwords (OTP), email and application-based OTPs have well documented vulnerabilities that can be exploited, particularly through phishing and AiTM attacks.</p>]]></paragraph>
<paragraph
    title="16.7.19."


><![CDATA[<p>SMS have several known vulnerabilities which may make it unsuitable and unsafe for authentication purposes; these include:</p>
<ol>
<li>SIM swapping attacks.</li>
<li>AiTM attacks.</li>
</ol>]]></paragraph>
<paragraph
    title="16.7.20."


><![CDATA[<p><!-- [if !supportLists]--><strong>Email</strong> based OTPs are vulnerable to email account compromises. If an attacker gains access to email accounts they can intercept OTPs via email.</p>]]></paragraph>
</block>
<block title="Adaptive Authentication"><paragraph
    title="16.7.21."


><![CDATA[<p><strong>Adaptive Authentication</strong> is a form of MFA which varies the level or degree of authentication required where an unusual authentication request occurs.&nbsp; For example, out of normal hours, from an unusual geolocation, from an unrecognised device, from an unrecognised IP address and so on.&nbsp; When an unusual authentication request is received, Adaptive Authentication may request additional authenticators such as an MFA token.&nbsp; Some <strong>risk factors</strong> that may trigger Adaptive Authentication include:</p>
<ul>
<li>The location of the access request such as such as a café, airport or home;</li>
<li>The time of the access request such as like late at night, over weekends or during normal working hours;</li>
<li>The type of device, such as a smartphone, tablet, laptop, or unrecognised device;&nbsp;</li>
<li>The type of connection, for example, a public network such as the internet, or a VPN or some other private network; and</li>
<li>A request for access to privileged accounts.</li>
</ul>
<p>&nbsp;</p>]]></paragraph>
<paragraph
    title="16.7.22."


><![CDATA[<p>Adaptive Authentication includes what is sometimes described as transaction identification where known characteristics are compared to the transaction or access request, for example, a known location or common access request.&nbsp; If known characteristics do not match then additional authentication steps may be indicated or required.</p>]]></paragraph>
</block>
<block title="Client-Side Authentication"><paragraph
    title="16.7.23."


><![CDATA[<p>Client-side authentication originates from the user’s device such as laptop, mobile phone, tablet, or home computer.&nbsp; These devices may provide a variety of authentication methods including:</p>
<ul>
<li>Inherence factor/Biometric:</li>
<li style="list-style-type: none;">
<ul>
<li>Fingerprint scans;</li>
<li>Facial recognition;</li>
<li>Voice command/recognition;</li>
<li>Iris scans;</li>
<li>Keystroke dynamics;<br><br></li>
</ul>
</li>
<li>Knowledge factor:
<ul>
<li>PIN codes;</li>
<li>Pattern codes;<br><br></li>
</ul>
</li>
<li>Possession factor:
<ul>
<li>Geofencing;</li>
<li>Bluetooth device proximity/Near field communication (NFC).</li>
</ul>
</li>
</ul>]]></paragraph>
<paragraph
    title="16.7.24."


><![CDATA[<p>It is important to note that some biometric and other measures, for example fingerprints, are susceptible to attacks such as spoofing.&nbsp; To combat these biometric attacks secondary measures are also required, for example pulse-sensing in addition to fingerprint detection in order to ensure the fingerprint presentation is a live person.&nbsp; Clearly not all secondary measures are fully effective by themselves and multiple secondary measures may be required for high risk/high value authorisation requests. FIPS-140 provides guidance to organisations to confirm which hardware meets secure standards.&nbsp;</p>]]></paragraph>
</block>
<block title="Single-User and Multi-User Authorisation"><paragraph
    title="16.7.25."


><![CDATA[<p><strong>Single-User authorisation</strong> involves prompting the account holder to authorise an action being taken on his behalf.&nbsp; For example, single-user authorisation can even prevent fraud as it occurs in a user-friendly manner.&nbsp; Instead of calling the customer to verify the legitimacy of a purchase, credit card companies could request customer authentication for an on-line purchase by sending an authorisation request to the customer through an alternate channel such as a mobile phone.</p>]]></paragraph>
<paragraph
    title="16.7.26."


><![CDATA[<p><strong>Multi-User authorisation</strong> usually requires multiple and separate authentications (usually by other people) in order to authorise a transaction or event, such as establishing an account.&nbsp; This system supports the “separation of duties” concept common in accounting transactions or other high-risk activities.&nbsp; Multi-user authorisation may also assess risk indicators and context (e.g. time, location) to select the authentication components and requirements.</p>]]></paragraph>
</block>
<block title="Multi-Step Authentication"><paragraph
    title="16.7.27."


><![CDATA[<p><strong>Multi-step Authentication</strong> is a design and architectural approach to control access to resources by sequentially using multiple authentication verifiers.&nbsp; Each authentication step grants access to increasingly privileged areas of the system until access to the desired resources is reached (refer also to 16.4 – Privileged Access Management).&nbsp; Multi-Step Authentication can be activated by risk-based “triggers” where risk factors are identified.</p>]]></paragraph>
<paragraph
    title="16.7.28."


><![CDATA[<p><strong>Multi-step Authentication</strong> may require only one authentication factor or mechanism, so it is important not to confuse Multi-Step Authentication with Multi-Factor Authentication.&nbsp; Multi-Step Authentication may not be as secure as MFA and cannot be an appropriate substitute for MFA.&nbsp; A key risk is repeated use of a single authentication factor.</p>]]></paragraph>
<paragraph
    title="16.7.29."


><![CDATA[<p>It is also worth noting, however, that Multi-Step combined with Multi-Factor Authentication is a strong architectural security construct, particularly when a multi-factor request is triggered for accessing a privileged account.</p>]]></paragraph>
</block>
<block title="Perfect Forward Secrecy"><paragraph
    title="16.7.30."


><![CDATA[<p>In addition to the encryption protocols and algorithms discussed in Chapter 17 - Cryptography, the concept of <strong>Perfect Forward Secrecy (PFS)</strong>, often simplified to Forward Secrecy, should also be incorporated into any authentication mechanism design.</p>]]></paragraph>
<paragraph
    title="16.7.31."


><![CDATA[<p><strong>Forward Secrecy</strong> is a property of secure communication protocols that is intended to prevent a compromised encryption key from being used to decrypt previously encrypted traffic.&nbsp; Clearly a compromised key must be immediately replaced in order to maintain the integrity of communications.&nbsp; This mechanism is described as a <strong>“rolling secrets”</strong> technique and is designed to prevent device spoofing and the cloning of mobile clients.</p>]]></paragraph>
<paragraph
    title="16.7.32."


><![CDATA[<p>A <strong>“rolling secret”</strong> key is located on the client device.&nbsp; The client receives two encrypted packages.&nbsp; The first contains another private key and is decrypted by the current private key held on the client device.&nbsp; The new key is used to decrypt the second package and the new private key replaces the existing private key, which is then discarded.&nbsp; The new key is used to encrypt traffic to the authentication server.&nbsp; With each cycle the client replaces the old key with the new key.</p>]]></paragraph>
</block>
<block title="Cryptography"><paragraph
    title="16.7.33."


><![CDATA[<p>The use of encryption is a fundamental component in the security of a Multi-Factor Authentication mechanism.&nbsp; It is essential that only approved cryptographic protocols and algorithms are used,&nbsp;refer to <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a>.</p>]]></paragraph>
</block>
<block title="Risk Analysis"><paragraph
    title="16.7.34."


><![CDATA[<p>The design of Multi-Factor Authentication should start with a risk review in order to identify any existing and new risks from changing environments, user populations and threat landscapes.&nbsp; Some early steps will include:</p>
<ul>
<li>Review business drivers, existing identity infrastructure, enterprise applications, core platform infrastructure and development plans for each of these;</li>
<li>Ensure any plans for cloud and related services are reviewed and incorporated;</li>
<li>Identify authentication use cases including employees and contractors, consumers, customers, partners, and suppliers.&nbsp; For Digital Government this may also include the General Public for some systems;</li>
<li>Develop baseline requirements;</li>
<li>Undertake a threat analysis for each use case; and</li>
</ul>
<p class="NormS16C7">Select control mechanisms to manage identified risks.</p>]]></paragraph>
<paragraph
    title="16.7.35."


><![CDATA[<p>This risk analysis will inform and direct the development of an authentication architecture to provide robust but usable security for each use case.&nbsp; Some key questions include:</p>
<ul>
<li>How will users access the system or application?</li>
<li>At what stages will users be authenticated?</li>
<li>What authentication factors will provide the appropriate level of authentication and security?</li>
<li>Is the level of authentication appropriate to secure and protect the systems, data and other related assets? and</li>
<li>Is there sufficient capacity to service anticipated workloads?</li>
</ul>]]></paragraph>
<paragraph
    title="16.7.36."


><![CDATA[<p>MFA is an additional way of managing access to systems and data. MFA will only provide additional layers of managing access to systems provided the fundamentals of Identification and Access Management are met. This includes:</p>
<ul>
<li>Implementation of least privileged principles.</li>
<li>Access is removed when not required.&nbsp;</li>
<li>Administration privileges are limited to only users who require these privileges.</li>
<li>Enforcing strong passwords through password policies (when passwords are in use).</li>
</ul>]]></paragraph>
</block>
<block title="Governance and Control"><paragraph
    title="16.7.37."


><![CDATA[<p>Good governance processes assist in identifying potential risks to your systems, data, employees, partners and contractors. This reduces the risk of a breach or failure to comply with legislation and regulation.&nbsp; Good governance processes support the fulfilment of duties of senior and executive management.</p>]]></paragraph>
<paragraph
    title="16.7.38."


><![CDATA[<p>Technology governance must demonstrate effective control, security, effectiveness and clear accountability.&nbsp; Identity Access Management and Authentication are fundamental components in protecting agency systems, data and technology assets and underpinning technology governance structures.&nbsp;</p>
<p>&nbsp;</p>]]></paragraph>
<paragraph
    title="16.7.39."


><![CDATA[<p>There are also several national and international legislative and regulatory requirements and accepted international standards which may influence aspects of governance, particularly in relation to data protection and privacy.&nbsp; While not an exhaustive list, these include:</p>
<ul>
<li><!-- [if !supportLists]--><span>New Zealand’s Privacy Act;</span></li>
<li><!-- [if !supportLists]--><span>New Zealand’s Public Records Act;</span></li>
<li><!-- [if !supportLists]--><span style="mso-fareast-language: EN-US;">The EU’s General Data Protection Regulation (GDPR);</span></li>
<li><!-- [if !supportLists]--><span style="color: black; mso-color-alt: windowtext; background: white;">ISO/IEC 27701</span></li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="16.7.40."


><![CDATA[<p class="NormS16C7">Additional information relating to event logging is contained in:</p>
<table class="table-main" style="width: 100%; height: 411.2px;">
<tbody>
<tr style="height: 18.4px;">
<td style="width: 33.0327%; height: 18.4px;"><strong>Title</strong></td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 18.4px;"><strong>Publisher</strong></td>
<td style="width: 51.4604%; height: 18.4px;"><strong>Source</strong></td>
</tr>
<tr style="height: 84.8px;">
<td style="width: 33.0327%; height: 84.8px;">
<p class="no-uppercase"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Identification Standards</span></strong></p>
</td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 84.8px;">
<p><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">NZ Govt</span></p>
<p>&nbsp;</p>
</td>
<td style="width: 51.4604%; height: 84.8px;">
<p><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/identity/identification-management/identification-management-standards/" target="_blank">Identification Management Standards | NZ Digital government</a></span></p>
</td>
</tr>
<tr style="height: 50.4px;">
<td style="width: 33.0327%; height: 50.4px;">
<p><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO/IEC 27001</span></strong></p>
</td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 50.4px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO/IEC/ Standards NZ</span></td>
<td style="width: 51.4604%; height: 50.4px;"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><a rel="noopener noreferrer" href="https://www.iso.org" target="_blank"></a><a rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">ISO - International Organization for Standardization</a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.0327%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">NIST Digital Identity Guidelines</span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 36.8px;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">NIST</span></td>
<td style="width: 51.4604%; height: 36.8px;"><span style="color: white; mso-themecolor: background1;"><a rel="noopener noreferrer" href="https://www.nist.gov/identity-access-management/nist-special-publication-800-63-digital-identity-guidelines" target="_blank">NIST Special Publication 800-63 Digital Identity Guidelines | NIST</a></span></td>
</tr>
<tr style="height: 18.4px;">
<td style="width: 33.0327%; height: 18.4px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">OAuth 2.0</span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 18.4px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">IETF OAuth Working Group</span></td>
<td style="width: 51.4604%; height: 18.4px;"><span style="color: black; mso-color-alt: windowtext;"><a rel="noopener noreferrer" href="https://oauth.net/2/" target="_blank">OAuth 2.0 — OAuth</a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.0327%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Cloud security guidance -<span style="color: black; mso-color-alt: windowtext; background: white;"> </span>Identity and authentication</span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 36.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">NCSC UK</span></td>
<td style="width: 51.4604%; height: 36.8px;"><span><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/collection/cloud/the-cloud-security-principles/principle-10-identity-and-authentication" target="_blank">Principle 10: Identity and authentication - NCSC.GOV.UK</a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.0327%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">FIDO Specifications Overview</span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 36.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">FIDO Alliance</span></td>
<td style="width: 51.4604%; height: 36.8px;"><span style="color: black; mso-color-alt: windowtext;"><a rel="noopener noreferrer" href="https://fidoalliance.org/specifications/" target="_blank">User Authentication Specifications Overview - FIDO Alliance</a></span></td>
</tr>
<tr style="height: 55.2px;">
<td style="width: 33.0327%; height: 55.2px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Microsoft Entra ID - Multi-Factor Authentication</span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 55.2px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Microsoft</span></td>
<td style="width: 51.4604%; height: 55.2px;"><span><a rel="noopener noreferrer" href="https://learn.microsoft.com/en-us/entra/identity/authentication/concept-mfa-howitworks" target="_blank">Microsoft Entra multifactor authentication overview - Microsoft Entra ID | Microsoft Learn</a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.0327%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Multifactor Authentication Cheat Sheet</span></strong></td>
<td width="142" valign="top">
<p class="text-center">OWASP</p>
</td>
<td style="width: 51.4604%; height: 36.8px;"><span style="color: black; mso-color-alt: windowtext;"><a rel="noopener noreferrer" href="https://cheatsheetseries.owasp.org/cheatsheets/Multifactor_Authentication_Cheat_Sheet.html" target="_blank">Multifactor Authentication - OWASP Cheat Sheet Series</a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.0327%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Implementing Phishing Resistant MFA</span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 36.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">CISA</span></td>
<td style="width: 51.4604%; height: 36.8px;"><span><a rel="noopener noreferrer" href="https://www.cisa.gov/sites/default/files/publications/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf" target="_blank">Implementing Phishing-Resistant MFA</a></span></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title=" Risk Analysis"><paragraph
    title="16.7.41.R.01."

    tags="Governance,Information Security Documentation,Access Control,Risk Assessment"


><![CDATA[<p>The requirement for an agency information security policy is discussed and described in <a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a>.&nbsp; An essential part of any security policy is the assessment of risk and the inclusion of requirements for securing access to systems, applications and data.</p>]]></paragraph>
<paragraph
    title="16.7.41.R.02."

    tags="Governance,Access Control,Passwords,Risk Assessment"


><![CDATA[<p>A risk analysis is fundamental to the design, implementation and maintenance of Multi-Factor Authentication (MFA) processes and will inform and direct the development of requirements and an authentication architecture to provide robust but usable security.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.7.41.C.01."

    tags="Governance,Access Control,Passwords,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="6948"
><![CDATA[<p class="Default"><span>Agencies </span><span>MUST undertake a risk analysis before designing and implementing MFA.</span></p>]]></paragraph>
</block>
<block title="System Architecture and Security Controls"><paragraph
    title="16.7.42.R.01."

    tags="Governance,Access Control,Passwords"


><![CDATA[<p>Security controls should support security while enabling authorised user access.&nbsp; The system architecture should be sufficiently comprehensive to support this objective.</p>]]></paragraph>
<paragraph
    title="16.7.42.R.02."

    tags="Access Control,Passwords,Authentication,MFA"


><![CDATA[<p>External facing systems and authenticating to third-party services exposes additional risk to the organisation. MFA provides an additional layer to help an organisation manage risk of systems compromise through authentication attacks.</p>]]></paragraph>
<paragraph
    title="16.7.42.R.03."

    tags="Access Control,Passwords,Authentication,MFA"


><![CDATA[<p>While phishing-resistant MFA methods, such as hardware security keys or biometric authentication, offer stronger protection (compared to non-phishing-resistant MFA), some of these methods may not always be feasible for all users of systems. Therefore, while we strongly encourage the adoption of phishing resistant MFA wherever possible, any form of MFA is considered an improvement over relying solely on passwords.</p>]]></paragraph>
<paragraph
    title="16.7.42.R.04."

    tags="Access Control,Passwords,Authentication,MFA"


><![CDATA[<p>Where devices or systems do not support MFA, organisations are encouraged to implement appropriate compensating controls. These measures can help mitigate the risks associated with relying solely on passwords.</p>]]></paragraph>
<paragraph
    title="16.7.42.C.01."

    tags="Technical,Access Control,Authentication,MFA"


    classification="All Classifications"
    compliance="Must"
    cid="7563"
><![CDATA[<p>Where an agency has external facing systems, cloud-based services, or is authenticating to third-party services services, they MUST:</p>
<ul>
<li>require MFA for all user accounts; and</li>
<li>implement a secure, multi-factor process to allow entities to reset their standard user credentials.</li>
</ul>]]></paragraph>
<paragraph
    title="16.7.42.C.02."

    tags="Governance,Access Control,Passwords,Authentication,MFA"


    classification="All Classifications"
    compliance="Must"
    cid="6953"
><![CDATA[<p>Where an agency has implemented MFA they MUST:</p>
<ul>
<li>require MFA for administrative or other high privileged users; and</li>
<li>implement a secure, multi-factor process to allow entities to reset their standard user credentials.</li>
</ul>]]></paragraph>
<paragraph
    title="16.7.42.C.03."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7564"
><![CDATA[<p>Agencies MUST implement MFA on all user accounts with <strong>remote</strong> access to organisational resources.</p>]]></paragraph>
<paragraph
    title="16.7.42.C.04."

    tags="Technical,Access Control,Passwords,Authentication,MFA"


    classification="All Classifications"
    compliance="Should"
    cid="7565"
><![CDATA[<p>Agencies SHOULD implement MFA on all user accounts with access to organisational resources.<span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-bidi-font-family: &#039;Times New Roman&#039;; color: windowtext; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU;"> </span></p>]]></paragraph>
<paragraph
    title="16.7.42.C.05."

    tags="Technical,Access Control,Passwords,Authentication,MFA"


    classification="All Classifications"
    compliance="Should"
    cid="7566"
><![CDATA[<p>Where agencies have implemented MFA, they SHOULD implement phishing-resistant MFA on administration accounts.<span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-bidi-font-family: &#039;Times New Roman&#039;; color: windowtext; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU;"> </span></p>]]></paragraph>
<paragraph
    title="16.7.42.C.06."

    tags="Technical,Access Control,Passwords,Authentication,MFA"


    classification="All Classifications"
    compliance="Should"
    cid="7567"
><![CDATA[<p>Agencies SHOULD use phishing-resistant MFA when authenticating users to systems.</p>]]></paragraph>
<paragraph
    title="16.7.42.C.07."

    tags="Technical,Access Control,Passwords,Authentication,MFA"


    classification="All Classifications"
    compliance="Should"
    cid="6952"
><![CDATA[<p>The design of an agency MFA SHOULD include consideration of:</p>
<ul>
<li>Risk identification;</li>
<li>Level of security and access control appropriate for each aspect of an organisation’s information systems (data, devices, equipment, storage, cloud, etc.)</li>
<li>A formal authorisation process for user system access and entitlements;</li>
<li>Logging,&nbsp;monitoring and reporting of activity;</li>
<li>Review of logs for orphaned accounts and inappropriate user access including unsuccessful authentication;</li>
<li>Identification of error and anomalies which may indicate inappropriate or malicious activity;</li>
<li>Incident response;</li>
<li>Remediation of errors;</li>
<li>Suspension and/or revocation of access rights where policy violations occur;</li>
<li>Capacity planning.</li>
</ul>]]></paragraph>
</block>
<block title="Integration with Policy"><paragraph
    title="16.7.43.R.01."

    tags="Governance,Information Security Documentation,Access Control,Passwords,MFA"


><![CDATA[<p>The requirement for an agency information security policy is discussed and described in <a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a>.&nbsp; Privileged Access Management policy is discussed in <a title="Privileged access management" href="http://nzism.gcsb.govt.nz/ism-document#Section-15526">Section 16.4 - Privileged Access Management</a>.</p>]]></paragraph>
<paragraph
    title="16.7.43.C.01."

    tags="Governance,Information Security Documentation,Access Control,Passwords,MFA"


    classification="All Classifications"
    compliance="Should"
    cid="6956"
><![CDATA[<p>The design of an organisations MFA system SHOULD be integrated with the agency’s Information Security Policy, the agency’s Privileged Access Management (PAM) Policy, and any additional agency password policies.</p>]]></paragraph>
</block>
<block title="User Training"><paragraph
    title="16.7.44.R.01."

    tags="Governance,Access Control,Passwords"


><![CDATA[<p>It is important that users understand and have continued awareness of risks and threats to authentication credentials, in order to maintain the integrity of the credentials and to maintain the security of the systems being accessed.</p>]]></paragraph>
<paragraph
    title="16.7.44.R.02."

    tags="Governance,Access Control,Passwords,MFA"


><![CDATA[<p>MFA introduces some complexity and may require the use of specific devices, hardware or applications.&nbsp; Training is essential to increase user awareness and maintain adequate security practices.</p>]]></paragraph>
<paragraph
    title="16.7.44.C.01."

    tags="Governance,Access Control,Passwords,MFA"


    classification="All Classifications"
    compliance="Must"
    cid="6960"
><![CDATA[<p>When agencies’ implement MFA they MUST ensure users have an understanding of the risks, and include appropriate usage and safeguards for MFA in the organisation’s user training and awareness programmes.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="17. Cryptography"><section title="17.1. Cryptographic Fundamentals"><subsection title="Objective"><paragraph
    title="17.1.1."


><![CDATA[<p class="NormS17C1">Agencies use cryptographic products, algorithms and protocols that are approved by the GCSB and are implemented in accordance with this guidance.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="17.1.2."


><![CDATA[<p>This section covers information on the fundamentals of cryptography including the use of encryption to protect data at rest and in transit. &nbsp;Detailed information on algorithms and protocols approved to protect classified information can be found in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">Section 17.2 - Approved Cryptographic Algorithms</a> and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">Section 17.3 - Approved Cryptographic Protocols</a>.</p>]]></paragraph>
</block>
<block title="Purpose of cryptography"><paragraph
    title="17.1.3."


><![CDATA[<p class="NormS17C1">Cryptography is primarily used to support:</p><ul>
<li>Confidentiality – protecting against the risk of information being disclosed to an unauthorised person;</li>
<li>Authentication – ensuring a person or entity is who they claim to be;</li>
<li>Integrity – ensuring information has not been compromised, either deliberately or accidentally; and</li>
<li>Non-repudiation – proving who (or what) performed an action. </li>
</ul>]]></paragraph>
<paragraph
    title="17.1.4."


><![CDATA[<p class="NormS17C1">Cryptography is an important control for data protection. The encryption selected may change depending on the classification of the data.  It is important to note that classification, in itself, provides no protection but is merely a labelling mechanism to indicate the degree of protection and care required in handling that data.</p>]]></paragraph>
<paragraph
    title="17.1.5."


><![CDATA[<p class="NormS17C1">Cryptography is frequently used in the establishment of secure connectivity (e.g. IPSec VPNs) and in trust frameworks such as those supported by Public Key Infrastructure (PKI).</p>]]></paragraph>
<paragraph
    title="17.1.6."


><![CDATA[<p>With the increases in speed and computing power and the cost reductions of modern computing, older cryptographic algorithms are increasingly vulnerable.  It is vital that recommendations and controls in the NZISM are followed.</p>]]></paragraph>
<paragraph
    title="17.1.7."


><![CDATA[<p class="NormS17C1">Mitigation of the risks when using older cryptographic algorithms, often takes the form of increased key lengths.  Agencies should also note the increasing threat posed by the evolution and development of quantum computing (see 17.1.19 - Quantum Computing and Encryption).</p>]]></paragraph>
</block>
<block title="Encryption"><paragraph
    title="17.1.8."


><![CDATA[<p class="NormS17C1">Encryption is the process of converting plain (readable) text to an unintelligible form (cipher text).  The term encryption is often used synonymously with cryptography.</p>]]></paragraph>
<paragraph
    title="17.1.9."


><![CDATA[<p class="NormS17C1">The use of approved encryption will generally reduce the likelihood of an unauthorised party gaining access to the information contained within the encrypted data.</p>]]></paragraph>
<paragraph
    title="17.1.10."


><![CDATA[<p class="NormS17C1">When data is at rest, encryption can be used to reduce the physical protection and handling requirements of media or systems. This does not change the classification of the underlying data system or equipment.</p>]]></paragraph>
<paragraph
    title="17.1.11."


><![CDATA[<p class="NormS17C1">Care needs to be taken with encryption systems that do not encrypt the entire media content to ensure that either all of the classified data is encrypted or that the media is handled in accordance with the highest classification of the unencrypted data.</p>]]></paragraph>
<paragraph
    title="17.1.12."


><![CDATA[<p class="NormS17C1">Encryption of data in transit can be used to provide protection for information being communicated over insecure media and hence reduce the security requirements of the communication process.</p>]]></paragraph>
<paragraph
    title="17.1.13."


><![CDATA[<p class="NormS17C1">It is important to note that when agencies use encryption for data at rest or in transit, they are <strong>not</strong> reducing the <strong>classification</strong> of the information. When encryption is used the potential risk of disclosure of the information is reduced.</p>]]></paragraph>
<paragraph
    title="17.1.14."


><![CDATA[<p class="NormS17C1">As the classification of the information <strong>does not </strong>change when encrypted, agencies cannot use lowered storage, physical transfer or security requirements as a baseline to further lower requirements with an additional cryptographic product.</p>]]></paragraph>
<paragraph
    title="17.1.15."


><![CDATA[<p>In general terms, the level of assurance of specific encryption protocols and algorithms is defined in terms of Common Criteria, Protection Profiles or, in some cases, approved cryptographic evaluations.  It is important to note that evaluations of cryptographic protocols and algorithms are <strong>NOT</strong> universally conducted when security products are evaluated, relying rather on previous approved evaluations of cryptographic protocols and algorithms.</p>]]></paragraph>
</block>
<block title="Risk Assessments"><paragraph
    title="17.1.16."


><![CDATA[<p class="NormS17C1">Encryption algorithms apply data transformations that are designed to be difficult to reverse by unauthorised users.  Today’s software will usually provide several algorithmic options, but may include some older algorithms provided for backward compatibility with older (legacy) systems.  In many cases the older algorithms are deprecated, are considered time-expired and are not fit for purpose in modern systems. Deprecated algorithms should not be used.</p>]]></paragraph>
<paragraph
    title="17.1.17."


><![CDATA[<p class="NormS17C1">In all cases a comprehensive risk assessment should be undertaken before configurations are selected.&nbsp; Some general principles to be considered are:</p><ul>
<li>Cryptographic strength is determined by a combination of the encryption algorithm being used, the encryption protocol and the key length.&nbsp; Longer keys generally provide increased encryption strength over shorter keys when using the same encryption algorithm;</li>
<li>Asymmetric cryptographic algorithms are slower than symmetric cryptographic algorithms at an equivalent cryptographic strength;</li>
<li>Asymmetric cryptographic algorithms are recommended for the exchange of symmetric cryptographic keys when they are needed to be shared across communication channels;</li>
<li>Encrypted data cannot usually be compressed, but compressed data can be encrypted.&nbsp; Data should be compressed before encryption;</li>
<li>Encryption keys have the same requirements for handling and storage as the unencrypted data they are being used to protect;</li>
<li>Any risk assessment should include consideration of key management – refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16086">section 17.9 Key Management</a>.</li>
</ul>]]></paragraph>
<paragraph
    title="17.1.18."


><![CDATA[<p>It is important to note that the NZISM prescribes approved algorithms and protocols and users must select combinations from these lists.</p>]]></paragraph>
</block>
<block title="Quantum Computing and Encryption"><paragraph
    title="17.1.19."


><![CDATA[<p class="NormS17C1">Developments in quantum computing have highlighted threats to classical cryptography whereby a quantum computing, can undermine all of the widely used public key algorithms used for key establishment and digital signatures.  While this may be not an immediate issue, quantum developments are likely to undermine the effectiveness of encryption being used today to protect confidentiality of information.</p>]]></paragraph>
<paragraph
    title="17.1.20."


><![CDATA[<p class="NormS17C1">A further implication is that historical and archived data protected by encryption may be at risk.</p>]]></paragraph>
<paragraph
    title="17.1.21."


><![CDATA[<p class="NormS17C1">It is generally accepted that symmetric encryption, with sufficiently long keys, will remain quantum resistant in the short term but that quantum resistant replacements for digital signature and key establishment algorithms will be required in the near future.</p>]]></paragraph>
<paragraph
    title="17.1.22."


><![CDATA[<p class="NormS17C1">In the longer term, quantum resistant algorithms are expected to be developed, standardised and approved for use.  Until such time, however, agencies should be positioning themselves to be ready to migrate to a “post-quantum encryption” environment.</p>]]></paragraph>
<paragraph
    title="17.1.23."


><![CDATA[<p class="NormS17C1">As it is now recognised that agencies will need to undertake future migration activities related to post-quantum encryption, it is no longer specifically advised to invest in migration from RSA to ECC-based algorithms if that has not already taken place.  Emphasis should instead be placed on ensuring minimum key lengths specified in the NZISM are adhered to.</p>]]></paragraph>
</block>
<block title="Transitioning Cryptographic Algorithms and Protocols"><paragraph
    title="17.1.24."


><![CDATA[<p>It is important to use algorithms that adequately protect sensitive information.  It is also important to recognise that all cryptographic algorithms and protocols have a finite life.  Challenges are posed by new cryptanalysis techniques and methods, the increasing power of classical computing technology, and the continuing work on the development of quantum computers.  In addition, there is an active field of work that continuously seeks to compromise algorithms and protocols currently in use.</p>]]></paragraph>
<paragraph
    title="17.1.25."


><![CDATA[<p>Planning for changes in the use of cryptography because of algorithm breaks, the availability of more powerful computing techniques or new technologies is an important consideration for agencies.  Awareness of retirement or deprecation of algorithms and associated protocols is essential.</p>]]></paragraph>
</block>
<block title="RSA "><paragraph
    title="17.1.26."


><![CDATA[<p>RSA was announced in 1976 and is now over 45 years old. Several flaws and attacks have been identified since creation, each of which required specific mitigations, careful implementation and management.  Unfortunately there is ample evidence that implementers continue to have difficulties in securely implementing, using and managing RSA.</p>]]></paragraph>
<paragraph
    title="17.1.27."


><![CDATA[<p class="NormS17C1">To counter identified threats from shorter RSA key lengths, longer key lengths have been specified in the NZISM since 2010.  Minimum key lengths have been subsequently increased over time.</p>]]></paragraph>
<paragraph
    title="17.1.28."


><![CDATA[<p class="NormS17C1">For a number of years there had been several indicators that RSA was likely to be deprecated by the cryptographic community and standards bodies.  For example, TLS 1.3 has deprecated the use of RSA for key exchange in favour of elliptic curve cryptography, but RSA is still supported for digital signatures in the current standard.  Previous guidance from NIST was also indicative of the impending deprecation of RSA.  However, subsequent guidance no longer recommends moving from RSA to elliptic curve if that has not already been done.</p>]]></paragraph>
<paragraph
    title="17.1.29."


><![CDATA[<p class="NormS17C1">Therefore, while RSA is not fully deprecated in the NZISM, it is approved ONLY for a limited set of uses as described in <a title="Approved cryptographic algorithms" href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">Section 17.2 – Approved Cryptographic Algorithms</a>.</p>]]></paragraph>
</block>
<block title="Product specific cryptographic requirements"><paragraph
    title="17.1.30."


><![CDATA[<p class="NormS17C1">This section provides requirements for the use of cryptography to protect classified information.  Requirements, in addition to those in this Manual, can exist in consumer guides for products once they have completed an approved evaluation.  Vendor specifications supplement this manual and where conflict in controls occurs the product specific requirements take precedence.  Any policy or compliance conflicts are to be incorporated into the risk assessment.</p>]]></paragraph>
</block>
<block title="Exceptions for using cryptographic products"><paragraph
    title="17.1.31."


><![CDATA[<p>Where Agencies implement a product that uses an Approved Cryptographic Algorithm or Approved Cryptographic Protocol to provide protection of unclassified data at rest or in transit, that product does not require a separate, approved evaluation.  Correct implementation of the cryptographic protocol is fundamental to the proper operation of the Approved Cryptographic Algorithm or Approved Cryptographic Protocol and is part of the checking conducted during system certification.</p>]]></paragraph>
</block>
<block title="Federal Information Processing Standard 140"><paragraph
    title="17.1.32."


><![CDATA[<p class="NormS17C1">FIPS 140 is a United States standard for the evaluation and validation of both hardware and software cryptographic modules.</p>]]></paragraph>
<paragraph
    title="17.1.33."


><![CDATA[<p class="NormS17C1">FIPS 140 is in its third iteration and is formally referred to as FIPS 140-3.  This section refers to the standard as FIPS 140 but this should be considered to encompass FIPS 140-1, FIPS 140-2 and FIPS 140-3.</p>]]></paragraph>
<paragraph
    title="17.1.34."


><![CDATA[<p>FIPS 140 is not a substitute for an approved evaluation of a product with cryptographic functionality.  FIPS 140 is concerned solely with the cryptographic functionality of a module and does not consider any other security functionality.</p>]]></paragraph>
<paragraph
    title="17.1.35."


><![CDATA[<p>Cryptographic evaluations of products will normally be conducted by an approved agency.  Where a product’s cryptographic functionality has been validated under FIPS 140, the GCSB can, at its discretion, and in consultation with the vendor, reduce the scope of a cryptographic evaluation.</p>]]></paragraph>
</block>
<block title="New Zealand National Policy for High Assurance Cryptographic Equipment and Key Management"><paragraph
    title="17.1.36."


><![CDATA[<p class="NormS17C1">The New Zealand National Standard for High Assurance Cryptographic Equipment (HACE) and related key management is contained in the <strong>New Zealand Communications Security Policy No. 301 – Safeguarding of Communications Security (COMSEC) Material</strong>.&nbsp; This prescribes national doctrine for the safeguarding of COMSEC materials.&nbsp; New Zealand Communications Security Policy No. 301 – Safeguarding of Communications Security (COMSEC) Material, replaces New Zealand Communications Security Standard No. 300 – Control of COMSEC Material which is now withdrawn. Note NZCSP 301 is a RESTRICTED document.</p>]]></paragraph>
</block>
<block title="Protection of RESTRICTED/SENSITIVE information in transit over public systems"><paragraph
    title="17.1.37."


><![CDATA[<p class="NormS17C1">The physical requirements for protection of information classified RESTRICTED/SENSITIVE are provided by the classification system and PSR guidance.</p>]]></paragraph>
<paragraph
    title="17.1.38."


><![CDATA[<p>Where such information is generated and held on information systems (any computer device, including laptops, mobile phones, tablets, desktop and networked systems), the requirements of the NZISM apply. Of particular note is the requirement to encrypt RESTRICTED/SENSITIVE data when in transit over public systems, including any Internet connection, public network or any other network NOT directly controlled by the agency.</p>]]></paragraph>
</block>
<block title="Encryption and Key Management"><paragraph
    title="17.1.39."


><![CDATA[<p class="NormS17C1">Direct agency control is described as the immediate and continuous physical and logical control, responsibility for, protection and operation of agency information systems and data (see 2.2.4).</p>]]></paragraph>
<paragraph
    title="17.1.40."


><![CDATA[<p class="NormS17C1">Indirect agency control is described as when information is not under the direct control of the agency, this may be through outsourcing, ICT management or services, third party facilities such as data centre co-locations, or consumption of cloud services (see 2.2.5 – 2.2.7).</p>]]></paragraph>
<paragraph
    title="17.1.41."


><![CDATA[<p class="NormS17C1">Encryption can be used to protect information not under the direct control of the agency.</p>]]></paragraph>
<paragraph
    title="17.1.42."


><![CDATA[<p class="NormS17C1">The use of encryption (including data encryption, use of a VPN or any other form of protection using cryptography) requires cryptographic key management and the retention of control of both keys and key management processes. </p>]]></paragraph>
<paragraph
    title="17.1.43."


><![CDATA[<p class="NormS17C1">Where agencies make use of VPNs or other forms of network connectivity that protect data in transit, the control and management of the cryptographic key is fundamental to the integrity and confidentiality of the encrypted data.</p>]]></paragraph>
<paragraph
    title="17.1.44."


><![CDATA[<p class="NormS17C1">If encryption keys are compromised, then any authentication and encryption mechanisms that rely on those keys, no matter how robust or comprehensive, are futile.</p>]]></paragraph>
<paragraph
    title="17.1.45."


><![CDATA[<p class="NormS17C1">If encryption keys are lost, damaged, or fail then access to data encrypted using those keys will also be lost.&nbsp; If control of encryption keys is lost, then those keys should be considered to be compromised and must be replaced or superseded urgently.</p>]]></paragraph>
<paragraph
    title="17.1.46."


><![CDATA[<p class="NormS17C1">The selection of the cryptographic protocol and algorithm is described in this chapter and specified in 17.1.55.C.02. It is essential that agencies select and use only approved cryptographic algorithms and protocols (see <a title="Approved Cryptographic Protocols" href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">section 17.2 – Approved Cryptographic Protocols</a>) and apply the cryptographic key management requirements of the NZISM (see <a title="Key management" href="http://nzism.gcsb.govt.nz/ism-document#Section-16086">section 17.9 - Key Management</a>).</p>]]></paragraph>
</block>
<block title="VPN connection Security"><paragraph
    title="17.1.47."


><![CDATA[<p class="NormS17C1">The types of encryption, protocols, and cryptographic algorithms applied in the establishment and maintenance of a VPN connection are fundamental to the security and integrity of the connection.</p>]]></paragraph>
<paragraph
    title="17.1.48."


><![CDATA[<p class="NormS17C1">Key aspects of VPN security include:</p><ul>
<li>The encryption algorithm and protocol used;</li>
<li>Cryptographic key length;</li>
<li>The authentication protocol</li>
<li>Key Exchange protocol;</li>
<li>Selection of VPN protocol;</li>
<li>VPN monitoring and a “kill switch” to deter IP leakage   and snooping;</li>
<li>Cryptographic key management.</li>
</ul>]]></paragraph>
<paragraph
    title="17.1.49."


><![CDATA[<p class="NormS17C1">It is important to understand that a variety of VPN services can use a variety of mechanisms.&nbsp; Agencies should also consider the service provider’s use of hash authentication, perfect forward secrecy, and the difference in encryption settings on both the data and control channels.&nbsp; The NZISM specifies the cryptographic protocols and cryptographic algorithms that should be used (see sections <a title="Approved Cryptographic algorithms" href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">17.2 – Approved Cryptographic Algorithms</a> and <a title="Approved Cryptographic Protocols" href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">17.3 – Approved Cryptographic Protocols</a>) and agencies must ensure the VPN connection conforms with these requirements.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="17.1.50."


><![CDATA[<p>Further references can be found at:&nbsp;</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>NZCSP 301</strong></td>
<td>New Zealand Communications Security Policy 301 - Safeguarding of Communications Security (COMSEC) Material, NZCSP 301 replaces NZCSS 300</td>
<td style="text-align: center;">GCSB</td>
<td>
<p>Contact the GCSB</p>
<p>RESTRICTED document available on application to authorised personnel</p>
</td>
</tr>
<tr>
<td>&nbsp;PSR</td>
<td>Handling requirements for protectively marked information and equipment</td>
<td style="text-align: center;"><span>NZ Government Protective Security Requirements</span>&nbsp;</td>
<td><a rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/classification-system/how-to-protect" target="_blank">https://protectivesecurity.govt.nz/classification-system/how-to-protect</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Transport Layer Security (tls)</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a title="https://datatracker.ietf.org/wg/tls/documents/" rel="noopener noreferrer" href="https://datatracker.ietf.org/wg/tls/documents/" target="_blank">https://datatracker.ietf.org/wg/tls/documents/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>TLS 1.3</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://www.ietf.org/blog/tls13/" target="_blank">https://www.ietf.org/blog/tls13/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>The Transport Layer Security (TLS) Protocol Version 1.3 March 2018</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://tlswg.github.io/tls13-spec/draft-ietf-tls-tls13.html" target="_blank">https://tlswg.github.io/tls13-spec/draft-ietf-tls-tls13.html</a>&nbsp;</td>
</tr>
<tr>
<td>RFC 2407</td>
<td>The Internet IP Security Domain of Interpretation for ISAKMP</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://tools.ietf.org/html/rfc2407" target="_blank">https://tools.ietf.org/html/rfc2407</a>&nbsp;</td>
</tr>
<tr>
<td>RFC 2408&nbsp;</td>
<td>Internet Security Association and Key Management Protocol (ISAKMP)</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://tools.ietf.org/html/rfc2408" target="_blank">https://tools.ietf.org/html/rfc2408</a>&nbsp;</td>
</tr>
<tr>
<td>RFC 2409&nbsp;</td>
<td>The Internet Key Exchange (IKE)</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://tools.ietf.org/html/rfc2409" target="_blank">https://tools.ietf.org/html/rfc2409</a></td>
</tr>
<tr>
<td>RFC 8446&nbsp;</td>
<td>The Transport Layer Security (TLS) Protocol Version 1.3</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc8446" target="_blank">https://datatracker.ietf.org/doc/html/rfc8446</a></td>
</tr>
<tr>
<td>RFC 8996&nbsp;</td>
<td>Deprecating TLS 1.0 and TLS 1.1 – Best Current Practise</td>
<td style="text-align: center;"><span>IETF</span>&nbsp;</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc8996" target="_blank">https://datatracker.ietf.org/doc/html/rfc8996</a></td>
</tr>
<tr>
<td>FIPS 140-3 (March 2019)&nbsp;</td>
<td>Security Requirements for Cryptographic Modules&nbsp;</td>
<td style="text-align: center;">NIST&nbsp;</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/fips/140/3/final" target="_blank">https://csrc.nist.gov/publications/detail/fips/140/3/final&nbsp;</a></td>
</tr>
<tr>
<td>FIPS 186-4 (July 2013)</td>
<td>Digital Signature Standard (DSS)&nbsp;</td>
<td style="text-align: center;"><span>NIST&nbsp;</span>&nbsp;</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/fips/186/4/draft" target="_blank">https://csrc.nist.gov/publications/detail/fips/186/4/draft</a></td>
</tr>
<tr>
<td>FIPS 186-5 (Draft, January 2020)<span>&nbsp;</span>&nbsp;</td>
<td>Digital Signature Standard (DSS)&nbsp;</td>
<td style="text-align: center;"><span>NIST&nbsp;</span>&nbsp;</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/fips/186/5/draft" target="_blank">https://csrc.nist.gov/publications/detail/fips/186/5/draft</a></td>
</tr>
<tr>
<td>FIPS 197 (November 2001)</td>
<td>Advanced Encryption Standard (AES) (This publication is under review)</td>
<td style="text-align: center;">&nbsp;<span>NIST&nbsp;</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/fips/197/final" target="_blank">https://csrc.nist.gov/publications/detail/fips/197/final</a></td>
</tr>
<tr>
<td>NIST SP 800-56A Rev. 3 (April 2018)</td>
<td>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</td>
<td style="text-align: center;">NIST</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final</a></td>
</tr>
<tr>
<td>NIST SP 800-56B Rev. 2 (March 2019)</td>
<td>Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography</td>
<td style="text-align: center;">NIST</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-56b/rev-2/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-56b/rev-2/final</a></td>
</tr>
<tr>
<td>NIST SP 800-131A Rev. 2 (March 2019)</td>
<td>Transitioning the Use of Cryptographic Algorithms and Key Lengths</td>
<td style="text-align: center;">NIST</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-131a/rev-2/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-131a/rev-2/final</a></td>
</tr>
<tr>
<td>NIST SP 800-57 Part 1 Rev. 5 (May 2020)</td>
<td>Recommendation for Key Management: Part 1 – General</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-5/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-5/final</a></td>
</tr>
<tr>
<td>NIST SP 800-57 Part 2 Rev. 1 (May 2019)</td>
<td>Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-57-part-2/rev-1/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-57-part-2/rev-1/final</a></td>
</tr>
<tr>
<td>NIST SP 800-57 Part 3 Rev. 1 (January 2015)</td>
<td>Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-57-part-3/rev-1/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-57-part-3/rev-1/final</a></td>
</tr>
<tr>
<td>NIST 800-175A (August 2016)</td>
<td>Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175A.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175A.pdf [PDF, 470 KB]</a></td>
</tr>
<tr>
<td>NIST SP 800-175B&nbsp;Rev. 1 (March 2020)</td>
<td>Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-175b/rev-1/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-175b/rev-1/final</a></td>
</tr>
<tr>
<td>CNSS Policy 15 (October 2016)</td>
<td>Use of Public Standards for Secure Information Sharing</td>
<td style="text-align: center;">
<p><span><span>Committee on National Security Systems</span></span></p>
<p><span>(CNSS)</span></p>
</td>
<td><a rel="noopener noreferrer" href="https://www.cnss.gov/CNSS/issuances/Policies.cfm" target="_blank">https://www.cnss.gov/CNSS/issuances/Policies.cfm</a></td>
</tr>
<tr>
<td>NSA Quantum Computing FAQ (August 2021)</td>
<td>Quantum Computing and Post-Quantum Cryptography</td>
<td style="text-align: center;"><span>NSA</span></td>
<td><a rel="noopener noreferrer" href="https://media.defense.gov/2021/Aug/04/2002821837/-1/-1/1/Quantum_FAQs_20210804.pdf" target="_blank">https://media.defense.gov/2021/Aug/04/2002821837/-1/-1/1/Quantum_FAQs_20210804.pdf [PDF, 258 KB]</a></td>
</tr>
<tr>
<td>
<p>VPNCP</p>
<p>Version 3.1 March 2015</p>
</td>
<td>Virtual Private Network Capability Package Version 3.1 March 2015&nbsp;</td>
<td style="text-align: center;">NSA&nbsp;</td>
<td>https://www.nsa.gov/ia/_files/VPN_CP_3_1.pdf</td>
</tr>
<tr>
<td>
<p>&nbsp;</p>
</td>
<td>Suite B Implementer’s Guide to NIST SP 800-56A, July 28, 2009</td>
<td style="text-align: center;">NSA</td>
<td><a rel="noopener noreferrer" href="http://docplayer.net/204368-Suite-b-implementer-s-guide-to-nist-sp-800-56a-july-28-2009.html" target="_blank">http://docplayer.net/204368-Suite-b-implementer-s-guide-to-nist-sp-800-56a-july-28-2009.html</a></td>
</tr>
<tr>
<td>
<p>EPC342-08 Version 7.0 4 November 2017</p>
</td>
<td>Guidelines on Cryptographic Algorithms Usage and Key Management</td>
<td style="text-align: center;"><span>European Payments Council</span></td>
<td><a rel="noopener noreferrer" href="https://www.europeanpaymentscouncil.eu/document-library/guidance-documents/guidelines-cryptographic-algorithms-usage-and-key-management" target="_blank">https://www.europeanpaymentscouncil.eu/document-library/guidance-documents/guidelines-cryptographic-algorithms-usage-and-key-management</a></td>
</tr>
<tr>
<td>
<p>&nbsp;</p>
</td>
<td>Choose an Encryption Algorithm</td>
<td style="text-align: center;"><span>Microsoft</span></td>
<td><a rel="noopener noreferrer" href="https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/choose-an-encryption-algorithm?view=sql-server-2017" target="_blank">https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/choose-an-encryption-algorithm?view=sql-server-2017</a></td>
</tr>
<tr>
<td>
<p>&nbsp;</p>
</td>
<td>Transport Layer Protection Cheat Sheet</td>
<td style="text-align: center;"><span>OWASP</span></td>
<td><a rel="noopener noreferrer" href="https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet" target="_blank">https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Guide to Cryptography</td>
<td style="text-align: center;"><span><span>OWASP</span></span></td>
<td><a rel="noopener noreferrer" href="https://www.owasp.org/index.php/Guide_to_Cryptography" target="_blank">https://www.owasp.org/index.php/Guide_to_Cryptography</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>New Directions in Cryptography - IEEE Transactions on Information Theory Vol IT22 November 1976</td>
<td style="text-align: center;"><span><span>Diffie, Hellman</span></span></td>
<td><a rel="noopener noreferrer" href="https://ee.stanford.edu/~hellman/publications/24.pdf" target="_blank">https://ee.stanford.edu/~hellman/publications/24.pdf [PDF, 2.1 MB]</a></td>
</tr>
</tbody>
</table><p>&nbsp;</p><p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Using cryptographic products"><paragraph
    title="17.1.51.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>No real-world product can ever be guaranteed to be free of vulnerabilities.  The best that can be done is to increase the level of assurance in a product to a point that represents satisfactory risk management.</p>]]></paragraph>
<paragraph
    title="17.1.51.R.02."

    tags="Cryptography,Technical"


><![CDATA[<p>Refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 - Product Security</a> for a discussion on product evaluation and assurance.</p>]]></paragraph>
<paragraph
    title="17.1.51.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2070"
><![CDATA[<p class="Normal-nonumbering">Agencies using cryptographic functionality within a product to protect the confidentiality, authentication, non-repudiation or integrity of information, MUST ensure that the product has completed a cryptographic evaluation recognised by the GCSB.</p>]]></paragraph>
</block>
<block title="Data recovery"><paragraph
    title="17.1.52.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>It is important for continuity and operational stability that cryptographic products provide a means of data recovery to allow for the recovery of data in circumstances such as where the encryption key is unavailable due to loss, damage or failure.  This includes production, storage, backup and virtual systems. This is sometimes described as “key escrow”.</p>]]></paragraph>
<paragraph
    title="17.1.52.C.01."

    tags="Cryptography,Technical"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2074"
><![CDATA[<p>Cryptographic products MUST provide a means of data recovery to allow for recovery of data in circumstances where the encryption key is unavailable due to loss, damage or failure.</p>]]></paragraph>
<paragraph
    title="17.1.52.C.02."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2075"
><![CDATA[<p>Cryptographic products SHOULD provide a means of data recovery to allow for recovery of data in circumstances where the encryption key is unavailable due to loss, damage or failure.</p>]]></paragraph>
</block>
<block title="Reducing storage and physical transfer requirements"><paragraph
    title="17.1.53.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p class="NormS16C1">When encryption is applied to storage media (whether portable or residing within IT equipment or systems) it provides an additional layer of defence.  Whilst such measures do not reduce or alter the classification of the information itself, physical storage, handling and transfer requirements may be reduced to those of a lesser classification for the media or equipment (but not the data itself). </p>]]></paragraph>
<paragraph
    title="17.1.53.R.02."

    tags="Cryptography,Technical"


><![CDATA[<p>Approved Cryptographic Algorithms are discussed in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">section 17.2</a>.</p>]]></paragraph>
<paragraph
    title="17.1.53.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2079"
><![CDATA[<p>Encryption used to reduce storage or physical handling protection requirements MUST be an approved cryptographic algorithm in an EAL2 (or higher) encryption product.</p>]]></paragraph>
<paragraph
    title="17.1.53.C.02."

    tags="Cryptography,Technical"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="2080"
><![CDATA[<p class="Normal-nonumbering">If an agency wishes to reduce the storage or physical transfer requirements for IT equipment or media that contains classified information, they MUST encrypt the classified information using High Assurance Cryptographic Equipment (HACE).  It is important to note that the classification of the information itself remains unchanged.</p>]]></paragraph>
<paragraph
    title="17.1.53.C.03."

    tags="Cryptography,Technical"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2081"
><![CDATA[<p>If an agency wishes to use encryption to reduce the storage, handling or physical transfer requirements for IT equipment or media that contains classified information, they MUST use:</p><ul>
<li>full disk encryption; or</li>
<li>partial disk encryption where the access control will allow writing ONLY to the encrypted partition holding the classified information.</li>
</ul>]]></paragraph>
<paragraph
    title="17.1.53.C.04."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2082"
><![CDATA[<p>If an agency wishes to use encryption to reduce the storage or physical transfer requirements for IT equipment or media that contains classified information, they SHOULD use:</p><ul>
<li>full disk encryption; or</li>
<li>partial disk encryption where the access control will allow writing ONLY to the encrypted partition holding the classified information.</li>
</ul>]]></paragraph>
</block>
<block title="Encrypting NZEO information at rest"><paragraph
    title="17.1.54.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>NZEO information is particularly sensitive and it requires additional protection in the form of encryption, when at rest. This includes production, storage, backup and virtual systems.</p>]]></paragraph>
<paragraph
    title="17.1.54.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2085"
><![CDATA[<p>Agencies MUST use an Approved Cryptographic Algorithm to protect NZEO information when at rest on a system.</p>]]></paragraph>
</block>
<block title="Information and Systems Protection"><paragraph
    title="17.1.55.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>When encryption is applied to information being communicated over networks, less assurance is required for the physical protection of the communications infrastructure. In some cases, no physical security can be applied to the communications infrastructure such as public infrastructure, the Internet or non-agency controlled infrastructure. In other cases no direct assurance can be obtained and reliance is placed on third party reviews and reporting. In such cases encryption of information is the only practical mechanism to provide sufficient assurance that the agency information systems are adequately protected.</p>]]></paragraph>
<paragraph
    title="17.1.55.R.02."

    tags="Cryptography,Technical"


><![CDATA[<p class="NormS16C1">Data duplication for backups or data replication aggregates agency information and will generally increase the impact of an unauthorised party gaining access to, or otherwise compromising, the data.  This includes where outsourced services are undertaken.</p>]]></paragraph>
<paragraph
    title="17.1.55.C.01."

    tags="Cryptography,Technical"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2089"
><![CDATA[<p class="Normal-nonumbering">Agencies MUST use HACE if they wish to communicate or pass information over UNCLASSIFIED, insecure or unprotected networks.</p>]]></paragraph>
<paragraph
    title="17.1.55.C.02."

    tags="Cryptography,Technical"


    classification="Restricted/Sensitive"
    compliance="Must"
    cid="2090"
><![CDATA[<p>Information or systems classified RESTRICTED or SENSITIVE MUST be encrypted with an Approved Cryptographic Algorithm and Protocol if information is transmitted or systems are communicating over insecure or unprotected networks, such as the Internet, public networks or non-agency controlled networks.</p>]]></paragraph>
<paragraph
    title="17.1.55.C.03."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2091"
><![CDATA[<p class="NormS16C1">Agencies MUST encrypt aggregated agency data using an approved algorithm and protocol over insecure or unprotected networks such as the Internet, public infrastructure or non-agency controlled networks when the compromise of the aggregated data would present a significant impact to the agency. &nbsp;</p>]]></paragraph>
<paragraph
    title="17.1.55.C.04."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2092"
><![CDATA[<p class="Normal-nonumbering">Agencies SHOULD encrypt agency data using an approved algorithm and protocol if they wish to communicate over insecure or unprotected networks such as the Internet, public networks or non-agency controlled networks.</p>]]></paragraph>
</block>
<block title="IT equipment using Encryption"><paragraph
    title="17.1.56.R.01."

    tags="Cryptography,Encryption,Technical"


><![CDATA[<p>In general terms, when IT equipment employing encryption functionality is turned on and authenticated all information becomes accessible to the system user.  At such a time the IT equipment will need to be handled in accordance with the highest classification of information on the system.  Special technology architectures and implementations exist where accessibility continues to be limited when first powered on.  Agencies should consult the GCSB for further advice on special architectures and implementations.</p>]]></paragraph>
<paragraph
    title="17.1.56.R.02."

    tags="Cryptography,Encryption,Technical"


><![CDATA[<p>The classification of the equipment when powered off will depend on the equipment type, cryptographic algorithms and protocols used and whether cryptographic key has been removed.  Agencies should consult the GCSB for further advice on treatment of specific software, systems and IT equipment. </p>]]></paragraph>
<paragraph
    title="17.1.56.C.01."

    tags="Cryptography,Encryption,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2096"
><![CDATA[<p>When IT equipment storing encrypted information is turned on and authenticated, it MUST be treated as per the original classification of the information.</p>]]></paragraph>
<paragraph
    title="17.1.56.C.02."

    tags="Cryptography,Encryption,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2097"
><![CDATA[<p>Agencies MUST consult the GCSB for further advice on the powered off status and treatment of specific software, systems and IT equipment.</p>]]></paragraph>
</block>
<block title="Encrypting NZEO information in transit"><paragraph
    title="17.1.57.R.01."

    tags="Cryptography,Encryption,Technical"


><![CDATA[<p>NZEO information is particularly sensitive and requires additional protection. It must be encrypted when in transit.</p>]]></paragraph>
<paragraph
    title="17.1.57.C.01."

    tags="Cryptography,Encryption,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2100"
><![CDATA[<p>In addition to any encryption already in place for communication mediums, agencies MUST use an Approved Cryptographic Protocol and Algorithm to protect NZEO information when in transit.</p>]]></paragraph>
</block>
<block title="Key Refresh and Retirement"><paragraph
    title="17.1.58.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>All cryptographic keys have a limited useful life after which the key should be replaced or retired. Typically the useful life of the cryptographic key (cryptoperiod) is use, product and situation dependant. Product guidance is the best source of information on establishing cryptoperiods for individual products. A more practical control is the use of data, disk or volume encryption where key changes are more easily managed. Selection of cryptoperiods should be based on a risk assessment.&nbsp;Refer also to section <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16086">17.9 – Key Management</a>.</p>]]></paragraph>
<paragraph
    title="17.1.58.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2103"
><![CDATA[<p>Agencies SHOULD establish cryptoperiods for all keys and cryptographic implementations in their systems and operations. <br><br></p>]]></paragraph>
<paragraph
    title="17.1.58.C.02."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2104"
><![CDATA[<p>Agencies SHOULD use risk assessment techniques and guidance to establish cryptoperiods.</p>]]></paragraph>
<paragraph
    title="17.1.58.C.03."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2105"
><![CDATA[<p class="Normal-nonumbering">Agencies using HACE MUST consult the GCSB for key management requirements.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="17.2. Approved Cryptographic Algorithms"><subsection title="Objective"><paragraph
    title="17.2.1."


><![CDATA[<p>Information is protected by a properly implemented, Approved Cryptographic Algorithm.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="17.2.2."


><![CDATA[<p>This section covers cryptographic algorithms that the GCSB recognises as being approved for use within government. Implementations of the algorithms in this section need to have successfully completed an approved cryptographic evaluation before they can be approved to protect information. Correct implementations of cryptographic protocols are checked during system certification.</p>]]></paragraph>
<paragraph
    title="17.2.3."


><![CDATA[<p class="NormS17C2">High assurance cryptographic are not covered in this section.&nbsp;</p>]]></paragraph>
</block>
<block title="Approved cryptographic algorithms"><paragraph
    title="17.2.4."


><![CDATA[<p>There is no guarantee or proof of security of an algorithm against presently unknown attacks.  However, the algorithms listed in this section have been extensively scrutinised by government, industry and academic communities in a practical and theoretical setting and have not been found to be susceptible to any feasible attacks.  There have been some cases where theoretically impressive vulnerabilities have been found, however these results are not considered to be feasible with current technologies and capabilities.</p>]]></paragraph>
<paragraph
    title="17.2.5."


><![CDATA[<p>Where there is a range of possible key sizes for an algorithm, some of the smaller key sizes do not provide an adequate safety margin against attacks that might be found in the future.  For example, future advances in number factorisation could render the use of smaller RSA moduli a security vulnerability.</p>]]></paragraph>
<paragraph
    title="17.2.6."


><![CDATA[<p>The approved cryptographic algorithms fall into three categories: asymmetric/public key algorithms, hashing algorithms and symmetric encryption algorithms.  Collectively these were known as SUITE B and were first promulgated in 2006.</p>]]></paragraph>
<paragraph
    title="17.2.7."


><![CDATA[<p>Suite B was superseded by the Commercial National Security Algorithm Suite in August 2015 and later supplemented by the Commercial Solutions for Classified (CSFC) Programme.</p>]]></paragraph>
<paragraph
    title="17.2.8."


><![CDATA[<p class="NormS17C2">Some algorithms that were previously approved in earlier versions of the NZISM are now deprecated. These are still permitted to be used to decrypt or verify previously encrypted or signed files.  These algorithms are described as ‘for legacy use only’ in the NZISM.</p>]]></paragraph>
<paragraph
    title="17.2.9."


><![CDATA[<p>The approved asymmetric/public key algorithms are:</p><ul>
<li>ECDH for agreeing on encryption session keys.</li>
<li>ECDSA for digital signatures.</li>
<li>DH for agreeing on encryption session keys. This should only be used for interoperability with third parties where ECDH is not supported.</li>
<li>RSA for digital signatures and passing encryption session keys or similar keys.</li>
<li>DSA for digital signatures for legacy use only.</li>
</ul>]]></paragraph>
<paragraph
    title="17.2.10."


><![CDATA[<p>The approved hashing algorithms are:</p><ul>
<li>Secure Hashing Algorithm 2; and</li>
<li>Secure Hashing Algorithm 1 for legacy use only.</li>
</ul>]]></paragraph>
<paragraph
    title="17.2.11."


><![CDATA[<p>The approved symmetric encryption algorithms are:</p><ul>
<li>AES; and</li>
<li>3DES for legacy use only.</li>
</ul>]]></paragraph>
<paragraph
    title="17.2.12."


><![CDATA[<p class="NormS17C2">SHA-1, 3DES and DSA MUST NOT be used for new implementations but are approved only for processing already protected information. These are legacy use only.</p>]]></paragraph>
<paragraph
    title="17.2.13."


><![CDATA[<p>Summary Table</p><p>&nbsp;</p><table class="table-control" style="width: 383px; height: 574px;" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td class="table-secondary" valign="top">
<p align="center">Function</p>
</td>
<td width="254" valign="top">
<p align="center">Cryptographic algorithm or protocol</p>
</td>
<td width="132" valign="top">
<p align="center">Applicable standards</p>
</td>
<td width="122" valign="top">
<p align="center">Minimum</p>
</td>
</tr>
<tr>
<td valign="top">
<p align="center">Encryption</p>
</td>
<td width="254" valign="top">
<p align="center">Advanced Encryption Standard (AES)</p>
</td>
<td width="132" valign="top">
<p align="center">FIPS 197</p>
</td>
<td width="122" valign="top">
<p align="center">256-bit key</p>
</td>
</tr>
<tr>
<td valign="top">
<p align="center">Hashing</p>
</td>
<td width="254" valign="top">
<p align="center">Secure Hash Algorithm (SHA)</p>
</td>
<td width="132" valign="top">
<p align="center">FIPS 180-4</p>
</td>
<td width="122" valign="top">
<p align="center">SHA-384</p>
<p align="center">(SHA-256 IN CONFIDENCE &amp; BELOW only)</p>
</td>
</tr>
<tr>
<td valign="top">
<p align="center">Digital signature</p>
</td>
<td width="254" valign="top">
<p align="center">Elliptic Curve Digital Signature Algorithm (ECDSA)</p>
</td>
<td width="132" valign="top">
<p align="center">FIPS 186-3</p>
</td>
<td width="122" valign="top">
<p align="center">NIST P-384</p>
</td>
</tr>
<tr>
<td valign="top">
<p align="center">&nbsp;</p>
</td>
<td width="254" valign="top">
<p align="center">Rivest-Shamir-Adleman (RSA)</p>
</td>
<td width="132" valign="top">
<p align="center">NIST SP 800-56B Rev. 2</p>
</td>
<td width="122" valign="top">
<p align="center">3072-bit key</p>
<p align="center">(2048-bit key in PKI)</p>
</td>
</tr>
<tr>
<td valign="top">
<p align="center">Key exchange</p>
</td>
<td width="254" valign="top">
<p align="center">Elliptic Curve Diffie-Hellman (ECDH)</p>
</td>
<td width="132" valign="top">
<p align="center">SP 800-56A<br> ANSI X9.63</p>
</td>
<td width="122" valign="top">
<p align="center">NIST P-384</p>
</td>
</tr>
<tr>
<td valign="top">&nbsp;</td>
<td width="254" valign="top">
<p align="center">Rivest-Shamir-Adleman</p>
</td>
<td width="132" valign="top">&nbsp;</td>
<td width="122" valign="top">
<p align="center">3072-bit key</p>
</td>
</tr>
<tr>
<td valign="top">
<p align="center">&nbsp;</p>
</td>
<td width="254" valign="top">
<p align="center">Diffie-Helman (DH)</p>
</td>
<td width="132" valign="top">
<p align="center">IETF RFC 3526 (Reference m)</p>
</td>
<td width="122" valign="top">
<p align="center">3072-bit key</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Salting"><paragraph
    title="17.2.14."


><![CDATA[<p>Salting is a technique of further modifying a hash by adding a value or character string to the start or end of a password.  This improves the resistance of the hash to brute-force attacks.  To further improve resistance the salt should be cryptographically strong and randomly generated as unique for each password.</p>]]></paragraph>
<paragraph
    title="17.2.15."


><![CDATA[<p>The effectiveness of salts is reduced if implemented poorly.  Common implementation errors are salts that are too short and the reuse of salts.  To implement credential-specific salts the following principles should be followed:</p><ul>
<li>Generation of a unique salt every time a stored credential is created;</li>
<li>Generate salts as cryptographically strong random data;</li>
<li>Use a 32 or 64 bit salt as storage and system constraints permit;</li>
<li>Implement a security schema that is not dependent on hiding, splitting or otherwise obfuscating the salt; and</li>
<li>Do NOT apply salts per user or on a system wide basis.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="17.2.16."


><![CDATA[<p>The following references are provided for the approved asymmetric/public key algorithms, hashing algorithms and encryption algorithms. &nbsp;Note that Federal Information Processing Standards (FIPS) are standards and guidelines that are developed by the US National Institute of Standards and Technology (NIST) for US Federal computer systems.</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>W. Diffie and M. E. Hellman, “New Directions in Cryptography” &nbsp;IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, November 1976, doi: 10.1109/TIT.1976.1055638.</td>
<td style="text-align: center;"><span>IEEE</span></td>
<td><a rel="noopener noreferrer" href="https://ee.stanford.edu/~hellman/publications/24.pdf" target="_blank">https://ee.stanford.edu/~hellman/publications/24.pdf [PDF, 2.1 MB]</a></td>
</tr>
<tr>
<td>RFC 3447</td>
<td>
<p class="NormS16C2">PKCS #1 Public Key Cryptography Standards #1</p>
<p class="NormS16C2">RSA Laboratories</p>
</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3447" target="_blank">https://datatracker.ietf.org/doc/html/rfc3447</a></td>
</tr>
<tr>
<td>RFC 8624</td>
<td>Algorithm Implementation Requirements and Usage Guidance for DNSSEC<br>June 2019</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc8624" target="_blank">https://datatracker.ietf.org/doc/html/rfc8624</a></td>
</tr>
<tr>
<td>RFC 3602</td>
<td>The AES-CBC Cipher Algorithm and Its Use with IPsec<br>September 2003</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3602" target="_blank">https://datatracker.ietf.org/doc/html/rfc3602</a></td>
</tr>
<tr>
<td>RFC 5288</td>
<td>AES Galois Counter Mode (GCM) Cipher Suites for TLS<br>August 2008</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc5288" target="_blank">https://datatracker.ietf.org/doc/html/rfc5288</a></td>
</tr>
<tr>
<td>RFC 8492</td>
<td>Secure Password Ciphersuites for Transport Layer Security (TLS)<br>February 2019</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc8492" target="_blank">https://datatracker.ietf.org/doc/html/rfc8492</a></td>
</tr>
<tr>
<td>RFC 2898</td>
<td>PKCS #5: Password-Based Cryptography Specification Version 2.0<br>September 2000</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2898" target="_blank">https://datatracker.ietf.org/doc/html/rfc2898</a></td>
</tr>
<tr>
<td>RFC 8018</td>
<td>PKCS #5: Password-Based Cryptography Specification Version 2.1<br>January 2017</td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc8018" target="_blank">https://datatracker.ietf.org/doc/html/rfc8018</a></td>
</tr>
<tr>
<td>FIPS 186-4</td>
<td>Digital Signature Standard (DSS)<br>July 2013</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/fips/186/4/final" target="_blank">https://csrc.nist.gov/publications/detail/fips/186/4/final</a></td>
</tr>
<tr>
<td>FIPS 197</td>
<td>Advanced Encryption Standard (AES)<br>November 2001<br>&nbsp;This publication is currently under review (10 June 2021)</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/fips/197/final" target="_blank">https://csrc.nist.gov/publications/detail/fips/197/final</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Key Management</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/projects/key-management/key-management-guidelines" target="_blank">https://csrc.nist.gov/projects/key-management/key-management-guidelines</a></td>
</tr>
<tr>
<td>SP 800-56A Rev. 3</td>
<td>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</td>
<td style="text-align: center;">NIST</td>
<td>
<p><a rel="noopener noreferrer" href="https://doi.org/10.6028/NIST.SP.800-56Ar3" target="_blank">https://doi.org/10.6028/NIST.SP.800-56Ar3</a></p>
<p>Also ANSI x9.63 and ANSI X9.42</p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Key Establishment</td>
<td style="text-align: center;"><span>NIST</span></td>
<td>
<p><a rel="noopener noreferrer" href="https://csrc.nist.gov/Projects/Key-Management/Key-Establishment" target="_blank">https://csrc.nist.gov/Projects/Key-Management/Key-Establishment</a></p>
<p>Also ANSI X9.63 and ANSI X9.42</p>
</td>
</tr>
<tr>
<td>FIPS Pub 180-4</td>
<td>Secure Hash Standard (SHS)<br>August 2015</td>
<td style="text-align: center;">NIST</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/fips/180/4/final" target="_blank">FIPS 180-4, Secure Hash Standard (SHS) | CSRC (nist.gov)</a></td>
</tr>
<tr>
<td>SP 800-67 Rev. 2</td>
<td>Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher<br>November 2017</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-67/rev-2/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-67/rev-2/final</a></td>
</tr>
<tr>
<td>FIPS 140-3</td>
<td>Security Requirements for Cryptographic Modules<br>March 2019</td>
<td style="text-align: center;">NIST</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/fips/140/3/final" target="_blank">https://csrc.nist.gov/publications/detail/fips/140/3/final</a></td>
</tr>
<tr>
<td>SP 800-56C Rev. 2</td>
<td>Recommendation for Key-Derivation Methods in Key-Establishment Schemes<br>August 2020</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-56c/rev-2/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-56c/rev-2/final</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Block Cipher Techniques</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/projects/block-cipher-techniques/bcm" target="_blank">https://csrc.nist.gov/projects/block-cipher-techniques/bcm</a></td>
</tr>
<tr>
<td>SP 800-38D</td>
<td>Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC<br>November 2007<br>This publication is under review, August 2021</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-38d/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-38d/final</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>McGrew, David A. and Viega, John (2005) "The Galois/Counter Mode of Operation (GCM)"</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.rip/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-spec.pdf" target="_blank">https://csrc.nist.rip/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-spec.pdf [PDF, 1 MB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Cryptographic Algorithm Validation Program CAVP</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program" target="_blank">https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program</a></td>
</tr>
<tr>
<td>SP 800-38A</td>
<td>Recommendation for Block Cipher Modes of Operation: Methods and Techniques<br>December 2001<br>This publication is under review (May 2021)</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-38a/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-38a/final</a></td>
</tr>
<tr>
<td>FIPS 180-4</td>
<td>Secure Hash Standard (SHS)<br>August 2015</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/fips/180/4/final" target="_blank">https://csrc.nist.gov/publications/detail/fips/180/4/final</a></td>
</tr>
<tr>
<td>SP 800-63</td>
<td>Digital Identity Guidelines</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://pages.nist.gov/800-63-3/" target="_blank">https://pages.nist.gov/800-63-3/</a></td>
</tr>
<tr>
<td>SP 800-106</td>
<td>Randomized Hashing for Digital Signatures<br>February 2009</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-106/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-106/final</a></td>
</tr>
<tr>
<td>SP 800-107 Rev. 1</td>
<td>Recommendation for Applications Using Approved Hash Algorithms<br>August 2012<br>This publication is under review (6 August 2021)</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-107/rev-1/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-107/rev-1/final</a></td>
</tr>
<tr>
<td>SP 800-132</td>
<td>Recommendation for Password-Based Key Derivation: Part 1: Storage Applications<br>December 2021</td>
<td style="text-align: center;"><span>NIST</span></td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-132/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-132/final</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Commercial National Security Algorithm (CNSA) Suite</td>
<td style="text-align: center;"><span>NSA</span></td>
<td><a href="https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF"></a><a rel="noopener noreferrer" href="https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF" target="_blank">CSA_CNSA_2.0_ALGORITHMS_.PDF (defense.gov)</a><a rel="noopener noreferrer" href="https://www.iad.gov/iad/programs/iad-initiatives/cnsa-suite.cfm" target="_blank"></a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Commercial National Security Algorithm (CNSA) Suite Factsheet</td>
<td style="text-align: center;"><span>NSA</span></td>
<td>
<p><a rel="noopener noreferrer" href="https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF" target="_blank">CSI_CNSA_2.0_FAQ_.PDF (defense.gov)</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Commercial Solutions for Classified (CSfC) FAQ 2018</td>
<td style="text-align: center;"><span>NSA</span></td>
<td><a rel="noopener noreferrer" href="https://www.nsa.gov/Portals/70/documents/resources/everyone/csfc/csfc-faqs.pdf" target="_blank">https://www.nsa.gov/Portals/70/documents/resources/everyone/csfc/csfc-faqs.pdf [PDF, 1.15 MB]</a></td>
</tr>
</tbody>
</table><p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Using Approved Cryptographic Algorithms"><paragraph
    title="17.2.17.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p>Inappropriate configuration of a product using an Approved Cryptographic Algorithm can inadvertently select relatively weak implementations of the cryptographic algorithms.  In combination with an assumed level of security confidence, this can represent a significant security risk.</p>]]></paragraph>
<paragraph
    title="17.2.17.R.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p class="Normal-nonumbering">When configuring unevaluated products that implement an Approved Cryptographic Algorithm, agencies should disable any non-approved algorithms.  Correct implementation of cryptographic protocols and disabling of non-approved algorithms is checked during system certification.</p><p class="Normal-nonumbering">A less effective control is to advise system users not to use them via a written policy. </p>]]></paragraph>
<paragraph
    title="17.2.17.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2128"
><![CDATA[<p class="Normal-nonumbering">Agencies MUST ensure that only Approved Cryptographic Algorithms can be used when using an unevaluated product that implements a combination of approved and non-approved Cryptographic Algorithms.</p>]]></paragraph>
</block>
<block title="Approved asymmetric/public key algorithms"><paragraph
    title="17.2.18.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p>Over the last decade DSA and DH cryptosystems have been subject to increasingly successful sub-exponential factorisation and index-calculus based attacks.  ECDH and ECDSA offer more security per bit increase in key size than either DH or DSA and are considered more secure alternatives.<br><br></p>]]></paragraph>
<paragraph
    title="17.2.18.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2131"
><![CDATA[<p>Agencies SHOULD use ECDH and ECDSA for all new systems, version upgrades and major system modifications.</p>]]></paragraph>
</block>
<block title="Using DH"><paragraph
    title="17.2.19.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p class="NormS16C2">While ECDH should be used in preference to DH, there are instances where DH is still in use.  A modulus of at least 3072 bits for DH is now considered good practice by the cryptographic community.</p>]]></paragraph>
<paragraph
    title="17.2.19.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2134"
><![CDATA[<p class="Normal-nonumbering">Agencies using DH, for the approved use of agreeing on encryption session keys, MUST use a modulus of at least 3072 bits.</p>]]></paragraph>
</block>
<block title="Equipment using DH"><paragraph
    title="17.2.20.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p>If a network device is NOT able to support the required cryptographic protocol, algorithm and key length, the system will be at risk of a cryptographic compromise.  In such cases, the longest feasible key length must be implemented and the device scheduled for replacement as a matter of urgency.</p>]]></paragraph>
<paragraph
    title="17.2.20.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2137"
><![CDATA[<p>Devices which are NOT capable of implementing required key lengths MUST be reconfigured with the longest feasible key length as a matter of urgency.</p>]]></paragraph>
<paragraph
    title="17.2.20.C.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2138"
><![CDATA[<p>Devices which are NOT capable of implementing required key lengths MUST be scheduled for replacement as a matter of urgency.</p>]]></paragraph>
</block>
<block title="Using DSA (for legacy use only)"><paragraph
    title="17.2.21.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p class="NormS16C2"><span>A modulus of at least 1024 bits for DSA is considered good practice by the cryptographic community.</span></p>]]></paragraph>
<paragraph
    title="17.2.21.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="7189"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies using DSA, for the approved use of digital signatures, MUST use a modulus of at least 1024 bits.</span></p>]]></paragraph>
</block>
<block title="Using ECDH"><paragraph
    title="17.2.22.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p>A field/key size of at least 384 bits for ECDH is now considered good practice by the cryptographic community.</p>]]></paragraph>
<paragraph
    title="17.2.22.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2144"
><![CDATA[<p>Agencies using ECDH, for the approved use of agreeing on encryption session keys, MUST implement the curve P-384 (prime moduli).<br><br></p>]]></paragraph>
<paragraph
    title="17.2.22.C.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2145"
><![CDATA[<p>All VPN’s using an ECDH key length less than 384 MUST replace all Pre-Shared Keys with keys of at least 384 bits, as soon as possible.</p>]]></paragraph>
</block>
<block title="Using ECDSA"><paragraph
    title="17.2.23.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p class="NormS16C2">An equivalent symmetric key security strength of at least 160 bits for ECDSA is considered good practice by the cryptographic community. Not all legacy systems support a modulus of this length, in which case significant risk is being carried.</p>]]></paragraph>
<paragraph
    title="17.2.23.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2148"
><![CDATA[<p>Agencies using ECDSA, for the approved use of digital signatures, MUST implement the curve P-384 (prime moduli).</p>]]></paragraph>
</block>
<block title="Using RSA"><paragraph
    title="17.2.24.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p class="NormS16C2">A modulus of at least 3072 bits for RSA is considered good practice by the cryptographic community.</p>]]></paragraph>
<paragraph
    title="17.2.24.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2151"
><![CDATA[<p class="Normal-nonumbering">Agencies using RSA, for the approved use of digital signatures and passing encryption session keys or similar keys, MUST use a modulus of at least 3072 bits.</p>]]></paragraph>
<paragraph
    title="17.2.24.C.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2152"
><![CDATA[<p class="Normal-nonumbering">Agencies using RSA, for the approved use of digital signatures and passing encryption session keys or similar keys, MUST ensure that the public keys used for passing encrypted session keys are different to the keys used for digital signatures.</p>]]></paragraph>
<paragraph
    title="17.2.24.C.03."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="7181"
><![CDATA[<p class="Normal-nonumbering">Agencies using RSA, for the approved use of digital signatures and passing encryption session keys or similar keys, SHOULD use a modulus of at least 4096 bits.</p>]]></paragraph>
</block>
<block title="Public key infrastructure using RSA"><paragraph
    title="17.2.25.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p class="NormS16C2">A modulus of at least 2048 bits for RSA is considered good practice by the cryptographic community for use within X.509 based Public Key Infrastructure (PKI) systems.</p>]]></paragraph>
<paragraph
    title="17.2.25.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="7186"
><![CDATA[<p>Agencies using RSA keys within internet X.509 Public Key Infrastructure certificates MUST use a modulus of at least 2048 bits.</p>]]></paragraph>
</block>
<block title="Approved hashing algorithms"><paragraph
    title="17.2.26.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p>Recent research conducted by cryptographic community suggests that SHA-1 may be susceptible to collision attacks.  While no practical collision attacks have been published for SHA-1, they may become feasible in the near future.</p>]]></paragraph>
<paragraph
    title="17.2.26.R.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p class="NormS16C2">SHA-1 has been deprecated and the use of SHA-1 is permitted ONLY for legacy systems to validate existing hashes previously generated using SHA-1.</p>]]></paragraph>
<paragraph
    title="17.2.26.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2155"
><![CDATA[<p class="Normal-nonumbering">Agencies MUST use the SHA-2 family for new systems. Use of SHA-1 is permitted ONLY for legacy systems.</p>]]></paragraph>
<paragraph
    title="17.2.26.C.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="5905"
><![CDATA[<p>Agencies MUST use a minimum of SHA-384 when using hashing algorithms to provide integrity protection for information classified as RESTRICTED/SENSITIVE or above.</p>]]></paragraph>
<paragraph
    title="17.2.26.C.03."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="7187"
><![CDATA[<p>In all other cases when information requires integrity protection using hashing algorithms, Agencies MUST use a minimum of SHA-256.</p>]]></paragraph>
</block>
<block title="Salts"><paragraph
    title="17.2.27.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p>The use of salts strengthens the resistance of hash values to a variety of attacks, including brute-force, rainbow table, dictionary and lookup table attacks.</p>]]></paragraph>
<paragraph
    title="17.2.27.R.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p>Key derivation functions use a password, a salt, then generate a password hash.  Their purpose is to make password guessing by an attacker who has obtained a password hash file expensive and therefore the cost of a guessing attack high and prohibitive.</p>]]></paragraph>
<paragraph
    title="17.2.27.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="6560"
><![CDATA[<p>Memorised secrets such as passwords MUST be stored in a form that is resistant to offline attacks.</p>]]></paragraph>
<paragraph
    title="17.2.27.C.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="6561"
><![CDATA[<p>Memorised secrets such as passwords SHOULD be salted and hashed using a suitable one-way key derivation function. See <a title="salting" href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-15872">17.2.14</a>.</p>]]></paragraph>
<paragraph
    title="17.2.27.C.03."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="6562"
><![CDATA[<p>The salt SHOULD be at least 32 bits in length, be chosen arbitrarily, and each instance is unique so as to minimise salt value collisions among stored hashes.</p>]]></paragraph>
</block>
<block title="Approved symmetric encryption algorithms"><paragraph
    title="17.2.28.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p>The use of Electronic Code Book (ECB) mode in block ciphers allows repeated patterns in plaintext to appear as repeated patterns in the ciphertext.  Most cleartext, including written language and formatted files, contains significant repeated patterns.  An attacker can use this to deduce possible meanings of ciphertext by comparison with previously intercepted data.  In other cases they might be able to determine information about the key by inferring certain contents of the cleartext.  The use of other modes such as Cipher Block Chaining, Cipher Feedback, Output Feedback or Counter prevents such attacks.</p>]]></paragraph>
<paragraph
    title="17.2.28.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Should Not"
    cid="2158"
><![CDATA[<p class="Normal-nonumbering">Agencies using approved symmetric encryption algorithms (e.g. AES) SHOULD NOT use Electronic Code Book (ECB) mode.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="17.3. Approved Cryptographic Protocols"><subsection title="Objective"><paragraph
    title="17.3.1."


><![CDATA[<p>Classified information in transit is protected by an Approved Cryptographic Protocol implementing an Approved Cryptographic Algorithm.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="17.3.2."


><![CDATA[<p>This section covers information on the cryptographic protocols that the GCSB recognises as being approved for use within government.  Implementations of the protocols in this section need to have successfully completed a GCSB recognised cryptographic evaluation before they can be approved for implementation.</p>]]></paragraph>
<paragraph
    title="17.3.3."


><![CDATA[<p>High assurance cryptographic protocols are <strong>not</strong> covered in this section.</p>]]></paragraph>
</block>
<block title="Approved cryptographic protocols"><paragraph
    title="17.3.4."


><![CDATA[<p>In general, the GCSB only recognises the use of cryptographic products that have passed a formal evaluation.  However, the GCSB may approve the use of some commonly available cryptographic protocols even though their implementations within specific products have not been formally evaluated.  This approval is limited to cases where they are used in accordance with the requirements in this manual.</p>]]></paragraph>
<paragraph
    title="17.3.5."


><![CDATA[<p>The Approved Cryptographic Protocols are:</p><ul>
<li>TLS;</li>
<li>SSH;</li>
<li>S/MIME;</li>
<li>OpenPGP Message Format; and</li>
<li>IPSec.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Using Approved Cryptographic Protocols"><paragraph
    title="17.3.6.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p>If a product implementing an Approved Cryptographic Protocol has been inappropriately configured, it is possible that relatively weak cryptographic algorithms or implementations could be inadvertently selected.  In combination with an assumed level of security confidence, this can represent a significant level of security risk.</p>]]></paragraph>
<paragraph
    title="17.3.6.R.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p>When configuring unevaluated products that implement an Approved Cryptographic Protocol, agencies can ensure that only the Approved Cryptographic Algorithm can be used by disabling the unapproved algorithms within the products (which is preferred).  Alternatively a policy can be put in place to advise system users not to use the non-approved algorithms.</p>]]></paragraph>
<paragraph
    title="17.3.6.R.03."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


><![CDATA[<p>While many Approved Cryptographic Protocols support authentication, agencies should be aware that these authentication mechanisms are not foolproof. To be effective, these mechanisms MUST be securely implemented and protected. <br>This can be achieved by:</p><ul>
<li>providing an assurance of private key protection;</li>
<li>ensuring the correct management of certificate authentication processes including certificate revocation checking; and</li>
<li>using a legitimate identity registration scheme.</li>
</ul>]]></paragraph>
<paragraph
    title="17.3.6.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2520"
><![CDATA[<p>Agencies using a product that implements an Approved Cryptographic Protocol MUST ensure that only Approved Cryptographic Protocols can be used.<br><br></p>]]></paragraph>
</block>
</subsection>
</section>
<section title="17.4. Transport Layer Security"><subsection title="Objective"><paragraph
    title="17.4.1."


><![CDATA[<p>Transport Layer Security is implemented correctly as an approved protocol.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="17.4.2."


><![CDATA[<p>This section covers the conditions under which TLS can be used as an approved cryptographic protocols.  Additionally, as File Transfer Protocol over SSL is built on SSL/TLS, it is also considered within scope.</p>]]></paragraph>
<paragraph
    title="17.4.3."


><![CDATA[<p>When using a product that implements TLS, requirements for using approved cryptographic protocols will also need to be referenced in the <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">Section 17.3 - Approved Cryptographic Protocols</a>.</p>]]></paragraph>
<paragraph
    title="17.4.4."


><![CDATA[<p>Further information on handling TLS traffic through gateways can be found in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15091">Section 14.3 - Web Applications</a>.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="17.4.5."


><![CDATA[<p><strong>Secure Sockets Layer (SSL)</strong>, and <strong>Transport Layer Security (TLS)</strong> are cryptographic protocols designed to provide communication security when using the Internet.  They use X.509 certificates and asymmetric cryptography for authentication purposes.  This generates a session key.  This session key is then used to encrypt data between the parties.</p>]]></paragraph>
<paragraph
    title="17.4.6."


><![CDATA[<p>Encryption with the session key provides data and message confidentiality, and message authentication codes for message integrity.</p>]]></paragraph>
<paragraph
    title="17.4.7."


><![CDATA[<p>Several versions of the SSL and TLS protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging, and voice-over-IP (VoIP).</p>]]></paragraph>
<paragraph
    title="17.4.8."


><![CDATA[<p>Although common usage has been to use the terms TLS and SSL interchangeably, they are distinct protocols.</p>]]></paragraph>
<paragraph
    title="17.4.9."


><![CDATA[<p>TLS is an Internet Engineering Task Force (IETF) protocol, first defined in 1999, updated in RFC 5246 (August 2008) and RFC 6176 (March 2011).  It is based on the earlier SSL specifications (1994, 1995, 1996) developed by Netscape Communications for adding the HTTPS protocol to their Navigator web browser.  A draft of TLS 1.3 was released in October 2014, with a definitive version issued in 2018.</p>]]></paragraph>
<paragraph
    title="17.4.10."


><![CDATA[<p>Microsoft announced in October 2014 that that it will disable Secure Sockets Layer (SSL) 3.0 support in its Internet Explorer browser and in its Online Services, from Dec. 1, 2014.</p>]]></paragraph>
</block>
<block title="SSL 3.0 Vulnerability"><paragraph
    title="17.4.11."


><![CDATA[<p>A design vulnerability has been found in the way SSL 3.0 handles block cipher mode padding.  The Padding Oracle On Downgraded Legacy Encryption (POODLE) attack demonstrates how an attacker can exploit this vulnerability to decrypt and extract information from an encrypted transaction.</p>]]></paragraph>
<paragraph
    title="17.4.12."


><![CDATA[<p>The POODLE attack demonstrates this vulnerability using web browsers and web servers, which is one of the most likely exploitation scenarios.  All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable.</p>]]></paragraph>
</block>
<block title="SSL Superseded"><paragraph
    title="17.4.13."


><![CDATA[<p>SSL is now superseded by TLS, with the latest version being TLS 1.3 which was released in August 2018.  This is largely because of security flaws in the older SSL protocols.</p>]]></paragraph>
<paragraph
    title="17.4.14."


><![CDATA[<p>Accordingly SSL is no longer an approved cryptographic protocol and it SHOULD be replaced by TLS.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="17.4.15."


><![CDATA[<p>Further information on SSL and TLS can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>The SSL 3.0 specification</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00" target="_blank">https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00</a></td>
</tr>
<tr>
<td><strong>&nbsp;RFC5246</strong></td>
<td><strong>The TLS 1.2 specification</strong></td>
<td style="text-align: center;">IETF</td>
<td>
<p><a rel="noopener noreferrer" href="http://tools.ietf.org/html/rfc5246" target="_blank">https://tools.ietf.org/html/rfc5246</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;RFC6176</strong></td>
<td><strong>The SSL 2.0 prohibition</strong></td>
<td style="text-align: center;">IETF</td>
<td>
<p><a rel="noopener noreferrer" href="http://tools.ietf.org/html/rfc6176" target="_blank">https://tools.ietf.org/html/rfc6176</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;RFC8446</strong></td>
<td>
<p><strong>The Transport Layer Security (TLS) Protocol Version 1.3</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td>
<p><a href="https://tools.ietf.org/html/rfc8446"></a><a rel="noopener noreferrer" href="https://tools.ietf.org/html/rfc8446" target="_blank">https://tools.ietf.org/html/rfc8446</a><a href="https://tools.ietf.org/html/rfc8446"></a>&nbsp;&nbsp;&nbsp;</p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Vulnerability Summary for CVE-2014-3566</strong></td>
<td style="text-align: center;">NIST</td>
<td><a rel="noopener noreferrer" href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3566" target="_blank">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3566</a></td>
</tr>
<tr>
<td><strong>&nbsp;<strong>TA14-290A</strong></strong></td>
<td><strong>Alert (TA14-290A) - SSL 3.0 Protocol Vulnerability and POODLE Attack</strong></td>
<td style="text-align: center;">US-CERT</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.us-cert.gov/ncas/alerts/TA14-290A" target="_blank">https://www.us-cert.gov/ncas/alerts/TA14-290A</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>This POODLE Bites: Exploiting The SSL 3.0 Fallback</strong></td>
<td style="text-align: center;">
<p>Google<br>September 2014</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.openssl.org/~bodo/ssl-poodle.pdf" target="_blank">http://www.openssl.org/~bodo/ssl-poodle.pdf [PDF, 213 KB]</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Using TLS"><paragraph
    title="17.4.16.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical,TLS"


><![CDATA[<p>Whilst version 1.0 of SSL was never released, version 2.0 had significant security flaws leading to the development of SSL 3.0.  SSL has since been superseded by TLS with the latest version being TLS 1.3 which was released in August 2018. SSL is no longer an approved cryptographic protocol.</p>]]></paragraph>
<paragraph
    title="17.4.16.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical,TLS"


    classification="All Classifications"
    compliance="Should"
    cid="2598"
><![CDATA[<p>Agencies SHOULD use the current version of TLS (version 1.3).</p>]]></paragraph>
<paragraph
    title="17.4.16.C.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical,TLS"


    classification="All Classifications"
    compliance="Should Not"
    cid="2600"
><![CDATA[<p>Agencies SHOULD NOT use any version of SSL.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="17.5. Secure Shell"><subsection title="Objective"><paragraph
    title="17.5.1."


><![CDATA[<p>Secure Shell (SSH) is implemented correctly as an Approved Cryptographic Protocol.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="17.5.2."


><![CDATA[<p>SSH is software based on the Secure Shell protocol and enables a connection to a remote system.</p>]]></paragraph>
<paragraph
    title="17.5.3."


><![CDATA[<p>This section covers information on the conditions under which commercial and open-source implementations of SSH can be used as an approved cryptographic protocol.  Additionally, secure copy and Secure File Transfer Protocol use SSH and are therefore also covered by this section.</p>]]></paragraph>
<paragraph
    title="17.5.4."


><![CDATA[<p>When using a product that implements SSH, requirements for using approved cryptographic protocols will also need to be referenced from the <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">Section 17. 3 - Approved Cryptographic Protocols</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="17.5.5."


><![CDATA[<p>Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Further information on SSH can be found in the SSH specification</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.rfc-editor.org/rfc/rfc4252" target="_blank">https://www.rfc-editor.org/rfc/rfc4252</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Further information on Open SSH</strong></p>
</td>
<td style="text-align: center;">
<p>Open SSH</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.openssh.com/" target="_blank">https://www.openssh.com/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>OpenSSH 7.3</strong></p>
</td>
<td style="text-align: center;">
<p>Open SSH</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.openssh.com/txt/release-7.3" target="_blank">http://www.openssh.com/txt/release-7.3</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Using SSH"><paragraph
    title="17.5.6.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>The configuration directives provided are based on the OpenSSH implementation of SSH.  Agencies implementing SSH will need to adapt these settings to suit other SSH implementations.</p>]]></paragraph>
<paragraph
    title="17.5.6.R.02."

    tags="Cryptography,Technical"


><![CDATA[<p>SSH version 1 is known to have vulnerabilities.  In particular, it is susceptible to an adversary-in-the-middle attack, where an attacker who can intercept the protocol in each direction can make each node believe they are talking to the other.  SSH version 2 does not have this vulnerability.</p>]]></paragraph>
<paragraph
    title="17.5.6.R.03."

    tags="Cryptography,Technical"


><![CDATA[<p>SSH has the ability to forward connections and access privileges in a variety of ways.  This means that an attacker who can exploit any of these features can gain unauthorised access to a potentially large amount of classified information.</p>]]></paragraph>
<paragraph
    title="17.5.6.R.04."

    tags="Cryptography,Technical"


><![CDATA[<p>Host-based authentication requires no credentials (password, public key etc.) to authenticate although in some cases a host key can be used.  This renders SSH vulnerable to an IP spoofing attack.</p>]]></paragraph>
<paragraph
    title="17.5.6.R.05."

    tags="Cryptography,Technical"


><![CDATA[<p>An attacker who gains access to a system with system administrator privileges will have the ability to not only access classified information but to control that system completely.  Given the clearly more serious consequences of this, system administrator login or administrator privilege escalation SHOULD NOT be permitted.</p>]]></paragraph>
<paragraph
    title="17.5.6.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2647"
><![CDATA[<p>The table below outlines the settings that SHOULD be implemented when using SSH.</p><table class="table-main" style="height: 288px;">
<tbody>
<tr>
<td style="width: 50%;">
<p>Configuration description</p>
</td>
<td>
<p>Configuration directive</p>
</td>
</tr>
<tr>
<td style="width: 50%;">
<p>Disallow the use of SSH version 1</p>
</td>
<td>
<p>Protocol 2</p>
</td>
</tr>
<tr>
<td style="width: 50%;">
<p>On machines with multiple interfaces, configure the SSH daemon to listen only on the required interfaces</p>
</td>
<td>ListenAddress <br>xxx.xxx.xxx.xxx</td>
</tr>
<tr>
<td style="width: 50%;">
<p>Disable connection forwarding</p>
</td>
<td>
<p>AllowTCPForwarding no</p>
</td>
</tr>
<tr>
<td style="width: 50%;">
<p>Disable gateway ports</p>
</td>
<td>
<p>Gatewayports no</p>
</td>
</tr>
<tr>
<td style="width: 50%;">
<p>Disable the ability to login directly as root</p>
</td>
<td>
<p>PermitRootLogin no</p>
</td>
</tr>
<tr>
<td style="width: 50%;">
<p>Disable host-based authentication</p>
</td>
<td>
<p>HostbasedAuthentication no</p>
</td>
</tr>
<tr>
<td style="width: 50%;">
<p>Disable rhosts-based authentication</p>
</td>
<td>
<p>RhostsAuthentication no<br>IgnoreRhosts yes</p>
</td>
</tr>
<tr>
<td style="width: 50%;">
<p>Do not allow empty passwords</p>
</td>
<td>PermitEmptyPasswords no</td>
</tr>
<tr>
<td style="width: 50%;">Configure a suitable login banner</td>
<td>Banner/directory/filename</td>
</tr>
<tr>
<td style="width: 50%;">Configure a login authentication timeout of no more than 60 seconds</td>
<td>LoginGraceTime xx</td>
</tr>
<tr>
<td style="width: 50%;">Disable X forwarding </td>
<td>X11Forwarding no</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Authentication mechanisms"><paragraph
    title="17.5.7.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>Public key-based systems have greater potential for strong authentication, put simply, people are not able to remember particularly strong passwords.  Password-based authentication schemes are also more susceptible to interception than public key-based authentication schemes.</p>]]></paragraph>
<paragraph
    title="17.5.7.R.02."

    tags="Cryptography,Technical"


><![CDATA[<p>Passwords are more susceptible to guessing attacks, so if passwords are used in a system then countermeasures should be put into place to reduce the chance of a successful brute force attack.</p>]]></paragraph>
<paragraph
    title="17.5.7.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2672"
><![CDATA[<p>Agencies SHOULD use public key-based authentication before using password-based authentication.</p>]]></paragraph>
<paragraph
    title="17.5.7.C.02."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2673"
><![CDATA[<p>Agencies that allow password authentication SHOULD use techniques to block brute force attacks against the password.</p>]]></paragraph>
</block>
<block title="Automated remote access"><paragraph
    title="17.5.8.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>If password-less authentication is enabled, allowing access from unknown IP addresses would allow untrusted parties to automatically authenticate to systems without needing to know the password.</p>]]></paragraph>
<paragraph
    title="17.5.8.R.02."

    tags="Cryptography,Technical"


><![CDATA[<p>If port forwarding is not disabled or it is not configured securely, an attacker may be able to gain access to forwarded ports and thereby create a communication channel between the attacker and the host.</p>]]></paragraph>
<paragraph
    title="17.5.8.R.03."

    tags="Cryptography,Technical"


><![CDATA[<p>If agent credential forwarding is enabled, an intruder could connect to the stored authentication credentials and then use them to connect to other trusted hosts or even intranet hosts, if port forwarding has been allowed as well.</p>]]></paragraph>
<paragraph
    title="17.5.8.R.04."

    tags="Cryptography,Technical"


><![CDATA[<p>X11 is a computer software system and network protocol that provides a graphical user interface for networked computers.  Failing to disable X11 display remoting could result in an attacker being able to gain control of the computer displays as well as keyboard and mouse control functions.</p>]]></paragraph>
<paragraph
    title="17.5.8.R.05."

    tags="Cryptography,Technical"


><![CDATA[<p>Allowing console access permits every user who logs into the console to run programs that are normally restricted to the root user.</p>]]></paragraph>
<paragraph
    title="17.5.8.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2725"
><![CDATA[<p>Agencies SHOULD use parameter checking when using the ‘forced command’ option.</p>]]></paragraph>
<paragraph
    title="17.5.8.C.02."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2726"
><![CDATA[<p>Agencies that use logins without a password for automated purposes SHOULD disable:</p><ul>
<li>access from IP addresses that do not need access;</li>
<li>port forwarding;</li>
<li>agent credential forwarding;</li>
<li>X11 display remoting; and</li>
<li>console access.</li>
</ul>]]></paragraph>
<paragraph
    title="17.5.8.C.03."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2727"
><![CDATA[<p>Agencies that use remote access without the use of a password SHOULD use the ‘forced command’ option to specify what command is executed.</p>]]></paragraph>
</block>
<block title="SSH-agent"><paragraph
    title="17.5.9.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>SSH-agent or other similar key caching programs hold and manage private keys stored on workstations and respond to requests from remote systems to verify these keys.  When an SSH-agent launches, it will request the user’s password.  This password is used to unlock the user’s private key.  Subsequent access to remote systems is performed by the agent and does not require the user to re-enter their password.  Screenlocks and expiring key caches ensure that the user’s private key is not left unlocked for long periods of time.</p>]]></paragraph>
<paragraph
    title="17.5.9.R.02."

    tags="Cryptography,Technical"


><![CDATA[<p>Agent credential forwarding is required when multiple SSH connections are chained to allow each system in the chain to authenticate the user.</p>]]></paragraph>
<paragraph
    title="17.5.9.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2737"
><![CDATA[<p>Agencies that use SSH-agent or other similar key caching programs SHOULD:</p><ul>
<li>only use the software on workstation and servers with screenlocks;</li>
<li>ensure that the key cache expires within four hours of inactivity; and</li>
<li>ensure that agent credential forwarding is used when multiple SSH traversal is needed.</li>
</ul>]]></paragraph>
</block>
<block title="SSH-Versions"><paragraph
    title="17.5.10.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>Older versions contain known vulnerabilities which are regularly addressed or corrected by newer versions.</p>]]></paragraph>
<paragraph
    title="17.5.10.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2740"
><![CDATA[<p>Agencies SHOULD ensure that the latest implementation of SSH software is being used. Older versions contain known vulnerabilities.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="17.6. Secure Multipurpose Internet Mail Extension"><subsection title="Objective"><paragraph
    title="17.6.1."


><![CDATA[<p>Secure Multipurpose Internal Mail Extension (S/MIME) is implemented correctly as an approved cryptographic protocol.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="17.6.2."


><![CDATA[<p>This section covers information on the conditions under which S/MIME can be used as an approved cryptographic protocol.</p>]]></paragraph>
<paragraph
    title="17.6.3."


><![CDATA[<p>When using a product that implements S/MIME, requirements for using approved cryptographic protocols will also need to be referenced from <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">Section 17.3 - Approved Cryptographic Protocols</a>.</p>]]></paragraph>
<paragraph
    title="17.6.4."


><![CDATA[<p>Information relating to the development of password selection policies and password requirements can be found in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15349">Section 16.1 - Identification and Authentication</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="17.6.5."


><![CDATA[<p>Further information on S/MIME can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td>
<p><a title="Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc5751" target="_blank">https://datatracker.ietf.org/doc/html/rfc5751</a></p>
</td>
</tr>
<tr>
<td><strong>SP 800-57</strong></td>
<td><strong>Recommendations for Key Management</strong></td>
<td style="text-align: center;">&nbsp;NIST</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/sp" target="_blank">https://csrc.nist.gov/publications/sp</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Decommissioning"><paragraph
    title="17.6.6.R.01."

    tags="Cryptography,Technical,System Decomissioning"


><![CDATA[<p>Decommissioning MUST ensure any remanent cryptographic data is destroyed or unrecoverable.</p>]]></paragraph>
<paragraph
    title="17.6.6.C.01."

    tags="Cryptography,Technical,System Decomissioning"


    classification="All Classifications"
    compliance="Must"
    cid="2769"
><![CDATA[<p>Decommissioning of faulty or redundant equipment MUST comply with media sanitisation requirements described in <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>.</p>]]></paragraph>
</block>
<block title="Using S/MIME"><paragraph
    title="17.6.7.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>S/MIME 2.0 used weaker cryptography (40-bit keys) than is approved for use by the government.  Version 3.0 was the first version to become an Internet Engineering Taskforce (IETF) standard.</p>]]></paragraph>
<paragraph
    title="17.6.7.R.02."

    tags="Cryptography,Technical"


><![CDATA[<p>Agencies choosing to implement S/MIME should be aware of the inability of many content filters to inspect encrypted messages and any attachments for inappropriate content, and for server-based antivirus software to scan for viruses and other malicious code.</p>]]></paragraph>
<paragraph
    title="17.6.7.R.03."

    tags="Cryptography,Technical"


><![CDATA[<p>Improper decommissioning and sanitisation presents opportunities for harvesting Private Keys.  Products that hosted multiple Private Keys for the management of multiple identities should be considered points of aggregation with an increased “target value”.  Where cloud based computing services have been employed, media sanitisation may be problematic and require the revocation and re-issue of new keys.</p>]]></paragraph>
<paragraph
    title="17.6.7.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Must Not"
    cid="2780"
><![CDATA[<p>Agencies MUST NOT allow versions of S/MIME earlier than 3.0 to be used.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="17.7. OpenPGP Message Format"><subsection title="Objective"><paragraph
    title="17.7.1."


><![CDATA[<p>OpenPGP Message Format is implemented correctly as an Approved Cryptographic Protocol.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="17.7.2."


><![CDATA[<p>This section covers information on the conditions under which the OpenPGP Message Format can be used as an approved cryptographic protocol. &nbsp;It applies to the protocol as specified in <a title="IETF - RFC 2440" rel="noopener noreferrer" href="https://www.ietf.org/rfc/rfc2440.txt" target="_blank">IETF’s RFC 2440</a> and <a title="IETF - RFC 4880" rel="noopener noreferrer" href="https://tools.ietf.org/html/rfc4880" target="_blank">RFC 4880</a>, which supersedes RFC 2440.</p>]]></paragraph>
<paragraph
    title="17.7.3."


><![CDATA[<p>When using a product that implements the OpenPGP Message Format, requirements for using approved cryptographic protocols will also need to be referenced from the <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">Section 17.3 - Approved Cryptographic Protocols</a>.</p>]]></paragraph>
<paragraph
    title="17.7.4."


><![CDATA[<p>Information relating to the development of password selection policies and password requirements can be found in the <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15349">Section 16.1 - Identification and Authentication</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="17.7.5."


><![CDATA[<p>Further information on the OpenPGP Message Format can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>&nbsp;RFC 4880</strong></td>
<td>
<p><strong>OpenPGP Message Format specification</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td>
<p><a title="OpenPGP Message Format" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc4880" target="_blank">https://datatracker.ietf.org/doc/html/rfc4880</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Using OpenPGP Message Format"><paragraph
    title="17.7.6.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>If the private certificate and associated key used for encrypting messages is suspected of being compromised i.e. stolen, lost or transmitted over the Internet, then no assurance can be placed in the integrity of subsequent messages that are signed by that private key.  Likewise no assurance can be placed in the confidentiality of a message encrypted using the public key as third parties could intercept the message and decrypt it using the private key.</p>]]></paragraph>
<paragraph
    title="17.7.6.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2806"
><![CDATA[<p>Agencies MUST immediately revoke key pairs when a private certificate is suspected of being compromised or leaves the control of the agency.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="17.8. Internet Protocol Security (IPSec)"><subsection title="Objective"><paragraph
    title="17.8.1."


><![CDATA[<p>Internet Protocol Security (IPSec) is correctly implemented.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="17.8.2."


><![CDATA[<p>This section covers information on the conditions under which IPSec can be used as an Approved Cryptographic Protocol.</p>]]></paragraph>
<paragraph
    title="17.8.3."


><![CDATA[<p>When using a product that implements IPSec, requirements for using approved cryptographic protocols will also need to be referenced from <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">Section 17.3 Approved Cryptographic Protocols</a>.</p>]]></paragraph>
</block>
<block title="Modes of operation"><paragraph
    title="17.8.4."


><![CDATA[<p>IPSec can be operated in two modes: transport mode or tunnel mode.</p>]]></paragraph>
</block>
<block title="Cryptographic algorithms"><paragraph
    title="17.8.5."


><![CDATA[<p>Most IPSec implementations can accommodate a number of cryptographic algorithms for encrypting data when the Encapsulating Security Payload (ESP) protocol is used.  These include 3DES and AES.</p>]]></paragraph>
</block>
<block title="Key exchange"><paragraph
    title="17.8.6."


><![CDATA[<p>Most IPSec implementations facilitate a number of methods for sharing keying material used in hashing and encryption processes.  Two common methods are manual keying and IKE using the ISAKMP.  Both methods are considered suitable for use.</p>]]></paragraph>
</block>
<block title="ISAKMP authentication"><paragraph
    title="17.8.7."


><![CDATA[<p>Most IPSec implementations can select from a number of methods for authentication as part of ISAKMP.  These can include digital certificates, encrypted nonces or pre-shared keys.  All these methods are considered suitable for use.</p>]]></paragraph>
</block>
<block title="ISAKMP modes"><paragraph
    title="17.8.8."


><![CDATA[<p>ISAKMP uses two modes to exchange information as part of IKE.  These are main mode and aggressive mode.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="17.8.9."


><![CDATA[<p>Further information on IPSec can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>RFC 2401</strong></p>
</td>
<td>
<p><strong>Security Architecture for the IP overview</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td><a title="Security Architecture for the Internet Protocol" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2401" target="_blank">https://datatracker.ietf.org/doc/html/rfc2401</a></td>
</tr>
<tr>
<td>
<p><strong>NIST 800-77 Rev. 1</strong></p>
</td>
<td>
<p><strong>Guide to IPSec VPNs, June 2020</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td><a title="Guide to IPsec VPNs" rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-77/rev-1/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-77/rev-1/final</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Mode of operation"><paragraph
    title="17.8.10.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>The tunnel mode of operation provides full encapsulation of IP packets whilst the transport mode of operation only encapsulates the payload of the IP packet.</p>]]></paragraph>
<paragraph
    title="17.8.10.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2842"
><![CDATA[<p>Agencies SHOULD use tunnel mode for IPSec connections.</p>]]></paragraph>
<paragraph
    title="17.8.10.C.02."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2843"
><![CDATA[<p>Agencies choosing to use transport mode SHOULD additionally use an IP tunnel for IPSec connections.</p>]]></paragraph>
</block>
<block title="Protocol"><paragraph
    title="17.8.11.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>In order to provide a secure VPN style connection both authentication and encryption are needed.  ESP is the only way of providing encryption yet Authentication Header (AH) and ESP can provide authentication for the entire IP packet and the payload respectively.  ESP is generally preferred for authentication though as AH has inherent network address translation limitations.</p>]]></paragraph>
<paragraph
    title="17.8.11.R.02."

    tags="Cryptography,Technical"


><![CDATA[<p>If however, maximum security is desired at the expense of network address translation functionality, then ESP can be wrapped inside of AH which will then authenticate the entire IP packet and not just the encrypted payload.</p>]]></paragraph>
<paragraph
    title="17.8.11.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2847"
><![CDATA[<p>Agencies SHOULD use the ESP protocol for IPSec connections.</p>]]></paragraph>
</block>
<block title="ISAKMP modes"><paragraph
    title="17.8.12.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>Using main mode instead of aggressive mode provides greater security since all exchanges are protected.</p>]]></paragraph>
<paragraph
    title="17.8.12.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2850"
><![CDATA[<p>Agencies using ISAKMP SHOULD disable aggressive mode for IKE.</p>]]></paragraph>
</block>
<block title="Security association lifetimes"><paragraph
    title="17.8.13.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>Using a secure association lifetime of four hours or 14400 seconds provides a balance between security and usability.</p>]]></paragraph>
<paragraph
    title="17.8.13.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2853"
><![CDATA[<p>Agencies SHOULD use a security association lifetime of four hours or 14400 seconds, or less.</p>]]></paragraph>
</block>
<block title="HMAC algorithms"><paragraph
    title="17.8.14.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>MD5 and SHA-1 are no longer approved Cryptographic Protocols.  The approved algorithms that can be used with HMAC are HMAC-SHA256, HMAC-SHA384 and HMAC-SHA512.</p>]]></paragraph>
<paragraph
    title="17.8.14.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2856"
><![CDATA[<p>Agencies SHOULD use HMAC-SHA256, HMAC-SHA384 or HMAC-SHA512 as the HMAC algorithm.</p>]]></paragraph>
</block>
<block title="DH groups"><paragraph
    title="17.8.15.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>Using a larger DH group provides more entropy for the key exchange.</p>]]></paragraph>
<paragraph
    title="17.8.15.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2859"
><![CDATA[<p>Agencies SHOULD use the largest modulus size available for the DH exchange.</p>]]></paragraph>
</block>
<block title="Perfect Forward Secrecy"><paragraph
    title="17.8.16.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>Using Perfect Forward Secrecy reduces the impact of the compromise of a security association.</p>]]></paragraph>
<paragraph
    title="17.8.16.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2862"
><![CDATA[<p>Agencies SHOULD use Perfect Forward Secrecy for IPSec connections.</p>]]></paragraph>
</block>
<block title="IKE Extended Authentication"><paragraph
    title="17.8.17.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>XAUTH using IKEv1 has documented vulnerabilities associated with its use.</p>]]></paragraph>
<paragraph
    title="17.8.17.C.01."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2865"
><![CDATA[<p>Agencies SHOULD disable the use of XAUTH for IPSec connections using IKEv1.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="17.9. Key Management"><subsection title="Objective"><paragraph
    title="17.9.1."


><![CDATA[<p>Cryptographic keying material is protected by key management procedures.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="17.9.2."


><![CDATA[<p>This section covers information relating to the general management of cryptographic system material. Detailed key management guidance is not provided in this manual as there is a wide variety of cryptographic systems and technologies available, and there are varied security risks for each.</p>]]></paragraph>
<paragraph
    title="17.9.3."


><![CDATA[<p>If High Assurance Cryptographic Equipment is being used agencies are required to comply with the NZCSI standards. This is outside of the scope of this section.</p>]]></paragraph>
<paragraph
    title="17.9.4."


><![CDATA[<p>In a cloud environment, options for the management of cryptographic keys include on premises key generation and outsourcing the control of cryptographic keys to a cloud service provider.</p>]]></paragraph>
<paragraph
    title="17.9.5."


><![CDATA[<p>A number of key management offerings, such as Hold Your Own Keys (HYOK), Bring Your Own Keys (BYOK), and Control Your Own Keys (CYOK), are available. However, the implementation and role designations often vary widely. As such, a single agreed definition of each may not always be practical or helpful when considering which key management option is most suited to an agency’s requirements.</p>]]></paragraph>
<paragraph
    title="17.9.6."


><![CDATA[<p>When considering key management options agencies need to consider the ownership, control, and possession aspects relating to cryptographic keys, and how these may impact security and business outcomes.</p>]]></paragraph>
</block>
<block title="Applicability for cryptographic systems"><paragraph
    title="17.9.7."


><![CDATA[<p>In general, the requirements specified in the NZISM apply equally to cryptographic systems. &nbsp;Where the requirements for cryptographic systems are different, the variations are contained in this section, and take precedence over requirements specified elsewhere in the NZISM.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="17.9.8."


><![CDATA[<p>Encryption is an unparalleled technology for the protection of information, but it relies on the strength of the algorithm, the strength of the key and, most importantly, strong key management.</p>]]></paragraph>
<paragraph
    title="17.9.9."


><![CDATA[<p>All encryption has four important characteristics:</p>
<ul>
<li>the value of the data to be protected and the level of protection required to protect it,</li>
<li>the algorithm used to encrypt the data,</li>
<li>the protocol used to apply the algorithm, and</li>
<li>the encryption key.</li>
</ul>]]></paragraph>
<paragraph
    title="17.9.10."


><![CDATA[<p>In almost all cases the algorithm is in the public domain and is not a secret. &nbsp;When an encryption algorithm is publicly available, security rests entirely on the secrecy of the encryption key. &nbsp;It is also true that the effectiveness of most encryption systems depends on the secrecy of the encryption key. &nbsp;Approved Cryptographic Algorithms are described in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">Section 17.2</a>. and Approved Cryptographic Protocols (applying the algorithms) are described in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">Section 17.3</a>. &nbsp;These sections also specify key strengths to resist attempts to compromise the key through cryptanalysis.</p>]]></paragraph>
<paragraph
    title="17.9.11."


><![CDATA[<p>While any algorithm can, theoretically, be broken through cryptanalysis, this may require the use of vast computing power and other resources, making this approach infeasible. &nbsp;If, however, the encryption key is compromised, there is no need to attack the algorithm itself. &nbsp;Attacks on encryption systems will likely target the weakest point, most frequently these are the safeguards that are used to protection the key. &nbsp;Attempts to compromise keys and key management are more likely and more efficient than attacks on the algorithm itself. &nbsp;This is why strong key management is vital in order to protect the encryption key and keep the key secure and secret. &nbsp;When key management fails, cryptographic security is compromised.</p>]]></paragraph>
<paragraph
    title="17.9.12."


><![CDATA[<p>Almost all internet security protocols use cryptography for authentication, integrity, confidentiality, and non-repudiation. It is vital that good key management is implemented if these security protocols are to be protected, considered reliable, and provide required levels of assurance to organisations and users.</p>]]></paragraph>
<paragraph
    title="17.9.13."


><![CDATA[<p>In some cases, trusted third-party key management service providers furnish assistance to agencies in the generation, storage, operation, management, and retirement of keys associated with the agency.</p>]]></paragraph>
</block>
<block title="Key management"><paragraph
    title="17.9.14."


><![CDATA[<p>For encryption to be used effectively, the encryption keys must be managed and protected with the same care and security as the data originally encrypted, as long as the same key is being used to decrypt or recover data.&nbsp;</p>]]></paragraph>
<paragraph
    title="17.9.15."


><![CDATA[<p>Key management encompasses the operations and tasks necessary to create, protect, and control the use of cryptographic keys. &nbsp;The process from creation to destruction of the encryption key is described as the key management life cycle.</p>]]></paragraph>
</block>
<block title="Key management life cycle"><paragraph
    title="17.9.16."


><![CDATA[<p>The key management lifecycle covers:</p>
<ul>
<li>key generation,</li>
<li>key registration,</li>
<li>secure key storage,</li>
<li>key distribution and installation,</li>
<li>key use,</li>
<li>key rotation,</li>
<li>key backup (operational, backup and archive),</li>
<li>key replacement and reissue,</li>
<li>key recovery,</li>
<li>key revocation,</li>
<li>key suspension,&nbsp;</li>
<li>key retirement, and</li>
<li>key destruction.</li>
</ul>]]></paragraph>
</block>
<block title="Open networks"><paragraph
    title="17.9.17."


><![CDATA[<p>Open networks, by definition, seek to establish arbitrary connections without there necessarily being a pre-existing relationship. &nbsp;Protocols have been developed to manage this requirement through key exchange protocols and through trusted agents, most often a National Authority or Certificate Authority. &nbsp;Again it is important that approved protocols and algorithms, as specified in this document, are used. Refer to sections <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">17.2 Approved Cryptographic Algorithms</a> and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">17.3 Approved Cryptographic Protocols</a>.</p>]]></paragraph>
</block>
<block title="Public key infrastructure"><paragraph
    title="17.9.18."


><![CDATA[<p>Public key infrastructure (PKI) is the system used to create, issue, manage, and revoke digital certificates and their associated cryptographic keys. PKI has many different applications, and typically is used for encrypting and digitally signing data in order to authenticate and protect data in transmission, and supporting confidentiality and privacy.&nbsp; It is used extensively in ecommerce, internet banking, and secure email as well as being a key element in protecting website traffic.<strong><br></strong></p>]]></paragraph>
</block>
<block title="Outsourcing key management"><paragraph
    title="17.9.19."


><![CDATA[<p>The goal of key management, both for use within an organisation or in the cloud, is to enable data encryption by securing access to cryptographic keys. This includes using a combination of cryptography and secure hardware to generate keys securely, to manage access and destruction of keys.&nbsp;</p>]]></paragraph>
<paragraph
    title="17.9.20."


><![CDATA[<p>As stated previously, the ownership, control, and possession are three key aspects relevant to key management. Understanding the differences between them will assist evaluating different key managements that meet an agency’s requirements.&nbsp;</p>]]></paragraph>
<paragraph
    title="17.9.21."


><![CDATA[<p>For the purpose of this section these are defined as follows:&nbsp;</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td>Ownership</td>
<td>
<p>Specifies to whom the cryptographic keys belong. This is usually the custodian. Ownership of the key applies to the owner of the encrypted data, the owner of the encryption and/or decryption process, and the owner of the key infrastructure.</p>
</td>
</tr>
<tr>
<td style="width: 6.14364%;">Control&nbsp;</td>
<td style="width: 63.3271%;" width="304">
<p>Specifies who carries out key management lifecycle tasks, including having the option of precluding others from doing these tasks.</p>
</td>
</tr>
<tr>
<td style="width: 6.14364%;">Possession&nbsp;</td>
<td style="width: 63.3271%;" width="110">
<p>Specifies ownership of the infrastructure or location where the keys and encrypted data physically reside.</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="17.9.22."


><![CDATA[<p>The following diagram depicts the relationship between ownership, possession, and control aspects within the key management process, including the likely points within it, where the aspects would be positioned. Subsequent paragraphs expand on these concepts by applying them to specific scenarios.&nbsp;</p>
<p><img width="600" height="351" alt="" src="/assets/NZISM/17__ResizedImageWzYwMCwzNTFd.9.22-Key-Management-relationship.png" loading="lazy" class="center ss-htmleditorfield-file image">

</p>]]></paragraph>
</block>
<block title="Commonly used key management scenarios "><paragraph
    title="17.9.23."


><![CDATA[<p>Within industry a number of&nbsp;approaches are available to manage end users’ cryptographic keys. There are variations in how these may be defined, therefore an awareness around how role attribution is allocated within a provider’s own key management offering is an important consideration when deciding on a solution.&nbsp;</p>
<p><strong>Example 1:</strong> The provider generates, manages, and stores the encryption and decryption keys. This option may reduce the amount of overhead an agency outlays compared to if they maintain their own key infrastructure. However, if an agency changes providers this may present challenges around compatibility, as well as financial implications.&nbsp;</p>
<p><img width="436" height="265" alt="" src="/assets/NZISM/17.9.23-Key-Management-Example-1.png" loading="lazy" class="ss-htmleditorfield-file image">

</p>
<p><strong>Example 2:</strong> The customer generates and manages encryption keys, and the cloud provider can access the keys to encrypt and decrypt the customer’s data. This option may reduce the level of control an agency has over the confidentiality of their data. A key consideration for choosing this option is likely to be the sensitivity of the data to be stored.&nbsp;</p>
<p><img width="424" height="206" alt="" src="/assets/NZISM/17.9.23-Key-Management-Example-2.png" loading="lazy" class="center ss-htmleditorfield-file image">

</p>
<p><strong>Example 3:</strong> An Agency generates and manages encryption keys including its storage. Data encryption occurs prior to movement into a cloud environment. The provider does not have access to file content. This option may be more suitable for agencies that require greater security around sensitive data. The cloud environment is used for storing the customer’s encrypted data.&nbsp;</p>
<p><img width="434" height="177" alt="" src="/assets/NZISM/17.9.23-Key-Management-Example-3.png" loading="lazy" class="center ss-htmleditorfield-file image">

</p>]]></paragraph>
<paragraph
    title="17.9.24."


><![CDATA[<p>The following includes considerations that should form part of a technical evaluation when deciding on a key management solution.&nbsp;</p>
<ul>
<li>The value of data to be stored including protection requirements for that data.&nbsp;</li>
<li>Whether the key management solution can be integrated with other data storage services.&nbsp;</li>
<li>The number and types of keys required to secure data and whether a provider can meet these expectations.&nbsp;</li>
<li>Whether an externally generated key provides sufficient assurance than if the key was generated using on premises infrastructure.&nbsp;</li>
<li>Whether keys can be automatically rotated.&nbsp;</li>
<li>The level of investment, resourcing, and technology required to support and maintain a key management infrastructure.&nbsp;</li>
<li>Whether a provider’s key revocation process adequately meets agencies’ expectations around the removal of access to data.&nbsp;</li>
</ul>]]></paragraph>
</block>
<block title="Risks"><paragraph
    title="17.9.25."


><![CDATA[<p>There are a number of specific risks related to the management of cryptographic keys. These include:</p>
<ul>
<li>Keys exposed to unauthorised persons or applications, potentially compromising the keys or data the encryption is protecting.</li>
<li>Lost or unrecoverable cryptographic keys.</li>
<li>Software based key management, which provides only limited protection.</li>
<li>Fragmented key management as new systems are introduced such as when changes occur to the physical custody of hardware outside of a trusted environment.&nbsp;</li>
<li>Poorly documented and understood key management processes and activities increasing the possibility of compromise and potentially increasing compliance costs.</li>
<li>Inadequate separation of duties within the ownership, control, and possession of keys, resulting in non-compatible duties being allocated to the same party, potentially resulting in unauthorised access of tenancy data.&nbsp;</li>
<li>Lack of interoperability if an agency’s key management infrastructure is not compatible with that offered by a cloud service provider.</li>
</ul>]]></paragraph>
<paragraph
    title="17.9.26."


><![CDATA[<p>Several factors should be understood and assessed conjointly to enable decisions on which key management option is most suitable for security and business requirements. These factors include:&nbsp;</p>
<ul>
<li>scenario,&nbsp;</li>
<li>consideration,&nbsp;</li>
<li>risk,&nbsp;</li>
<li>business and/or security priority, and&nbsp;</li>
<li>outsource aspect.&nbsp;</li>
</ul>]]></paragraph>
<paragraph
    title="17.9.27."


><![CDATA[<p>The following table provides an example of how the factors listed above can be considered collectively when undertaking a technical evaluation. It may also be useful when developing key or risk management plans. It is not intended to be definitive, but rather to assist agencies evaluate different key management options.&nbsp;</p>
<table width="0">
<tbody>
<tr>
<td width="136">
<p><strong>Scenario&nbsp;</strong></p>
</td>
<td width="145">
<p><strong>Consideration&nbsp;</strong></p>
</td>
<td width="137">
<p><strong>Risk&nbsp;</strong></p>
</td>
<td width="147">
<p><strong>Security and/or business priority&nbsp;</strong></p>
</td>
<td width="132">
<p><strong>Outsource aspect&nbsp;</strong></p>
</td>
</tr>
<tr>
<td width="136">
<p>Agency generated and management of encryption keys including its storage.&nbsp;</p>
</td>
<td width="145">
<p>Inadequate separation of duties within the ownership, control, and possession of keys, resulting in non-compatible duties being allocated to the same party, potentially resulting in unauthorised access of tenancy data.&nbsp;</p>
</td>
<td width="137">
<p>Keys exposed to unauthorised persons or applications, potentially compromising the keys or data the encryption is protecting.&nbsp;</p>
</td>
<td width="147">
<p>Sensitivity and value of the data. This is summarised by the classification of the data but may not always reflect the values of aggregation, cost of compliance breaches, or reputation damage from a breach.&nbsp;</p>
</td>
<td width="132">
<p>Control&nbsp;</p>
</td>
</tr>
<tr>
<td width="136">
<p>Agency generates the key, and it is migrated to a cloud where the provider can use the keys to perform encryption and decryption operations.&nbsp;</p>
</td>
<td width="145">
<p>Whether the key management solution can be integrated with other data storage services.&nbsp;</p>
</td>
<td width="137">
<p>Lack of interoperability if an agency’s key management infrastructure is not compatible with that offered by a cloud service provider.&nbsp;</p>
</td>
<td width="147">
<p>The variety of key types, data formats, algorithms, protocols, and sources.&nbsp;</p>
</td>
<td width="132">
<p>Possession&nbsp;</p>
</td>
</tr>
<tr>
<td width="136">
<p>Cloud provider generates, manages, and stores keys used to encrypt and decrypt data.&nbsp;</p>
</td>
<td width="145">
<p>Whether an externally generated key provides sufficient assurance than if the key was generated using on premises infrastructure.&nbsp;</p>
</td>
<td width="137">
<p>Poorly documented and understood key management processes and activities increasing the possibility of compromise and potentially increasing compliance costs.&nbsp;</p>
</td>
<td width="147">
<p>Sensitivity and value of the data. This is summarised by the classification of the data but may not always reflect the value of aggregation, cost of compliance, breaches, or reputation damage from a breach.&nbsp;</p>
</td>
<td width="132">
<p>Ownership&nbsp;</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Prioritisation"><paragraph
    title="17.9.28."


><![CDATA[<p>Prioritisation helps identify and manage requirements for the use and management of cryptography and key management systems. This will determine the extent and complexity of the key management programme. Important aspects to consider are:</p>
<ul>
<li>Sensitivity and value of the data. This is summarised by the classification of the data but may not always reflect the values of aggregation, cost of compliance breaches or reputation damage from a breach.</li>
<li>The volume of data and keys.</li>
<li>The variety of key types, data formats, algorithms, protocols and sources.</li>
<li>The speed and frequency of transactions, requirements for data access and availability.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="17.9.29."


><![CDATA[<p>Further information on key management can be found in the following references:</p>
<table class="table-main" style="width: 833px; height: 734px;">
<tbody>
<tr style="height: 17px;">
<td style="width: 212.262px; height: 17px;"><strong>Title</strong></td>
<td style="width: 111.1px; height: 17px;"><strong>Publisher</strong></td>
<td style="width: 490.837px; height: 17px;"><strong>Description and source</strong></td>
</tr>
<tr style="height: 109px;">
<td style="width: 212.262px; height: 109px;">Common key management system models for the cloud</td>
<td style="width: 111.1px; height: 109px;">
<p>CRYPTOMATHIC</p>
</td>
<td style="width: 490.837px; height: 109px;">
<p>Explains the four primary cloud KMS pattern combinations, and their suitability depending on an organisation’s requirements.</p>
<p><a href="https://www.cryptomathic.com/news-events/blog/common-key-management-system-models-for-the-cloud">Common Key Management System Models for the Cloud (cryptomathic.com)</a></p>
</td>
</tr>
<tr style="height: 114px;">
<td style="width: 212.262px; height: 114px;">
<p>Options for key management in the cloud</p>
</td>
<td style="text-align: center; width: 111.1px; height: 114px;">CSA</td>
<td style="width: 490.837px; height: 114px;">
<p>Provides guidance and description around different key management patterns.</p>
<a href="https://cloudsecurityalliance.org/blog/2022/03/24/ownership-control-and-possession-options-for-key-management-in-the-cloud/">https://cloudsecurityalliance.org/blog/2022/03/24/ownership-control-and-possession-options-for-key-management-in-the-cloud/</a></td>
</tr>
<tr style="height: 96px;">
<td style="width: 212.262px; height: 96px;">Choosing and configuring a KMS for secure key management in the cloud</td>
<td style="width: 111.1px; height: 96px;">
<p class="text-center">NCSC/UK</p>
</td>
<td style="width: 490.837px; height: 96px;"><a title="Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle" rel="noopener noreferrer" href="https://www.iso.org/standard/39666.html" target="_blank"></a>
<p>How to choose, use, and configure cloud services safely and what security risks need to be considered.</p>
<a href="https://www.ncsc.gov.uk/collection/cloud/understanding-cloud-services/choosing-and-configuring-a-kms-for-secure-key-management-in-the-cloud">Choosing and configuring a KMS for secure key management... - NCSC.GOV.UK</a><a title="Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle" rel="noopener noreferrer" href="https://www.iso.org/standard/39666.html" target="_blank"></a></td>
</tr>
<tr style="height: 115px;">
<td style="width: 212.262px; height: 115px;">
<p>ISO/IEC 11770</p>
Information Technology – Security Techniques – Key Management</td>
<td style="text-align: center; width: 111.1px; height: 115px;">ISO / IEC</td>
<td style="width: 490.837px; height: 115px;"><a href="https://www.iso.org/standard/53456.html">ISO/IEC 11770-1:2010 - Information technology — Security techniques — Key management — Part 1: Framework</a></td>
</tr>
<tr style="height: 78px;">
<td style="width: 212.262px; height: 78px;">
<p>Guidelines for Cryptographic Key Management</p>
</td>
<td style="text-align: center; width: 111.1px; height: 78px;">
<p>IETF</p>
</td>
<td style="width: 490.837px; height: 78px;"><a href="https://datatracker.ietf.org/doc/rfc4107/">RFC 4107 - Guidelines for Cryptographic Key Management (ietf.org)</a></td>
</tr>
<tr style="height: 78px;">
<td style="width: 212.262px; height: 78px;">
<p>Key management and key establishment</p>
</td>
<td style="text-align: center; width: 111.1px; height: 78px;">
<p>NIST</p>
</td>
<td style="width: 490.837px; height: 78px;">
<p><a href="https://csrc.nist.gov/Projects/Key-Management/Key-Management-Guidelines">Key Management | CSRC (nist.gov)</a></p>
</td>
</tr>
<tr style="height: 95px;">
<td style="width: 212.262px; height: 95px;">
<p>Key management interoperability specification and profile</p>
</td>
<td style="text-align: center; width: 111.1px; height: 95px;">OASIS</td>
<td style="width: 490.837px; height: 95px;"><a href="https://www.oasis-open.org/2020/12/18/key-management-interoperability-protocol-specification-and-key-management-interoperability-protocol-profiles-oasis-standards-published/">Key Management Interoperability Protocol Specification and Key Management Interoperability Protocol Profiles OASIS Standards published - OASIS Open (oasis-open.org)</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Developing key management plans"><paragraph
    title="17.9.30.R.01."

    tags="Cryptography,Information Security Documentation,Technical,Key Management"


><![CDATA[<p>Most modern cryptographic systems are designed to be highly resistant to cryptographic analysis, and it should be assumed that a determined attacker could obtain details of the cryptographic logic. Cryptographic system material is safeguarded by implementing a key management plan (KMP) encompassing personnel, physical, and information security.</p>]]></paragraph>
<paragraph
    title="17.9.30.R.02."

    tags="Cryptography,Information Security Documentation,Technical,Key Management"


><![CDATA[<p>Depending on the security requirements of an agency, different key management models or combination of models may be adopted to allocate the ownership, control, and possession for keys. It should be noted that the greater the sharing model adopted the less control of keys an agency may have.</p>]]></paragraph>
<paragraph
    title="17.9.30.C.01."

    tags="Cryptography,Information Security Documentation,Technical,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3016"
><![CDATA[<p>Agencies SHOULD assess the risks associated around key ownership, possession, and control against their own security and business requirements.</p>]]></paragraph>
<paragraph
    title="17.9.30.C.02."

    tags="Cryptography,Information Security Documentation,Technical,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3018"
><![CDATA[<p>Agencies SHOULD develop a KMP when they have implemented a cryptographic system using commercial grade cryptographic equipment.</p>]]></paragraph>
<paragraph
    title="17.9.30.C.03."

    tags="Cryptography,Information Security Documentation,Technical,Key Management"


    classification="All Classifications"
    compliance="Must"
    cid="3017"
><![CDATA[<p>The level of detail included in a KMP MUST be consistent with the criticality and classification of the information to be protected.</p>]]></paragraph>
</block>
<block title="Contents of key management plans"><paragraph
    title="17.9.31.R.01."

    tags="Cryptography,Information Security Documentation,Technical,Key Management"


><![CDATA[<p>When agencies implement the recommended contents for KMPs they will have a good starting point for the protection of cryptographic systems and their material within their agencies.</p>]]></paragraph>
<paragraph
    title="17.9.31.C.01."

    tags="Cryptography,Information Security Documentation,Technical,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3021"
><![CDATA[<p>The table below describes the minimum contents which SHOULD be documented in the KMP.</p>
<table class="table-main">
<tbody>
<tr>
<td>Topic&nbsp;</td>
<td>&nbsp;Content</td>
</tr>
<tr>
<td>Objectives</td>
<td>
<ul>
<li>Objectives of the cryptographic system and KMP, including organisational aims.</li>
<li>Refer to relevant NZCSIs.</li>
</ul>
</td>
</tr>
<tr>
<td>System description</td>
<td>
<ul>
<li>The environment.</li>
<li>Maximum classification of information protected.</li>
<li>Topology diagram(s) and description of the cryptographic system topology including data flows.</li>
<li>The use of keys.</li>
<li>Key algorithm.</li>
<li>Key length.</li>
<li>Key lifetime.</li>
</ul>
</td>
</tr>
<tr>
<td>
<p>Roles and administrative responsibilities</p>
</td>
<td>
<ul>
<li>Documents roles and responsibilities, including, if relevant, the COMSEC custodian, cryptographic systems administrator, record keeper, cloud service provider, and auditor.</li>
</ul>
</td>
</tr>
<tr>
<td>Accounting</td>
<td>
<ul>
<li>How accounting will be undertaken for the cryptographic system.</li>
<li>What records will be maintained.</li>
<li>How records will be audited.</li>
</ul>
</td>
</tr>
<tr>
<td>Classification</td>
<td>
<ul>
<li>Classification of the cryptographic system hardware.</li>
<li>Classification of cryptographic system software.</li>
<li>Classification of the cryptographic system documentation.</li>
</ul>
</td>
</tr>
<tr>
<td>Information security incidents</td>
<td>
<ul>
<li>A description of the conditions under which compromise of key material should be declared.</li>
<li>References to procedures to be followed when reporting and dealing with information security incidents.</li>
</ul>
</td>
</tr>
<tr>
<td>
<p>Key management</p>
</td>
<td>
<ul>
<li>Who generates keys.</li>
<li>How keys are delivered.</li>
<li>How keys are received.</li>
<li>Key distribution, including local, remote and central.</li>
<li>How keys are installed.</li>
<li>How keys are transferred.</li>
<li>How keys are stored.</li>
<li>How keys are recovered.</li>
<li>How keys are revoked.</li>
<li>How keys are destroyed.</li>
<li>Each time key information or material is accessed, details are captured in logs.</li>
<li>Approved access lists to cryptographic keys.&nbsp;</li>
</ul>
</td>
</tr>
<tr>
<td>Maintenance</td>
<td>
<ul>
<li>Maintaining the cryptographic system software and hardware.</li>
<li>Destroying equipment and media.</li>
</ul>
</td>
</tr>
<tr>
<td>References</td>
<td>
<ul>
<li>Vendor documentation.</li>
<li>Related policies.</li>
</ul>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Accounting"><paragraph
    title="17.9.32.R.01."

    tags="Cryptography,Technical,Key Management"


><![CDATA[<p>As cryptographic equipment, and the keys they store, provide a significant security function for systems it is important that agencies are able to account for all cryptographic equipment.</p>]]></paragraph>
<paragraph
    title="17.9.32.C.01."

    tags="Cryptography,Technical,Key Management"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="3024"
><![CDATA[<p>Agencies MUST be able to readily account for all transactions relating to cryptographic system material including identifying hardware and all software versions issued with the equipment and materials, including date and place of issue.</p>]]></paragraph>
<paragraph
    title="17.9.32.C.02."

    tags="Cryptography,Technical,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3025"
><![CDATA[<p>Agencies SHOULD be able to readily account for all transactions relating to cryptographic system material including identifying hardware and all software versions issued with the equipment and materials, including date and place of issue.</p>]]></paragraph>
</block>
<block title="Audits, compliance and inventory checks"><paragraph
    title="17.9.33.R.01."

    tags="Cryptography,Technical,Key Management"


><![CDATA[<p>Cryptographic system audits are used as a process to account for cryptographic equipment.</p>]]></paragraph>
<paragraph
    title="17.9.33.C.01."

    tags="Cryptography,Technical,Key Management"


    classification="All Classifications"
    compliance="Must"
    cid="3028"
><![CDATA[<p>Agencies MUST conduct audits using two personnel with cryptographic system administrator access.</p>]]></paragraph>
<paragraph
    title="17.9.33.C.02."

    tags="Cryptography,Technical,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3029"
><![CDATA[<p>Agencies SHOULD conduct audits of cryptographic system material:</p>
<ul>
<li>on handover/takeover of administrative responsibility for the cryptographic system;</li>
<li>on change of personnel with access to the cryptographic system; and</li>
<li>at least annually.</li>
</ul>]]></paragraph>
<paragraph
    title="17.9.33.C.03."

    tags="Cryptography,Technical,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3030"
><![CDATA[<p>Agencies SHOULD perform audits to:</p>
<ul>
<li>account for all cryptographic system material; and</li>
<li>confirm that agreed security measures documented in the KMP are being followed.</li>
</ul>]]></paragraph>
</block>
<block title="Access register"><paragraph
    title="17.9.34.R.01."

    tags="Cryptography,Technical,Key Management"


><![CDATA[<p>Access registers can assist in documenting personnel that have privileged access to cryptographic systems along with previous accounting and audit activities for the system.</p>]]></paragraph>
<paragraph
    title="17.9.34.C.01."

    tags="Cryptography,Technical,Key Management"


    classification="All Classifications"
    compliance="Must"
    cid="3033"
><![CDATA[<p>Agencies MUST hold and maintain an access register that records cryptographic system information such as:</p>
<ul>
<li>details of personnel with system administrator access;</li>
<li>details of those whose system administrator access was withdrawn;</li>
<li>details of system documents;</li>
<li>accounting activities; and</li>
<li>audit activities.</li>
</ul>]]></paragraph>
</block>
<block title="Cryptographic system administrator access"><paragraph
    title="17.9.35.R.01."

    tags="Cryptography,Technical,Key Management"


><![CDATA[<p>The cryptographic system administrator is a highly privileged position which involves granting privileged access to a cryptographic system. &nbsp;Therefore extra precautions need to be put in place surrounding the security and vetting of the personnel as well as the access control procedures for individuals designated as cryptographic system administrators.</p>]]></paragraph>
<paragraph
    title="17.9.35.C.01."

    tags="Cryptography,Technical,Key Management"


    classification="All Classifications"
    compliance="Must"
    cid="3036"
><![CDATA[<p>Before personnel are granted cryptographic system administrator access, agencies MUST ensure that they have:</p>
<ul>
<li>a demonstrated need for access;</li>
<li>read and agreed to comply with the relevant Key Management Policy and Plan (KMP) for the cryptographic system they are using;</li>
<li>a security clearance at least equal to the highest classification of information processed by the cryptographic system;</li>
<li>agreed to protect the authentication information for the cryptographic system at the highest classification of information it secures;</li>
<li>agreed not to share authentication information for the cryptographic system without approval;</li>
<li>agreed to be responsible for all actions under their accounts;&nbsp;</li>
<li>agreed to report all potentially security related problems to the GCSB; and</li>
<li>ensure relevant staff have received appropriate training.</li>
</ul>]]></paragraph>
</block>
<block title="Area security and access control"><paragraph
    title="17.9.36.R.01."

    tags="Cryptography,Technical,Access Control,Key Management"


><![CDATA[<p>As cryptographic equipment contains particularly sensitive information additional physical security measures need to be applied to the equipment.</p>]]></paragraph>
<paragraph
    title="17.9.36.C.01."

    tags="Cryptography,Technical,Access Control,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3039"
><![CDATA[<p>Cryptographic system equipment SHOULD be stored in a room that meets the requirements for a server room of an appropriate level based on the classification of information the cryptographic system processes.</p>]]></paragraph>
<paragraph
    title="17.9.36.C.02."

    tags="Cryptography,Technical,Access Control,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3040"
><![CDATA[<p>Areas in which cryptographic system material is used SHOULD be separated from other areas and designated as a controlled cryptography area.</p>]]></paragraph>
</block>
<block title="High assurance cryptographic equipment"><paragraph
    title="17.9.37.R.01."

    tags="Cryptography,Technical,High Assurance Products,Key Management,HACE"


><![CDATA[<p>The NZCSI series of documents provide product specific policy for HACE.</p>]]></paragraph>
<paragraph
    title="17.9.37.C.01."

    tags="Cryptography,Technical,High Assurance Products,Key Management,HACE"


    classification="All Classifications"
    compliance="Must"
    cid="3043"
><![CDATA[<p>Agencies MUST comply with NZCSI when using HACE.</p>]]></paragraph>
</block>
<block title="Transporting commercial grade cryptographic equipment &amp; products"><paragraph
    title="17.9.38.R.01."

    tags="Cryptography,Technical,High Assurance Products,Key Management,HACE"


><![CDATA[<p>Transporting commercial grade cryptographic equipment in a keyed state exposes the equipment to the potential for interception and compromise of the key stored within the equipment.&nbsp; When commercial grade cryptographic equipment is transported in a keyed state it needs to be done so according to the requirements for the classification of the key stored in the equipment.</p>]]></paragraph>
<paragraph
    title="17.9.38.C.01."

    tags="Cryptography,Technical,High Assurance Products,Key Management,HACE"


    classification="All Classifications"
    compliance="Must"
    cid="3048"
><![CDATA[<p>Unkeyed commercial grade cryptographic equipment MUST be distributed and managed by a means approved for the transportation and management of government property.</p>]]></paragraph>
<paragraph
    title="17.9.38.C.02."

    tags="Cryptography,Technical,High Assurance Products,Key Management,HACE"


    classification="All Classifications"
    compliance="Must"
    cid="3050"
><![CDATA[<p>Keyed commercial grade cryptographic equipment MUST be distributed, managed and stored by a means approved for the transportation and management of government property based on the classification of the key within the equipment.</p>]]></paragraph>
<paragraph
    title="17.9.38.C.03."

    tags="Cryptography,Technical,High Assurance Products,Key Management,HACE"


    classification="All Classifications"
    compliance="Should Not"
    cid="3053"
><![CDATA[<p>Agencies SHOULD NOT transport commercial grade cryptographic equipment or products in a keyed state.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="17.10. Hardware Security Modules"><subsection title="Objective"><paragraph
    title="17.10.1."


><![CDATA[<p>Hardware Security Modules are used where additional security of cryptographic functions is desirable.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="17.10.2."


><![CDATA[<p>This section covers information relating to Hardware Security Modules (HSMs). &nbsp; &nbsp;Detailed key management guidance is provided in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16086">Section 17.9 – Key Management</a>.</p>]]></paragraph>
</block>
<block title="Hardware Security Module"><paragraph
    title="17.10.3."


><![CDATA[<p>Hardware Security Modules (HSMs) are defined as a hardware module or appliance which provides cryptographic functions.  HSM’s can be integrated into a design, installed in a host or be externally connected.  HSM’s can be packaged as discrete appliances, PCI cards, USB devices, smartcards or other form factors.</p>]]></paragraph>
<paragraph
    title="17.10.4."


><![CDATA[<p>Functions include (but are not limited to) encryption, decryption, key generation, signing, hashing and cryptographic acceleration.  The appliance usually also offers some level of physical tamper-resistance, has a user interface and a programmable interface for key management, configuration and firmware or software updates.</p>]]></paragraph>
</block>
<block title="Usage"><paragraph
    title="17.10.5."


><![CDATA[<p>HSMs are used in high assurance security solutions that satisfy widely established and emerging standards of due care for cryptographic systems and practices—while also maintaining high levels of operational efficiency.  Traditional use of HSMs is within automatic teller machines, electronic fund transfer, and point-of-sale networks.  HSMs are also used to secure CA keys in PKI deployments, SSL acceleration and DNSSEC (DNS Security Extensions) implementations.</p>]]></paragraph>
</block>
<block title="Physical Security"><paragraph
    title="17.10.6."


><![CDATA[<p>HSM’s usually describe an encapsulated multi-chip module, device, card or appliance, rather than a single chip component or device.  The nature of HSM’s requires more robust physical security, including tamper resistance, tamper evidence, tamper detection, and tamper response.</p>]]></paragraph>
</block>
<block title="Tamper Resistance"><paragraph
    title="17.10.7."


><![CDATA[<p>Tamper Resistance is designed to limit the ability to physically tamper with, break into or extract useful information from an HSM.  Often the boards and components are encased in an epoxy-like resin that will destroy any encapsulated components when drilled, scraped or otherwise physically tampered with.</p>]]></paragraph>
</block>
<block title="Tamper Evidence"><paragraph
    title="17.10.8."


><![CDATA[<p>The HSM is designed so that any attempts at tampering are evident.  Many devices use seals and labels designed break or reveal a special message when physical tampering is attempted.  Tamper evidence may require a regular inspection or audit mechanism.</p>]]></paragraph>
<paragraph
    title="17.10.9."


><![CDATA[<p>HSMs can include features that detect and report tampering attempts.  For example, embedding a conductive mesh within the epoxy-like package; internal circuitry monitored the electrical proper-ties of this mesh — properties which physical tamper would disrupt.  Devices can also monitor for temperature extremes, radiation extremes, light, air and other unusual conditions.</p>]]></paragraph>
</block>
<block title="Tamper Response"><paragraph
    title="17.10.10."


><![CDATA[<p>HSMs can include defensive features that activate when tampering is detected.  For example, cryptographic keys and sensitive data are deleted or zeroised.  A trade-off exists between availability and security as an effective tamper response essentially renders the HSM unusable.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="17.10.11."


><![CDATA[<p>Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Payment Card Industry (PCI) Hardware Security Module (HSM) - Security Requirements&nbsp;</strong></td>
<td style="text-align: center;">PCI</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://docs-prv.pcisecuritystandards.org/PTS/Standard/PCI_HSM_Security_Requirements_v4.pdf" target="_blank">Official PCI Security Standards Council Site - Document</a></p>
<p><a href="https://listings.pcisecuritystandards.org/documents/PTS_HSM_Technical_FAQs_v3_May_2018.pdf">PCI HSM Frequently Asked Questions (pcisecuritystandards.org)</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>FIPS PUB 140-2</strong></p>
</td>
<td>
<p><strong>FIPS PUB 140-2 Security Requirements for Cryptographic Modules</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="http://csrc.nist.gov/groups/STM/cmvp/standards.html" target="_blank"></a><a href="https://csrc.nist.gov/publications/detail/fips/140/2/final">FIPS 140-2, Security Requirements for Cryptographic Modules | CSRC (nist.gov)</a><a rel="noopener noreferrer" href="http://csrc.nist.gov/groups/STM/cmvp/standards.html" target="_blank"></a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Hardware Security Modules"><paragraph
    title="17.10.12.R.01."

    tags="Cryptography,Technical"


><![CDATA[<p>Where high assurance or high security is required or high volumes of data are encrypted or decrypted, the use of an HSM should be considered when designing the network and security architectures.</p>]]></paragraph>
<paragraph
    title="17.10.12.C.01."

    tags="Cryptography,Technical"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="3103"
><![CDATA[<p>Agencies MUST consider the use of HSMs when undertaking a security risk assessment or designing network and security architectures.</p>]]></paragraph>
<paragraph
    title="17.10.12.C.02."

    tags="Cryptography,Technical"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="3105"
><![CDATA[<p>Agencies MUST follow the product selection guidance in this manual. See <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>.</p>]]></paragraph>
<paragraph
    title="17.10.12.C.03."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3108"
><![CDATA[<p>Agencies SHOULD consider the use of HSMs when undertaking a security risk assessment or designing network and security architectures.</p>]]></paragraph>
<paragraph
    title="17.10.12.C.04."

    tags="Cryptography,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3110"
><![CDATA[<p>Agencies SHOULD follow the product selection guidance in this manual. See <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="18. Network security"><section title="18.1. Network Management"><subsection title="Objective"><paragraph
    title="18.1.1."


><![CDATA[<p>Any change to the configuration of networks is authorised and controlled through appropriate change management processes to ensure security, functionality and capability is maintained.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="18.1.2."


><![CDATA[<p>This section covers information relating to the selection, management and documentation of network infrastructure.</p>]]></paragraph>
</block>
<block title="Network diagrams"><paragraph
    title="18.1.3."


><![CDATA[<p>An agency’s network diagrams should illustrate all network devices including firewalls, IDSs, IPSs, routers, switches, hubs, etc.  It does not need to illustrate all IT equipment on the network, such as workstations or printers which can be collectively represented.  The inclusion of significant devices such as MFD’s and servers can aid interpretation.</p>]]></paragraph>
</block>
<block title="Systems Documentation"><paragraph
    title="18.1.4."


><![CDATA[<p>Knowledge of systems design, equipment and implementation is a primary objective of those seeking to attack or compromise systems or to steal information.  System documentation is a rich source allowing attackers to identify design weaknesses and vulnerabilities.  The security of systems documentation is therefore important in preserving the security of systems.</p>]]></paragraph>
<paragraph
    title="18.1.5."


><![CDATA[<p>Detailed network documentation and configuration details can contain information about IP addresses, port numbers, host names, services and protocols, software version numbers, patch status, security enforcing devices and information about information compartments and enclaves containing highly valuable information.  This information can be used by a malicious actor to compromise an agency’s network.</p>]]></paragraph>
<paragraph
    title="18.1.6."


><![CDATA[<p>This information may be particularly exposed when sent to offshore vendors, consultants and other service providers.  Encrypting this data will provide an important protective measure and assist in securing this data and information.</p>]]></paragraph>
<paragraph
    title="18.1.7."


><![CDATA[<p>Reference should also be made to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-14623">Section 12.7 – Supply Chain</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="18.1.8."


><![CDATA[<p class="NormS10C1b">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 110.59%;">
<tbody>
<tr>
<td style="width: 17.2905%;"><strong>Reference</strong></td>
<td style="width: 17.9192%;"><strong>Title</strong></td>
<td style="width: 64.7608%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 17.2905%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 17.9192%;">
<p>GOV5, GOV6, INFOSEC1, INFOSEC2, INFOSEC3 and INFOSEC4</p>
</td>
<td style="width: 64.7608%;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a><a title="PSR Mandatory Requirements - Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/information-security/mandatory-requirements-2/" target="_blank">/</a>&nbsp; &nbsp;</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Classification of Network Documentation"><paragraph
    title="18.1.9.R.01."

    tags="Information Security Documentation,Network Security,Technical"


><![CDATA[<p>To provide an appropriate level of protection to systems and network documentation, a number of security aspects should be considered. These include:</p><ul>
<li>the existence of the system;</li>
<li>the intended use;</li>
<li>the classification of the data to be carried or processed by this system;</li>
<li>the connectivity and agencies connected; </li>
<li>protection enhancements and modifications; and</li>
<li>the level of detail included in the documentation.</li>
</ul><p>High level conceptual diagrams and accompanying documentation should also be subject to these considerations</p>]]></paragraph>
<paragraph
    title="18.1.9.C.01."

    tags="Information Security Documentation,Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3170"
><![CDATA[<p>Agencies MUST perform a security risk assessment before providing network documentation to a third party, such as a commercial provider or contractor.</p>]]></paragraph>
<paragraph
    title="18.1.9.C.02."

    tags="Information Security Documentation,Network Security,Technical"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="3172"
><![CDATA[<p>Systems documentation and detailed network diagrams MUST be classified at least to the level of classification of the data to be carried on those systems.</p>]]></paragraph>
<paragraph
    title="18.1.9.C.03."

    tags="Information Security Documentation,Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3174"
><![CDATA[<p>Network documentation provided to a third party, such as to a commercial provider or contractor, MUST contain only the information necessary for them to undertake their contractual services and functions, consistent with the need-to-know principle.</p>]]></paragraph>
<paragraph
    title="18.1.9.C.04."

    tags="Information Security Documentation,Network Security,Technical"


    classification="All Classifications"
    compliance="Must Not"
    cid="3176"
><![CDATA[<p>Detailed network configuration information MUST NOT be published in tender documentation.</p>]]></paragraph>
<paragraph
    title="18.1.9.C.05."

    tags="Information Security Documentation,Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3179"
><![CDATA[<p>Security aspects SHOULD be considered when determining the classification level of systems and network documentation.</p>]]></paragraph>
</block>
<block title="Configuration management"><paragraph
    title="18.1.10.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>If the network is not centrally managed, there could be sections of the network that do not comply with the agency’s security policies, and thus create a vulnerability.</p>]]></paragraph>
<paragraph
    title="18.1.10.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>Changes should be authorised by a change management process, including representatives from all parties involved in the management of the network.  This process ensures that changes are understood by all parties and reduces the likelihood of an unexpected impact on the network.</p>]]></paragraph>
<paragraph
    title="18.1.10.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3188"
><![CDATA[<p>Agencies SHOULD keep the network configuration under the control of a network management authority.</p>]]></paragraph>
<paragraph
    title="18.1.10.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3190"
><![CDATA[<p>All changes to the configuration SHOULD be documented and approved through a formal change control process.</p>]]></paragraph>
<paragraph
    title="18.1.10.C.03."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3191"
><![CDATA[<p>Agencies SHOULD regularly review their network configuration to ensure that it conforms to the documented network configuration.</p>]]></paragraph>
<paragraph
    title="18.1.10.C.04."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3192"
><![CDATA[<p>Agencies SHOULD deploy an automated tool that compares the running configuration of network devices against the documented configuration.</p>]]></paragraph>
</block>
<block title="Network diagrams"><paragraph
    title="18.1.11.R.01."

    tags="Information Security Documentation,Network Security,Technical"


><![CDATA[<p>As most decisions are made on the documentation that illustrates the network, it is important that:</p><ul>
<li>a network diagram exists;</li>
<li>the security architecture is recorded;</li>
<li>the network diagram is an accurate depiction of the network; and</li>
<li>the network diagram indicates when it was last updated.</li>
</ul>]]></paragraph>
<paragraph
    title="18.1.11.C.01."

    tags="Information Security Documentation,Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3195"
><![CDATA[<p>For each network an agency manages they MUST have:</p><ul>
<li>a high-level diagram showing all connections and gateways into the network; and</li>
<li>a network diagram showing all communications equipment.</li>
</ul>]]></paragraph>
</block>
<block title="Updating network diagrams"><paragraph
    title="18.1.12.R.01."

    tags="Information Security Documentation,Network Security,Technical"


><![CDATA[<p>Because of the importance of the network diagram and decisions made based upon its contents, it should be updated as changes are made.  This will assist system administrators to completely understand and adequately protect the network.</p>]]></paragraph>
<paragraph
    title="18.1.12.C.01."

    tags="Information Security Documentation,Network Security,Technical"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3198"
><![CDATA[<p>An agency’s network diagrams MUST:</p><ul>
<li>be updated as network changes are made; and</li>
<li>include a ‘Current as at [date]’ statement on each page.</li>
</ul>]]></paragraph>
<paragraph
    title="18.1.12.C.02."

    tags="Information Security Documentation,Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3199"
><![CDATA[<p>An agency’s network diagrams SHOULD:</p><ul>
<li>be updated as network changes are made; and</li>
<li>include a ‘Current as at [date]’ statement on each page.</li>
</ul>]]></paragraph>
</block>
<block title="Limiting network access"><paragraph
    title="18.1.13.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>If an attacker has limited opportunities to connect to a given network, they have limited opportunities to attack that network.  Network access controls not only prevent against attackers traversing a network but also prevent system users carelessly connecting a network to another network of a different classification.  It is also useful in segregating sensitive or compartmented information for specific system users with a need-to-know.</p>]]></paragraph>
<paragraph
    title="18.1.13.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>Although circumventing some network access controls can be trivial, their use is primarily aimed at the protection they provide against accidental connection to another network.</p>]]></paragraph>
<paragraph
    title="18.1.13.R.03."

    tags="Network Security,Technical"


><![CDATA[<p>The design of a robust security architecture is fundamental to the security of a system.  This may include concepts such as trust zones, application of the principles of separation and segregation through, for example, segmented networks and VPNs and other design techniques.</p>]]></paragraph>
<paragraph
    title="18.1.13.C.01."

    tags="Network Security,Technical"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="3204"
><![CDATA[<p>Agencies MUST implement network access controls on all networks.</p>]]></paragraph>
<paragraph
    title="18.1.13.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3205"
><![CDATA[<p>Agencies SHOULD implement network access controls on all networks.</p>]]></paragraph>
</block>
<block title="Management traffic"><paragraph
    title="18.1.14.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Implementing protection measures specifically for management traffic provides another layer of defence on the network. This also makes it more difficult for an attacker to accurately define their target network.</p>]]></paragraph>
<paragraph
    title="18.1.14.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3208"
><![CDATA[<p>Agencies SHOULD implement protection measures to minimise the risk of unauthorised access to network management traffic on a network.</p>]]></paragraph>
</block>
<block title="Simple Network Management IT Protocol (SNMP)"><paragraph
    title="18.1.15.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>The Simple Network Management Protocol (SNMP) can be used to monitor the status of network devices such as switches, routers and wireless access points.  Early versions of SNMP were insecure. SNMPv3 uses stronger authentication methods but continues to establish default SNMP community strings and promiscuous access.  Encryption may be used as an additional assurance measure but this may create additional workload in investigating faults.  An assessment of risk, threats and the agency’s requirements may be required to determine an appropriate configuration.</p>]]></paragraph>
<paragraph
    title="18.1.15.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should Not"
    cid="3211"
><![CDATA[<p>Agencies SHOULD NOT use SNMP unless a specific requirement exists.</p>]]></paragraph>
<paragraph
    title="18.1.15.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3238"
><![CDATA[<p>Agencies SHOULD implement SNMPv3 where a specific SNMP requirement exists.</p>]]></paragraph>
<paragraph
    title="18.1.15.C.03."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3239"
><![CDATA[<p>Agencies SHOULD change all default community strings in SNMP implementations.</p>]]></paragraph>
<paragraph
    title="18.1.15.C.04."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3240"
><![CDATA[<p>SNMP access SHOULD be configured as read-only.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="18.2. Wireless Local Area Networks"><subsection title="Objective"><paragraph
    title="18.2.1."


><![CDATA[<p>Wireless local area networks are deployed in a secure manner that does not compromise the security of information and systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="18.2.2."


><![CDATA[<p>This section covers information on 802.11x WLANs. &nbsp;It does not cover other wireless communications. &nbsp;These communication methods are covered in <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13958">Chapter 11 - Communications Systems and Devices</a>. &nbsp;The description 802.11x refers to all versions and 802.11 standards.</p>
<table class="table-main">
<tbody>
<tr>
<td>Title</td>
<td>Publisher</td>
<td>Source</td>
</tr>
<tr>
<td>802.11 Wi-Fi</td>
<td>IEEE</td>
<td>Wireless LAN Media Access Control and Physical Layer specification. 802.11a,b,g,etc. are amendments to the original 802.11 standard. Products that implement 802.11 standards must pass tests and are referred to as "Wi-Fi certified”.</td>
</tr>
<tr>
<td>802.15 Wireless Personal Area Networks</td>
<td>IEEE</td>
<td>
<p>Communications specification that was approved in early 2002 by the IEEE for wireless personal area networks (WPANs and includes Bluetooth, Ultra Wideband, Zigbee and Mesh Networks.</p>
</td>
</tr>
<tr>
<td>
<p>802.16 Wireless Metropolitan Area Networks</p>
</td>
<td>IEEE</td>
<td>
<p>This family of standards covers Fixed and Mobile Broadband Wireless Access methods used to create Wireless Metropolitan Area Networks (WMANs.) Connects Base Stations to the Internet using OFDM in unlicensed (900 MHz, 2.4, 5.8 GHz) or licensed (700 MHz, 2.5 – 3.6 GHz) frequency bands. Products that implement 802.16 standards can undergo WiMAX certification testing.</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="18.2.3."


><![CDATA[<p>Hardware Security Modules (HSMs) are defined as a hardware module or appliance that provides cryptographic functions. These functions include (but are not limited to) encryption, decryption, key generation, and hashing. &nbsp;The appliance usually also offers some level of physical tamper-resistance and has a user interface and a programmable interface. &nbsp;Refer also to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16159">Section 17.10 – Hardware Security Modules</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="18.2.4."


><![CDATA[<p>Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td style="width: 79.225px;"><strong>Reference</strong></td>
<td style="width: 161.775px;"><strong>Title</strong></td>
<td style="text-align: center; width: 74.1375px;"><strong>Publisher</strong></td>
<td style="width: 371.237px;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 79.225px;">&nbsp;</td>
<td style="width: 161.775px;">
<p><strong>Implementing Network Segmentation and Segregation</strong></p>
</td>
<td style="text-align: center; width: 74.1375px;">
<p>ASD</p>
</td>
<td style="width: 371.237px;">
<p><a rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/network-hardening/implementing-network-segmentation-and-segregation" target="_blank">Implementing Network Segmentation and Segregation | Cyber.gov.au</a></p>
</td>
</tr>
<tr>
<td style="width: 79.225px;">&nbsp;</td>
<td style="width: 161.775px;">
<p><strong>Wi-Fi Alliance certification programs</strong></p>
</td>
<td style="text-align: center; width: 74.1375px;">
<p>Wi-Fi Alliance</p>
</td>
<td style="width: 371.237px;">
<p><a rel="noopener noreferrer" href="http://www.wi-fi.org/certification_programs.php" target="_blank">http://www.wi-fi.org/certification_programs.php</a></p>
</td>
</tr>
<tr>
<td style="width: 79.225px;">&nbsp;<strong>802.11</strong></td>
<td style="width: 161.775px;">
<p><strong>IEEE Standard for Information Technology - Telecommunications and Information Exchange between systems - Local and Metropolitan Area - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</strong></p>
</td>
<td style="text-align: center; width: 74.1375px;">
<p>IEEE</p>
</td>
<td style="width: 371.237px;">
<p><a rel="noopener noreferrer" href="http://standards.ieee.org/findstds/standard/802.11-2012.html" target="_blank">http://standards.ieee.org/findstds/standard/802.11-2012.html</a></p>
</td>
</tr>
<tr>
<td style="width: 79.225px;">
<p><strong>RFC 5247</strong></p>
</td>
<td style="width: 161.775px;">
<p><strong>EAP specification</strong></p>
</td>
<td style="text-align: center; width: 74.1375px;">
<p>IETF</p>
</td>
<td style="width: 371.237px;">
<p><a title="Extensible Authentication Protocol (EAP) Key Management Framework" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc5247" target="_blank">https://datatracker.ietf.org/doc/html/rfc5247</a></p>
</td>
</tr>
<tr>
<td style="width: 79.225px;">
<p><strong>RFC 5216</strong></p>
</td>
<td style="width: 161.775px;">
<p><strong>EAP-TLS specification</strong></p>
</td>
<td style="text-align: center; width: 74.1375px;">
<p>IETF</p>
</td>
<td style="width: 371.237px;">
<p><a title="The EAP-TLS Authentication Protocol" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc5216" target="_blank">https://datatracker.ietf.org/doc/html/rfc5216</a></p>
</td>
</tr>
<tr>
<td style="width: 79.225px;">
<p><strong>RFC 5281</strong></p>
</td>
<td style="width: 161.775px;">
<p><strong>EAP-TTLS specification</strong></p>
</td>
<td style="text-align: center; width: 74.1375px;">IETF</td>
<td style="width: 371.237px;">
<p><a title="EAP-TTLSv0" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc5281" target="_blank">https://datatracker.ietf.org/doc/html/rfc5281</a></p>
</td>
</tr>
<tr>
<td style="width: 79.225px;">&nbsp;</td>
<td style="width: 161.775px;">
<p><strong>Payment Card Industry (PCI) Hardware Security Module (HSM) - Security Requirements</strong></p>
</td>
<td style="text-align: center; width: 74.1375px;">
<p>PCI</p>
</td>
<td style="width: 371.237px;">
<p><a rel="noopener noreferrer" href="https://docs-prv.pcisecuritystandards.org/PTS/Standard/PCI_HSM_Security_Requirements_v4.pdf" target="_blank">Official PCI Security Standards Council Site - Document</a></p>
<p><a rel="noopener noreferrer" href="https://www.pcisecuritystandards.org/documents/PCI%20HSM%20Security%20Requirements%20v1.0%20final.pdf" target="_blank"></a><a rel="noopener noreferrer" href="https://listings.pcisecuritystandards.org/documents/PTS_HSM_Technical_FAQs_v3_May_2018.pdf" target="_blank">PCI HSM Frequently Asked Questions (pcisecuritystandards.org)</a><a rel="noopener noreferrer" href="https://www.pcisecuritystandards.org/documents/PCI%20HSM%20Security%20Requirements%20v1.0%20final.pdf" target="_blank"></a></p>
</td>
</tr>
<tr>
<td style="width: 79.225px;">
<p><strong>FIPS PUB 140-2</strong></p>
</td>
<td style="width: 161.775px;">
<p><strong>FIPS PUB 140-2 - Security Requirements for Cryptographic Modules</strong></p>
</td>
<td style="text-align: center; width: 74.1375px;">
<p>NIST</p>
</td>
<td style="width: 371.237px;">
<p><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/fips/140/2/final" target="_blank">FIPS 140-2, Security Requirements for Cryptographic Modules | CSRC (nist.gov)</a></p>
</td>
</tr>
<tr>
<td style="width: 79.225px;">&nbsp;</td>
<td style="width: 161.775px;">
<p><strong>Extensible Authentication Protocol</strong></p>
</td>
<td style="text-align: center; width: 74.1375px;">
<p>Microsoft</p>
</td>
<td style="width: 371.237px;">
<p><a rel="noopener noreferrer" href="https://technet.microsoft.com/en-us/network/bb643147.aspx" target="_blank">https://technet.microsoft.com/en-us/network/bb643147.aspx</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Bridging networks"><paragraph
    title="18.2.5.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>When connecting devices via Ethernet to an agency’s fixed network, agencies need to be aware of the risks posed by active wireless functionality.  Devices may automatically connect to any open wireless networks they have previously connected to, which a malicious actor can use to masquerade and establish a connection to the device.  This compromised device could then be used as a bridge to access the agency’s fixed network.  Disabling wireless functionality on devices, preferably by a hardware switch, whenever connected to a fixed network can prevent this from occurring.  Additionally, devices do not have to be configured to remember and automatically connect to open wireless networks that they have previously connected to.</p>]]></paragraph>
<paragraph
    title="18.2.5.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must Not"
    cid="3274"
><![CDATA[<p>Devices MUST NOT be configured to remember and automatically connect to any wireless networks that they have previously connected to.</p>]]></paragraph>
<paragraph
    title="18.2.5.C.02."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3282"
><![CDATA[<p>Wireless auto-connect functionality on devices SHOULD be disabled, preferably by a hardware switch, whenever connected to a fixed network.</p>]]></paragraph>
</block>
<block title="Providing wireless communications for public access"><paragraph
    title="18.2.6.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>To ensure that a wireless network provided for public access cannot be used as a launching platform for attacks against an agency’s system it MUST be <strong>separated</strong> from all other systems.  Security architectures incorporating segmented networks, DMZ’s and other segregation mechanisms are useful in this regard.</p>]]></paragraph>
<paragraph
    title="18.2.6.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must"
    cid="3290"
><![CDATA[<p>Agencies deploying a wireless network for public access MUST <strong>separate</strong> it from any other agency networks; including BYOD networks.</p>]]></paragraph>
</block>
<block title="Using wireless communications"><paragraph
    title="18.2.7.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>As the Accreditation Authority for TOP SECRET systems, GCSB has mandated that all agencies considering deploying a wireless TOP SECRET deployment seek approval from GCSB prior to initiating any networking projects.</p>]]></paragraph>
<paragraph
    title="18.2.7.C.01."

    tags="Network Security,Technical,WLANs"


    classification="Top Secret"
    compliance="Must Not"
    cid="3298"
><![CDATA[<p>Agencies MUST NOT use wireless networks unless the security of the agency’s wireless deployment has been approved by GCSB.</p>]]></paragraph>
</block>
<block title="Selecting wireless access point equipment"><paragraph
    title="18.2.8.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>Wireless access points that have been certified in a Wi-Fi Alliance certification program provide an agency with assurance that they conform to wireless standards.  Deploying wireless access points that are guaranteed to be interoperable with other wireless access points on a wireless network will limit incompatibility of wireless equipment and incorrect implementation of wireless devices by vendors.</p>]]></paragraph>
<paragraph
    title="18.2.8.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must"
    cid="3302"
><![CDATA[<p>All wireless access points used for government wireless networks MUST be Wi-Fi Alliance certified.</p>]]></paragraph>
</block>
<block title="802.1X Authentication"><paragraph
    title="18.2.9.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>A number of Extensible Authentication Protocol (EAP) methods, supported by the Wi-Fi Protected Access 2 and 3 (WPA2, WPA3) protocols, are available.</p>]]></paragraph>
<paragraph
    title="18.2.9.R.02."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>Depending on the security requirements agencies deploying a secure wireless network can choose EAP-Transport Layer Security (EAP-TLS), EAP-Tunnelled Transport Layer Security (EAP-TTLS) or Protected EAP (PEAP) to perform mutual authentication.</p>
<p><strong>EAP-TLS</strong> is considered one of the most secure EAP methods. With its inclusion in the initial release of the WPA2 standard, it enjoys wide support in wireless access points and in numerous operating systems such as Microsoft Windows, Linux and Apple OS X. EAP-TLS uses a public key infrastructure (PKI) to secure communications between devices and a Remote Access Dial In User Service (RADIUS) server through the use of X.509 certificates. While EAP-TLS provides strong mutual authentication, it requires an agency to have established a PKI. This involves either deploying their own certificate authority and issuing certificates, or purchasing certificates from a commercial certificate authority, for every device that accesses the wireless network. This can introduce additional costs and management overheads but the risk and security management advantages are significant.</p>
<p>The<strong> EAP-TTLS/MSCHAPv2, or simply EAP-TTLS</strong>, method is generally supported through the use of third party software. It has support in multiple operating systems including current and supported versions of Microsoft Windows client and server editions. EAP-TTLS is different to EAP-TLS in that devices do not authenticate to the server when the initial TLS tunnel is created. Only the server authenticates to devices. Once the TLS tunnel has been created, mutual authentication occurs through the use of another EAP method.</p>
<p>An advantage of EAP-TTLS over PEAP is that a username is never transmitted in the clear outside of the TLS tunnel. Another advantage of EAP-TTLS is that it provides support for many legacy EAP methods, while PEAP is generally limited to the use of EAP-MSCHAPv2.</p>
<p><strong>PEAPv0/EAP-MSCHAPv2, or simply PEAP</strong>, is the second most widely supported EAP method after EAP-TLS. It enjoys wide support in wireless access points and in numerous operating systems such as Microsoft Windows, Linux and Apple OS X. PEAP operates in a very similar way to EAP-TTLS by creating a TLS tunnel which is used to protect another EAP method. PEAP differs from EAP-TTLS in that when the EAP-MSCHAPv2 method is used within the TLS tunnel, only the password portion is protected and not the username. This may allow an intruder to capture the username and replay it with a bogus password in order to lockout the user’s account, causing a denial of service for that user. While EAP-MSCHAPv2 within PEAP is the most common implementation, Microsoft Windows supports the use of EAP-TLS within PEAP, known as PEAP-EAP-TLS. This approach is very similar in operation to traditional EAP-TLS yet provides increased protection, as parts of the certificate that are not encrypted with EAP-TLS are encrypted with PEAP-EAP-TLS. The downside to PEAP-EAP-TLS is its support is limited to Microsoft products.</p>]]></paragraph>
<paragraph
    title="18.2.9.R.03."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>Ultimately, an agency’s choice in authentication method will often be based on the size of their wireless deployment, their security requirements and any existing authentication infrastructure.  If an agency is primarily motivated by security they can implement either PEAP-EAP-TLS or EAP-TLS.  If they are primarily motivated by flexibility and legacy support they can implement EAP-TTLS.  If they are primarily motivated by simplicity they can implement PEAP with EAP-MSCHAPv2.</p>]]></paragraph>
<paragraph
    title="18.2.9.C.01."

    tags="Network Security,Technical,WLANs"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="7538"
><![CDATA[<p>EAP-TLS or PEAP-EAP-TLS MUST be used on wireless networks to perform mutual authentication.</p>]]></paragraph>
<paragraph
    title="18.2.9.C.02."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must"
    cid="3319"
><![CDATA[<p class="MsoNormal">EAP-TLS, PEAP-EAP-TLS, EAP-TTLS or PEAP MUST be used on wireless networks to perform mutual authentication.</p>]]></paragraph>
</block>
<block title="Evaluation of 802.1X authentication implementation"><paragraph
    title="18.2.10.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>The security of 802.1X authentication is dependent on three main elements and their interaction.  These three elements include supplicants (clients) that support the 802.1X authentication protocol, authenticators (wireless access points) that facilitate communication between supplicants and the authentication server, and the authentication server (RADIUS server) that is used for authentication, authorisation and accounting purposes.  To provide assurance that these elements have been implemented appropriately, supplicants, authenticators and the authentication server used in wireless networks must have completed an appropriate product evaluation.</p>]]></paragraph>
<paragraph
    title="18.2.10.C.01."

    tags="Network Security,Technical,WLANs"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3326"
><![CDATA[<p>Supplicants, authenticators and the authentication server used in wireless networks MUST have completed an appropriate product evaluation.</p>]]></paragraph>
<paragraph
    title="18.2.10.C.02."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3329"
><![CDATA[<p>Supplicants, authenticators and the authentication server used in wireless networks SHOULD have completed an appropriate product evaluation.</p>]]></paragraph>
</block>
<block title="Issuing certificates for authentication"><paragraph
    title="18.2.11.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>Certificates for authenticating to wireless networks can be issued to either or both devices and users.  For assurance, certificates must be generated using a certificate authority product or hardware security module (HSM) that has completed an appropriate product evaluation.</p>]]></paragraph>
<paragraph
    title="18.2.11.R.02."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>When issuing certificates to devices accessing wireless networks, agencies need to be aware of the risk that these certificates could be stolen by malicious software.  Once compromised, the certificate could be used on another device to gain unauthorised access to the wireless network.  Agencies also need to be aware that in only issuing a certificate to a device, any actions taken by a user will only be attributable to the device and not a specific user.</p>]]></paragraph>
<paragraph
    title="18.2.11.R.03."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>When issuing certificates to users accessing wireless networks, they can either be in the form of a certificate that is stored on a device or a certificate that is stored within a smart card. Issuing certificates on smart cards provides increased security, but usually at a higher cost. Security is improved because a user is more likely to notice a missing smart card and alert their local security team, who is then able to revoke the credentials on the RADIUS server. This can minimise the time an intruder has access to a wireless network.</p>]]></paragraph>
<paragraph
    title="18.2.11.R.04."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>In addition, to reduce the likelihood of a stolen smart card from being used to gain unauthorised access to a wireless network, two-factor authentication can be implemented through the use of Personal Identification Numbers (PINs) on smart cards.  This is essential when a smart card grants a user any form of administrative access on a wireless network or attached network resource.</p>]]></paragraph>
<paragraph
    title="18.2.11.R.05."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>For the highest level of security, unique certificates should be issued for both devices and users. In addition, the certificates for a device and user must not be stored on the same device. Finally, certificates for users accessing wireless networks should be issued on smart cards with access PINs and not stored with a device when not in use.</p>]]></paragraph>
<paragraph
    title="18.2.11.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must"
    cid="3343"
><![CDATA[<p>Agencies MUST generate certificates using a certificate authority product or hardware security module that has completed an appropriate product evaluation.</p>]]></paragraph>
<paragraph
    title="18.2.11.C.02."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must Not"
    cid="3346"
><![CDATA[<p>The certificates for both a device and user accessing a wireless network MUST NOT be stored on the same device.</p>]]></paragraph>
<paragraph
    title="18.2.11.C.03."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3348"
><![CDATA[<p>Agencies SHOULD use unique certificates for both devices and users accessing a wireless network.</p>]]></paragraph>
<paragraph
    title="18.2.11.C.04."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3350"
><![CDATA[<p>Certificates for users accessing wireless networks SHOULD be issued on smart cards with access PINs and not stored with a device when not in use.</p>]]></paragraph>
<paragraph
    title="18.2.11.C.05."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3351"
><![CDATA[<p>Certificates stored on devices accessing wireless networks SHOULD be protected by implementing full disk encryption on the devices.</p>]]></paragraph>
</block>
<block title="Using commercial certification authorities for certificate generation"><paragraph
    title="18.2.12.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>A security risk exists with EAP-TTLS and PEAP when a commercial certificate authority’s certificates are automatically trusted by devices using vendor trusted certificate stores. This trust can be exploited by obtaining certificates from a commercial certificate authority under false pretences, as devices can be tricked into trusting their signed certificate. This will allow the capture of authentication credentials presented by devices, which in the case of EAP-MSCHAPv2 can be cracked using a brute force attack granting not only network access but most likely Active Directory credentials as well.<br>To reduce this risk, devices can be configured to:</p><ul>
<li>validate the server certificate;</li>
<li>disable any trust for certificates generated by commercial certificate authorities that are not trusted;</li>
<li>disable the ability to prompt users to authorise net servers or commercial certificate authorities; and</li>
<li>set devices to enable identity privacy to prevent usernames being sent prior to being authenticated by the RADIUS server.</li>
</ul>]]></paragraph>
<paragraph
    title="18.2.12.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must"
    cid="3354"
><![CDATA[<p>Devices MUST be configured to validate the server certificate, disable any trust for certificates generated by commercial certificate authorities that are not trusted and disable the ability to prompt users to authorise new servers or commercial certification authorities.</p>]]></paragraph>
<paragraph
    title="18.2.12.C.02."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3355"
><![CDATA[<p>Devices SHOULD be set to enable identity privacy.</p>]]></paragraph>
</block>
<block title="Caching 802.1X authentication outcomes"><paragraph
    title="18.2.13.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>When 802.1X authentication is used, a shared secret key known as the Pairwise Master Key (PMK) is generated.  Upon successful authentication of a device, the PMK can be cached to assist with fast roaming between wireless access points.  When a device roams away from a wireless access point that it has authenticated to, it will not need to perform a full re-authentication should it roam back while the cached PMK remains valid.  To further assist with roaming, wireless access points can be configured to pre-authenticate a device to other neighbouring wireless access points that the device might roam to.  Although requiring full authentication for a device each time it roams between wireless access points is ideal, agencies can chose to use PMK caching and pre-authentication if they have a business requirement for fast roaming.  If PMK caching is used, the PMK caching period should not be set to greater than 1440 minutes (24 hours).</p>]]></paragraph>
<paragraph
    title="18.2.13.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should Not"
    cid="3358"
><![CDATA[<p>The PMK caching period SHOULD NOT be set to greater than 1440 minutes (24 hours).</p>]]></paragraph>
</block>
<block title="Remote Authentication Dial-In User Service (RADIUS) authentication"><paragraph
    title="18.2.14.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>The RADIUS authentication process that occurs between wireless access points and the RADIUS server is distinct and a separate to the 802.1X authentication process.  During the initial configuration of wireless networks using 802.1X authentication, a shared secret is entered into either the wireless access points or the RADIUS server.  If configured on the wireless access points, the shared secret is sent to the RADIUS server via the RADIUS protocol, and vice versa if configured on the RADIUS server.  This shared secret is used for both RADIUS authentication and confidentiality of RADIUS traffic.</p>]]></paragraph>
<paragraph
    title="18.2.14.R.02."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>An intruder that is able to gain access to the RADIUS traffic sent between wireless access points and the RADIUS server may be able to perform a brute force or an off-line dictionary attack to recover the shared secret. &nbsp;This in turn allows the intruder to decrypt all communications between wireless access points and the RADIUS server. &nbsp;To mitigate this security risk, communications between wireless access points and a RADIUS server must be encapsulated with an additional layer of encryption using an appropriate encryption product (See <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a>).</p>]]></paragraph>
<paragraph
    title="18.2.14.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must"
    cid="3362"
><![CDATA[<p>Communications between wireless access points and a RADIUS server MUST be encapsulated with an additional layer of encryption using an approved encryption product (See<a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745"> Chapter 17 – Cryptography</a>).</p>]]></paragraph>
</block>
<block title="Encryption"><paragraph
    title="18.2.15.R.01."

    tags="Encryption,Network Security,Technical,WLANs"


><![CDATA[<p>As wireless transmissions are capable of radiating outside of secure areas into unsecure areas they need to be encrypted to the same level as classified information communicated over cabled infrastructure in unsecure areas.</p>]]></paragraph>
<paragraph
    title="18.2.15.C.01."

    tags="Encryption,Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must"
    cid="3365"
><![CDATA[<p>Agencies using wireless networks MUST ensure that classified information is protected by cryptography that meets the assurance level mandated for the communication of information over unclassified network infrastructure (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">Section 17.2, Suite B</a>).</p>]]></paragraph>
</block>
<block title="Cipher Block Chaining Message Authentication Code Protocol (CCMP) Encryption"><paragraph
    title="18.2.16.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>As wireless transmissions are capable of radiating outside of secure areas, agencies cannot rely on the traditional approach of physical security to protect against unauthorised access to sensitive or classified information on wireless networks. Using the AES based Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) helps protect the confidentiality and integrity of all wireless network traffic.</p>]]></paragraph>
<paragraph
    title="18.2.16.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must"
    cid="3368"
><![CDATA[<p>CCMP MUST be used to protect the confidentiality and integrity of all wireless network traffic.</p>]]></paragraph>
</block>
<block title="Temporal Key Integrity Protocol (TKIP) and Wireless Encryption Protocol (WEP)"><paragraph
    title="18.2.17.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>CCMP was introduced in WPA2 to address feasible attacks against the Temporal Integrity Key Protocol (TKIP) used by the Wi-Fi Protected Access (WPA) protocol as well as the original Wireless Encryption Protocol (WEP).  A malicious actor seeking to exploit vulnerabilities in TKIP and WEP can attempt to connect to wireless access points using one of these protocols.  By default, wireless access points will attempt to accommodate this request by falling back to a legacy protocol that the device supports.  Disabling or removing TKIP and WEP support from wireless access points ensures that wireless access points do not fall back to an insecure encryption protocol.</p>]]></paragraph>
<paragraph
    title="18.2.17.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must"
    cid="3373"
><![CDATA[<p>TKIP and WEP support MUST be disabled or removed from wireless access points.</p>]]></paragraph>
</block>
<block title="Wired Equivalent Privacy (WEP)"><paragraph
    title="18.2.18.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>WEP has serious flaws which allow it to be trivially compromised.  A WEP network should be considered equivalent to an unprotected network.</p>]]></paragraph>
<paragraph
    title="18.2.18.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must Not"
    cid="3379"
><![CDATA[<p>Agencies MUST NOT use WEP for wireless deployments.</p>]]></paragraph>
</block>
<block title="Wi-Fi Protected Access (WPA)"><paragraph
    title="18.2.19.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>As wireless networks are often capable of being accessed from outside the perimeter of secured spaces, all wireless network traffic requires suitable cryptographic protection. For this purpose, it is recommended that Wi-Fi Protected Access 3 (WPA3) be used as it provides equivalent or greater security than its predecessor Wi-Fi Protected Access 2 (WPA2).</p>
<p>WPA3 has also prohibited the use of various outdated and insecure cipher suites. WPA3-Enterprise supports three enterprise modes of operation: enterprise only mode, transition mode and 192-bit mode. Preference is given to WPA3-Enterprise 192-bit mode as this mode ensures no algorithms with known weaknesses are used.</p>]]></paragraph>
<paragraph
    title="18.2.19.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must Not"
    cid="7539"
><![CDATA[<p>Agencies MUST NOT use Wi-Fi Protected Access (WPA) for wireless deployments.</p>]]></paragraph>
<paragraph
    title="18.2.19.C.02."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should Not"
    cid="3386"
><![CDATA[<p>Agencies SHOULD NOT use Wi-Fi Protected Access 2 (WPA2) for wireless deployments.</p>]]></paragraph>
<paragraph
    title="18.2.19.C.03."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="7540"
><![CDATA[<p>Agencies SHOULD use Wi-Fi Protected Access 3 (WPA3) for wireless deployments with preference given to WPA3-Enterprise 192-bit mode.</p>]]></paragraph>
</block>
<block title="Pre-shared keys"><paragraph
    title="18.2.20.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>The use of pre-shared keys is poor practice and not recommended for wireless authentication, in common with many authentication and encryption mechanisms, the greater the length of pre-shared keys the greater the security they provide.</p>]]></paragraph>
<paragraph
    title="18.2.20.C.01."

    tags="Network Security,Technical,WLANs"


    classification="Confidential, Secret, Top Secret"
    compliance="Must Not"
    cid="3391"
><![CDATA[<p>Agencies MUST NOT use pre-shared keys for wireless authentication.</p>]]></paragraph>
<paragraph
    title="18.2.20.C.02."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3392"
><![CDATA[<p>If pre-shared keys are used, agencies SHOULD use random keys of the maximum allowable length.</p>]]></paragraph>
<paragraph
    title="18.2.20.C.03."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should Not"
    cid="3393"
><![CDATA[<p>Agencies SHOULD NOT use pre-shared keys for wireless authentication.</p>]]></paragraph>
</block>
<block title="Administrative interfaces for wireless access points"><paragraph
    title="18.2.21.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>Administrative interfaces may allow users to modify the configuration and security settings of wireless access points.  Often wireless access points by default allow users to access the administrative interface over methods such as fixed network connections, wireless network connections and serial connections directly on the device.  Disabling the administrative interface on wireless access points will prevent unauthorised connections.</p>]]></paragraph>
<paragraph
    title="18.2.21.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3397"
><![CDATA[<p>Agencies SHOULD disable the administrative interface on wireless access points for wireless connections.</p>]]></paragraph>
</block>
<block title="Protecting management frames on wireless networks"><paragraph
    title="18.2.22.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>Effective DoS attacks can be performed on the 802.11 protocol by exploiting unprotected management frames using inexpensive commercial hardware. WPA2 provides no protection for management frames and therefore does not prevent spoofing or DoS attacks. Note, in WPA3 this feature is built into the standard.</p>]]></paragraph>
<paragraph
    title="18.2.22.R.02."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>The current release of the 802.11 standard provides no protection for management frames and therefore does not prevent spoofing or DoS attacks.</p>]]></paragraph>
<paragraph
    title="18.2.22.R.03."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>However, 802.11w was ratified in 2009 and specifically addresses the protection of management frames on wireless networks.  Wireless access points and devices should be upgraded to support the 802.11w amendment or any later amendment or version that includes a capability for the protection of management frames.</p>]]></paragraph>
<paragraph
    title="18.2.22.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3408"
><![CDATA[<p>Wireless access points and devices SHOULD be upgraded to support a minimum of the 802.11w amendment.</p>]]></paragraph>
</block>
<block title="Default service set identifiers (SSIDs)"><paragraph
    title="18.2.23.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>All wireless access points are configured with a default Service Set Identifier (SSID).  The SSID is commonly used to identify the name of a wireless network to users.  As the default SSIDs of wireless access points are well documented on online forums, along with default accounts and passwords, it is important to change the default SSID and default passwords of wireless access points.</p>]]></paragraph>
<paragraph
    title="18.2.23.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must"
    cid="3416"
><![CDATA[<p>Agencies MUST change the default SSID of wireless access points.</p>]]></paragraph>
<paragraph
    title="18.2.23.C.02."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must"
    cid="3418"
><![CDATA[<p>Agencies MUST rename or remove default accounts and passwords.</p>]]></paragraph>
</block>
<block title="Changing the SSID"><paragraph
    title="18.2.24.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>When changing the default SSID, it is important that it lowers the profile of an agency’s wireless network.  In doing so, the SSID of a wireless network should not be readily associated with an agency, the location of or within their premises, or the functionality of the network.</p>]]></paragraph>
<paragraph
    title="18.2.24.R.02."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>This procedure applies to all wireless network assets owned/or managed by the agency, including any guest or other publicly accessible networks.</p>]]></paragraph>
<paragraph
    title="18.2.24.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should Not"
    cid="3505"
><![CDATA[<p>The SSID of a wireless network SHOULD NOT be readily associated with an agency, the premises, location or the functionality of the network.</p>]]></paragraph>
</block>
<block title="SSID Broadcasting"><paragraph
    title="18.2.25.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>A common method to lower the profile of wireless networks is disabling SSID broadcasting.  While this ensures that the existence of wireless networks are not broadcast overtly using beacon frames, the SSID is still broadcast in probe requests, probe responses, association requests and re-association requests for the network.  Malicious actors can determine the SSID of wireless networks by capturing these requests and responses.  By disabling SSID broadcasting agencies will make it more difficult for legitimate users to connect to wireless networks as legacy operating systems have only limited support for hidden SSIDs.  Disabling SSID broadcasting infringes the design of the 802.11x standards.</p>]]></paragraph>
<paragraph
    title="18.2.25.R.02."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>A further risk exists where an intruder can configure a wireless access point to broadcast the same SSID as the hidden SSID used by a legitimate wireless network. In this scenario devices will automatically connect to the wireless access point that is broadcasting the SSID they are configured to use before probing for a wireless access point that accepts the hidden SSID. Once the device is connected to the intruder’s wireless access point the intruder can steal authentication credentials from the device to perform an adversary-in-the-middle attack to capture legitimate wireless network traffic or to later reuse to gain access to the legitimate wireless network.</p>]]></paragraph>
<paragraph
    title="18.2.25.R.03."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>Disabling SSID broadcasting is not considered to be an effective control and may introduce additional risks.</p>]]></paragraph>
<paragraph
    title="18.2.25.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should Not"
    cid="3514"
><![CDATA[<p>Agencies SHOULD NOT disable SSID broadcasting on wireless networks.</p>]]></paragraph>
</block>
<block title="Static addressing"><paragraph
    title="18.2.26.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>Rogue devices or Access Points (APs) are unauthorised Wireless Access Points operating outside of the control of an agency.  Assigning static IP addresses for devices accessing wireless networks can prevent a rogue device when connecting to a network from being assigned a routable IP address.  However, some malicious actors will be able to determine IP addresses of legitimate users and use this information to guess or spoof valid IP address ranges for wireless networks.  Configuring devices to use static IP addresses introduces a management overhead without any tangible security benefit.</p>]]></paragraph>
<paragraph
    title="18.2.26.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3520"
><![CDATA[<p>Agencies SHOULD use the Dynamic Host Configuration Protocol (DHCP) for assigning IP addresses on wireless networks.</p>]]></paragraph>
</block>
<block title="Media Access Control address filtering"><paragraph
    title="18.2.27.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>Devices that connect to wireless networks have a unique Media Access Control (MAC) address.  It is possible to use MAC address filtering on wireless access points to restrict which devices can connect to wireless networks.  While this approach will introduce a management overhead of configuring allow lists of approved MAC addresses, it can prevent rogue devices from connecting to wireless networks.  However, some malicious actors will be able to determine valid MAC addresses of legitimate users already on wireless networks and use this information to spoof valid MAC addresses and gain access to a network.  MAC address filtering introduces a management overhead without any real tangible security benefit.</p>]]></paragraph>
<paragraph
    title="18.2.27.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should Not"
    cid="3529"
><![CDATA[<p>MAC address filtering SHOULD NOT be used as a security mechanism to restrict which devices connect to a wireless network.</p>]]></paragraph>
</block>
<block title="Documentation"><paragraph
    title="18.2.28.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>Wireless device driver and WAP vulnerabilities are very exposed to the threat environment and require specific attention as exploits can gain immediate unauthorised access to the network.</p>]]></paragraph>
<paragraph
    title="18.2.28.C.01."

    tags="Information Security Documentation,Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3533"
><![CDATA[<p>Key generation, distribution and rekeying procedures SHOULD be documented in the SecPlan for the wireless network.<br><br></p>]]></paragraph>
<paragraph
    title="18.2.28.C.02."

    tags="Information Security Documentation,Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3534"
><![CDATA[<p>Wireless device drivers and their versions SHOULD be documented in the SecPlan for the wireless network.</p>]]></paragraph>
</block>
<block title="Non-agency devices connecting to agency controlled wireless networks"><paragraph
    title="18.2.29.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>As agencies have no control over the security of non-agency devices or knowledge of the security posture of such devices, allowing them to connect to agency controlled wireless networks poses a serious threat.  Of particular concern is that non-agency devices may be infected with viruses, malware or other malicious code that could crossover onto the agency network.  Furthermore, any non-agency devices connecting to agency controlled wireless networks will take on the classification of the network and will need to be appropriately sanitised and declassified before being released back to their owners.</p>]]></paragraph>
<paragraph
    title="18.2.29.R.02."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>The practice of Bring Your Own Device (BYOD) is becoming more widespread but introduces a significant number of additional risks to agency systems. &nbsp;Refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17126">Section 21.4</a> for guidance on the use of BYOD.</p>]]></paragraph>
<paragraph
    title="18.2.29.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must"
    cid="3583"
><![CDATA[<p>Where BYOD has been approved by an agency, any wireless network allowing BYOD connections MUST be segregated from all other agency networks, including any agency wireless networks.</p>]]></paragraph>
<paragraph
    title="18.2.29.C.02."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must"
    cid="3586"
><![CDATA[<p>Any BYOD devices MUST comply with the policies and configuration described in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17126">Section 21.4– BYOD</a>.</p>]]></paragraph>
<paragraph
    title="18.2.29.C.03."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Must Not"
    cid="3588"
><![CDATA[<p>Agencies MUST NOT allow non-agency devices to connect to agency controlled wireless networks not intended or configured for BYOD devices or for public access.</p>]]></paragraph>
</block>
<block title="Agency devices connecting to non-agency controlled wireless networks"><paragraph
    title="18.2.30.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>When agency devices connect to non-agency controlled wireless networks, particularly public wireless networks, the devices may be exposed to viruses, malware or other malicious code.</p>]]></paragraph>
<paragraph
    title="18.2.30.R.02."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>If any agency device becomes infected and is later connected to an agency controlled wireless network then a crossover of viruses, malware or malicious code could occur.</p>]]></paragraph>
<paragraph
    title="18.2.30.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should Not"
    cid="3600"
><![CDATA[<p>Agencies SHOULD NOT allow agency devices to connect to non-agency controlled wireless networks.</p>]]></paragraph>
</block>
<block title="Connecting wireless networks to fixed networks"><paragraph
    title="18.2.31.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>When an agency has a business requirement to connect a wireless network to a fixed network, it is important that they consider the security risks. While fixed networks can be designed with a certain degree of physical security, wireless networks are often easily accessible outside of the agency’s controlled area.  Treating connections between wireless networks and fixed networks in the same way agencies would treat connections between fixed networks and the Internet can help protect against an intrusion originating from a wireless network against a fixed network.  For example, agencies can implement a gateway to inspect and control the flow of information between the two networks.</p>]]></paragraph>
<paragraph
    title="18.2.31.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3609"
><![CDATA[<p>Connections between wireless networks and fixed networks SHOULD be treated in the same way as connections between fixed networks and the Internet.</p>]]></paragraph>
</block>
<block title="Wireless network footprint and Radio Frequency (RF) Controls"><paragraph
    title="18.2.32.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>Minimising the output power of wireless access points will reduce the footprint of wireless networks.  Instead of deploying a small number of wireless access points that broadcast on high power, more wireless access points that use minimal broadcast power should be deployed to achieve the desired wireless network footprint.  This has the added benefit of providing redundancy for a wireless network should a wireless access point become unserviceable.  In such a case, the output power of other wireless access points can be temporarily increased to cover the footprint gap until the unserviceable wireless access point can be replaced.</p>]]></paragraph>
<paragraph
    title="18.2.32.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3614"
><![CDATA[<p>Instead of deploying a small number of wireless access points that broadcast on high power, more wireless access points that use minimal broadcast power SHOULD be deployed to achieve the desired wireless network footprint.</p>]]></paragraph>
</block>
<block title="Radio Frequency (RF) Propagation &amp; Controls"><paragraph
    title="18.2.33.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>An additional method to limit a wireless network’s footprint is through the use of radio frequency (RF) shielding on an agency’s premises.  While expensive, this will limit the wireless communications to areas under the control of an agency. RF shielding on an agency’s premises has the added benefit of preventing the jamming of wireless networks from outside of the premises in which wireless networks are operating.</p>]]></paragraph>
<paragraph
    title="18.2.33.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3617"
><![CDATA[<p>The effective range of wireless communications outside an agency’s area of control SHOULD be limited by:</p><ul>
<li>Minimising the output power level of wireless devices.</li>
<li>Implementing RF shielding within buildings in which wireless networks are used.</li>
</ul>]]></paragraph>
</block>
<block title="Interference between wireless networks"><paragraph
    title="18.2.34.R.01."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>Where multiple wireless networks are deployed in close proximity, there is the potential for RF interference to adversely impact the availability of the network, especially when networks are operating on commonly used default channels of 1 and 11.  This interference is also apparent where a large number of wireless networks are is use in close proximity to the agency’s premises.</p>]]></paragraph>
<paragraph
    title="18.2.34.R.02."

    tags="Network Security,Technical,WLANs"


><![CDATA[<p>Sufficiently separating wireless networks through the use of channel separation can help reduce this risk.  This can be achieved by using wireless networks that are configured to operate with at least one channel separation.  For example, channels 1, 3 and 5 could be used to separate three wireless networks.</p>]]></paragraph>
<paragraph
    title="18.2.34.C.01."

    tags="Network Security,Technical,WLANs"


    classification="All Classifications"
    compliance="Should"
    cid="3621"
><![CDATA[<p>Wireless networks SHOULD use channel separation.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="18.3. Video &amp; Telephony Conferencing and Internet Protocol Telephony"><subsection title="Objective"><paragraph
    title="18.3.1."


><![CDATA[<p>Video &amp; Telephony Conferencing (VTC), Internet Protocol Telephony (IPT) and Voice over Internet Protocol (VoIP) systems are implemented in a secure manner that does not compromise security, information or systems and that they operate securely.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="18.3.2."


><![CDATA[<p>This section covers information on VTC and IPT including Voice over Internet Protocol (VoIP).  Although IPT refers generally to the transport of telephone calls over IP networks, the scope of this section includes connectivity to the PSTN as well as remote sites.</p>]]></paragraph>
<paragraph
    title="18.3.3."


><![CDATA[<p>Additional information relating to topics covered in this section can be found in</p><ul>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13958">Chapter 11 – Communications Systems and Devices</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 – Gateways Security</a>; and</li>
<li>any section in this manual relating to the protection of data networks.</li>
</ul>]]></paragraph>
</block>
<block title="Exception for VTC and IPT gateways"><paragraph
    title="18.3.4."


><![CDATA[<p>Where a gateway connects between an analogue telephone network such as the PSTN and a computer network, <a title="Gateway Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 – Gateway Security</a>&nbsp; <strong>does not</strong> apply.</p>]]></paragraph>
<paragraph
    title="18.3.5."


><![CDATA[<p>Where a gateway connects between a VTC or IPT network and any other VTC or IPT network, <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 – Gateway Security </a>applies.</p>]]></paragraph>
</block>
<block title="Hardening VTC and IPT systems"><paragraph
    title="18.3.6."


><![CDATA[<p>Data in a VTC or IPT network consists of IP packets and should not be treated any differently to other data. In accordance with the principles of least-privilege and security-in-depth, hardening can be applied to all handsets, control units, software, servers and gateways. For example a Session Initiation Protocol (SIP) server could:</p><ul>
<li>have a fully patched software and operating system;</li>
<li>only required services running;</li>
<li>use encrypted non-replayable authentication; and</li>
<li>apply network restrictions that only allow secure Session Initiation Protocol (SIP) and secure Real Time Transport (RTP) traffic from IP phones on a VLAN to reach the server.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="18.3.7."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>SP 800-58</strong></p>
</td>
<td>
<p><strong>Security Considerations for Voice Over IP Systems</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/sp" target="_blank">https://csrc.nist.gov/publications/sp</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Security Issues and Countermeasure for VoIP</strong></p>
</td>
<td style="text-align: center;">SANS</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.sans.org/white-papers/1701/" target="_blank">https://www.sans.org/white-papers/1701/</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>Report Number: I332-016R-2005</strong></p>
</td>
<td>
<p><strong>Security Guidance for Deploying IP Telephony Systems Released: 14 February 2006</strong></p>
</td>
<td style="text-align: center;">
<p>Systems and Network Attack Center (SNAC) NSA</p>
</td>
<td style="width: 33%;">
<p>https://www.nsa.gov/ia/_files/voip/i332-016r-2005.pdf</p>
</td>
</tr>
<tr>
<td>
<p><strong>Report Number: I332-009R-2006</strong></p>
</td>
<td>
<p><strong>Recommended IP Telephony Architecture, Updated: 1 May 2006 Version 1.0</strong></p>
</td>
<td style="text-align: center;">
<p>Systems and Network Attack Center (SNAC) NSA</p>
</td>
<td style="width: 33%;">
<p>https://www.nsa.gov/ia/_files/voip/I332-009R-2006.pdf</p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Mobility Capability Package March 26 2012 - Secure VoIP Version 1.2</strong></p>
</td>
<td style="text-align: center;">
<p>NSA</p>
</td>
<td style="width: 33%;">
<p>https://www.nsa.gov/ia/_files/Mobility_Capability_Pkg_Vers_1_2.pdf</p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Protecting Telephone-based Payment Card Data PCI Data Security Standard (PCI DSS) Version: 2.0, March 2011</strong></p>
</td>
<td style="text-align: center;">
<p>The PCI Security Standards Council (PCI SSC)</p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.pcisecuritystandards.org/documents/protecting_telephone-based_payment_card_data.pdf" target="_blank">https://www.pcisecuritystandards.org/documents/protecting_telephone-based_payment_card_data.pdf [PDF, 888 KB]</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>PCI Mobile Payment Acceptance Security Guidelines Version: 1.0 Date: September 2012</strong></p>
</td>
<td style="text-align: center;">
<p>PCI SSC</p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.pcisecuritystandards.org/documents/Mobile_Payment_Security_Guidelines_Developers_v1.pdf" target="_blank">https://www.pcisecuritystandards.org/documents/Mobile_Payment_Security_Guidelines_Developers_v1.pdf [PDF, 579 KB]</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>PCI Mobile Payment Acceptance Security Guidelines Version: 1.0 Date: February 2013</strong></p>
</td>
<td style="text-align: center;">
<p>PCI SSC</p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.pcisecuritystandards.org/documents/Mobile_Payment_Security_Guidelines_Merchants_v1.pdf" target="_blank">https://www.pcisecuritystandards.org/documents/Mobile_Payment_Security_Guidelines_Merchants_v1.pdf [PDF, 630 KB]</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Understanding Voice over Internet Protocol (VoIP): 2006</strong></p>
</td>
<td style="text-align: center;">
<p>US-CERT</p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.us-cert.gov/sites/default/files/publications/understanding_voip.pdf" target="_blank">https://www.us-cert.gov/sites/default/files/publications/understanding_voip.pdf [PDF, 83 KB]</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>CNSS Instruction No. 5000 April 2007</strong></p>
</td>
<td>
<p><strong>Guidelines for Voice over Internet Protocol (VoIP) Computer Telephony</strong></p>
</td>
<td style="text-align: center;">
<p>Committee on National Security Systems</p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.cnss.gov/CNSS/issuances/Instructions.cfm" target="_blank">https://www.cnss.gov/CNSS/issuances/Instructions.cfm</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>&nbsp;<strong>DHS 4300A</strong></strong></p>
</td>
<td><strong>DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014</strong></td>
<td style="text-align: center;"><span>DHS</span></td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.dhs.gov/sites/default/files/publications/4300A%20Handbook%20Attachment%20Q5%20-%20Voice%20over%20IP.pdf" target="_blank">https://www.dhs.gov/sites/default/files/publications/4300A%20Handbook%20Attachment%20Q5%20-%20Voice%20over%20IP.pdf [PDF, 586 KB]</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Video and voice-aware firewalls"><paragraph
    title="18.3.8.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>The use of video, unified communications and voice-aware firewalls ensures that only video or voice traffic (e.g. signalling and data) is allowed for a given call and that the session state is maintained throughout the transaction.</p>]]></paragraph>
<paragraph
    title="18.3.8.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>The requirement to use a video, unified communication or voice-aware firewall does not necessarily require separate firewalls to be deployed for video conferencing, IP telephony and data traffic.  If possible, agencies are encouraged to implement one firewall that is either video and data-aware; voice and data-aware; or video, voice and data-aware depending on their needs.</p>]]></paragraph>
<paragraph
    title="18.3.8.R.03."

    tags="Network Security,Technical"


><![CDATA[<p>Refer to Section <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16735">19.5 - Session Border Controllers</a>.</p>]]></paragraph>
<paragraph
    title="18.3.8.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3721"
><![CDATA[<p>Agencies SHOULD use a video, unified communication or voice-aware firewall that meets the same minimum level of assurance as specified for normal firewalls.</p>]]></paragraph>
</block>
<block title="Protecting IPT signalling and data"><paragraph
    title="18.3.9.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>IPT voice and signalling data is vulnerable to eavesdropping but can be protected with encryption.  This control helps protect against DoS, adversary-in-the-middle, and call spoofing attacks made possible by inherent weaknesses in the VTC and IPT protocols.</p>]]></paragraph>
<paragraph
    title="18.3.9.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>When protecting IPT signalling and data, voice control signalling can be protected using TLS and the ‘sips://’ identifier to force the encryption of all legs of the connection.  Similar protections are available for RTP and the Real-Time Control Protocol.</p>]]></paragraph>
<paragraph
    title="18.3.9.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3728"
><![CDATA[<p>Agencies SHOULD protect VTC and IPT signalling and data by using encryption.</p>]]></paragraph>
<paragraph
    title="18.3.9.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3729"
><![CDATA[<p>An encrypted and non-replayable two-way authentication scheme SHOULD be used for call authentication and authorisation.</p>]]></paragraph>
</block>
<block title="Establishment of secure signalling and data protocols"><paragraph
    title="18.3.10.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Use of secure signalling and data protects against eavesdropping, some types of DoS, adversary-in-the-middle, and call spoofing attacks.</p>]]></paragraph>
<paragraph
    title="18.3.10.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3732"
><![CDATA[<p>Agencies SHOULD ensure that VTC and IPT functions are established using only the secure signalling and data protocols.</p>]]></paragraph>
</block>
<block title="Local area network traffic separation"><paragraph
    title="18.3.11.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Availability and quality of service are the main drivers for applying the principles of separation and segregation.</p>]]></paragraph>
<paragraph
    title="18.3.11.C.01."

    tags="Network Security,Technical"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="3735"
><![CDATA[<p>Agencies MUST either separate or segregate the VTC and IPT traffic from other data traffic.</p>]]></paragraph>
<paragraph
    title="18.3.11.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3736"
><![CDATA[<p>Agencies SHOULD either separate or segregate the IPT traffic from other data traffic.</p>]]></paragraph>
</block>
<block title="VTC and IPT Device setup"><paragraph
    title="18.3.12.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>VTC equipment and VoIP phones need to be hardened and separated or segregated from the data network to ensure they will not provide an easy entry point to the network for an attacker.</p>]]></paragraph>
<paragraph
    title="18.3.12.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>USB ports on these devices can be used to circumvent USB workstation policy and upload malicious software for unauthorised call recording/spoofing and entry into the data network.  Unauthorised or unauthenticated devices should be blocked by default to reduce the risk of a compromise or denial of service.</p>]]></paragraph>
<paragraph
    title="18.3.12.C.01."

    tags="Network Security,Technical"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3740"
><![CDATA[<p>Agencies MUST:</p><ul>
<li>configure VTC and VoIP devices to authenticate themselves to the call controller upon registration;</li>
<li>disable phone auto-registration and only allow an allow list of authorised devices to access the network;</li>
<li>block unauthorised devices by default; </li>
<li>disable all unused and prohibited functionality; and</li>
<li>use individual logins for IP phones.</li>
</ul>]]></paragraph>
<paragraph
    title="18.3.12.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3741"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>configure VoIP phones to authenticate themselves to the call controller upon registration;</li>
<li>disable phone auto-registration and use an allow list of authorised devices to access the network;</li>
<li>block unauthorised devices by default; </li>
<li>disable all unused and prohibited functionality; and</li>
<li>use individual logins for IP phones.</li>
</ul>]]></paragraph>
</block>
<block title="Call authentication and authorisation"><paragraph
    title="18.3.13.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>This control ensures server-client mutual authentication.</p>]]></paragraph>
<paragraph
    title="18.3.13.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3745"
><![CDATA[<p>Authentication and authorisation SHOULD be used for all actions on the IPT network, including:</p><ul>
<li>call setup;</li>
<li>changing settings; and</li>
<li>checking voice mail.</li>
</ul>]]></paragraph>
<paragraph
    title="18.3.13.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3747"
><![CDATA[<p>An encrypted and non-replayable two-way authentication scheme SHOULD be used for call authentication and authorisation.</p>]]></paragraph>
<paragraph
    title="18.3.13.C.03."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3748"
><![CDATA[<p>Authentication SHOULD be enforced for:</p><ul>
<li>registering a new phone;</li>
<li>changing phone users;</li>
<li>changing settings; and</li>
<li>accessing voice mail.</li>
</ul>]]></paragraph>
</block>
<block title="VTC and IPT device connection to workstations"><paragraph
    title="18.3.14.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Availability and quality of service are the main drivers for applying the principles of separation and segregation.</p>]]></paragraph>
<paragraph
    title="18.3.14.C.01."

    tags="Network Security,Technical"


    classification="Secret, Confidential, Top Secret"
    compliance="Must Not"
    cid="3751"
><![CDATA[<p>Agencies MUST NOT connect workstations to VTC or IPT devices unless the workstation or the device, as appropriate for the configuration, uses VLANs or similar mechanisms to maintain separation between VTC, IPT and other data traffic.</p>]]></paragraph>
<paragraph
    title="18.3.14.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should Not"
    cid="3752"
><![CDATA[<p>Agencies SHOULD NOT connect workstations to VTC or IPT devices unless the workstation or the device, as appropriate for the configuration, uses VLANs or similar mechanisms to maintain separation between VTC, IPT and other data traffic.</p>]]></paragraph>
</block>
<block title="Lobby and shared area IPT devices"><paragraph
    title="18.3.15.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>IPT devices in public areas may give an attacker opportunity to access the internal data network by replacing the phone with another device, or installing a device in-line.  There is also a risk to the voice network of social engineering (since the call may appear to be internal) and data leakage from poorly protected voice mail-boxes.</p>]]></paragraph>
<paragraph
    title="18.3.15.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3756"
><![CDATA[<p>Where an agency uses a VoIP phone in a lobby or shared area they SHOULD limit or disable the phone’s:</p><ul>
<li>ability to access data networks; </li>
<li>functionality for voice mail and directory services; and</li>
<li>use a separate network segment.</li>
</ul>]]></paragraph>
<paragraph
    title="18.3.15.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3758"
><![CDATA[<p>Agencies SHOULD, where available, use traditional analogue phones in a lobby and shared areas.</p>]]></paragraph>
</block>
<block title="Usage of softphones, webcams and similar sound and video devices"><paragraph
    title="18.3.16.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Software and applications for softphones and webcams can introduce additional attack vectors into the network as they are exposed to threats from the data network via the workstation and can subsequently be used to gain access to the network.</p>]]></paragraph>
<paragraph
    title="18.3.16.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>Softphones and webcams typically require workstation to workstation communication, normally using a number of randomly assigned ports to facilitate RTP data exchange.  This presents a security risk as workstations generally should be separated using host-based firewalls that deny all connections between workstations to make malicious code propagation inside the network difficult.</p>]]></paragraph>
<paragraph
    title="18.3.16.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3766"
><![CDATA[<p>Agencies using softphones or webcams SHOULD have separate dedicated network interface cards on the host for VTC or IPT network access to facilitate VLAN separation.</p>]]></paragraph>
<paragraph
    title="18.3.16.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3768"
><![CDATA[<p>Agencies using softphones or webcams SHOULD install a host-based firewall on workstations utilising softphones or webcams that allows traffic only to and from a minimum number of ports.</p>]]></paragraph>
<paragraph
    title="18.3.16.C.03."

    tags="Network Security,Technical"


    classification="Top Secret, Confidential, Secret"
    compliance="Should Not"
    cid="3770"
><![CDATA[<p>Agencies SHOULD NOT use softphones or webcams.</p>]]></paragraph>
</block>
<block title="Workstations using USB softphones, webcams and similar sound and video devices"><paragraph
    title="18.3.17.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Adding softphones and webcams to an allow list of allowed USB devices on a workstation will assist with restricting access to only authorised devices, and allowing the SOE to maintain defences against removable media storage and other unauthorised USB devices.</p>]]></paragraph>
<paragraph
    title="18.3.17.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3777"
><![CDATA[<p>Agencies SHOULD use access control software to control USB ports on workstations using softphones and webcams by utilising the specific vendor and product identifier of the authorised device.</p>]]></paragraph>
</block>
<block title="Developing a denial of service response plan"><paragraph
    title="18.3.18.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Communications are considered critical for any business and are therefore especially vulnerable to Denial of Service (DoS). &nbsp;The guidance provided will assist in protecting against VTC or IPT DoS attacks, signalling floods, established call teardown and RTP data floods. &nbsp;These elements should be included in the agency’s wider response plan (See <a title="Business Continuity and Disaster Recovery" href="http://nzism.gcsb.govt.nz/ism-document#Section-13074">Section 6.4 – Business Continuity and Disaster Recovery</a>).</p>]]></paragraph>
<paragraph
    title="18.3.18.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>Simple DoS attacks and incidents are often the result of bandwidth exhaustion.  Agencies should also consider other forms of DoS including Distributed Denial of Service attacks (DdoS), DNS and latency incidents.</p>]]></paragraph>
<paragraph
    title="18.3.18.R.03."

    tags="Network Security,Technical"


><![CDATA[<p>System resilience can be improved by architecting a structured approach and providing layered defence such as network and application protection as separate layers.</p>]]></paragraph>
<paragraph
    title="18.3.18.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3782"
><![CDATA[<p>Agencies SHOULD develop a Denial of Service response plan including:</p><ul>
<li>how to identify the precursors and other signs of DoS;</li>
<li>how to diagnose the incident or attack type and attack method;</li>
<li>how to diagnose the source of the DoS;</li>
<li>what actions can be taken to clear the DoS; </li>
<li>how communications can be maintained during a DoS; and</li>
<li>report the incident.</li>
</ul>]]></paragraph>
</block>
<block title="Content of a Denial of Service (DoS) response plan"><paragraph
    title="18.3.19.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>An VTC or IPT DoS response plan will need to address the following:</p><ul>
<li>how to identify the source of the DoS, either internal or external (location and content of logs);</li>
<li>how to diagnose the incident or attack type and attack method;</li>
<li>how to minimise the effect on VTC or IPT, of a DoS of the data network (e.g. Internet or internal DoS), including separate links to other office locations for VTC and IPT and/or quality of service prioritisation;</li>
<li>strategies that can mitigate the DOS (banning certain devices/Ips at the call controller and firewalls, implementing quality of service, changing VoIP authentication, changing dial-in authentication; and</li>
<li>alternative communication options (such as designated devices or personal mobile phones) that have been identified for use in case of an emergency.</li>
</ul>]]></paragraph>
<paragraph
    title="18.3.19.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3785"
><![CDATA[<p>A Denial of Service response plan SHOULD include monitoring and use of:</p><ul>
<li>router and switch logging and flow data;</li>
<li>packet captures;</li>
<li>proxy and call manager logs and access control lists;</li>
<li>VTC and IPT aware firewalls and voice gateways;</li>
<li>network redundancy;</li>
<li>load balancing; </li>
<li>PSTN failover; and</li>
<li>alternative communication paths.</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
<section title="18.4. Intrusion Detection and Prevention"><subsection title="Objective"><paragraph
    title="18.4.1."


><![CDATA[<p>An intrusion detection and prevention strategy is implemented for systems in order to respond promptly to incidents and preserve availability, confidentiality and integrity of systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="18.4.2."


><![CDATA[<p>This section covers information relating to detection and prevention of malicious code propagating through networks as well as the detection and prevention of unusual or malicious activities.</p>]]></paragraph>
</block>
<block title="Methods of infections or delivery"><paragraph
    title="18.4.3."


><![CDATA[<p>Malicious code can spread through a system from a number of sources including:</p><ul>
<li>files containing macro viruses or worms;</li>
<li>email attachments and Web downloads with malicious active content;</li>
<li>executable code in the form of applications;</li>
<li>security weaknesses in a system or network;</li>
<li>security weaknesses in an application; </li>
<li>contact with an infected system or media; or</li>
<li>deliberate introduction of malicious code.</li>
</ul>]]></paragraph>
<paragraph
    title="18.4.4."


><![CDATA[<p>The speed at which malicious code can spread through a system presents significant challenges and an important part of any defensive strategy is to contain the attack and limit damage.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="18.4.5."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td>
<p><strong>Publisher</strong></p>
</td>
<td>
<p><strong>Source</strong></p>
</td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27001:2013</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Information security management systems — Requirements</strong><strong>, A.15.3,&nbsp;</strong><strong>Information Systems Audit Considerations</strong></p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="Information technology — Security techniques — Information security management systems — Requirements" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></p>
</td>
</tr>
<tr>
<td><strong>HB 171:2003</strong></td>
<td><strong>Guidelines for the Management of Information Technology Evidence</strong></td>
<td style="text-align: center;">Standards NZ</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.saiglobal.com/PDFTemp/Previews/OSH/as/misc/handbook/HB171.PDF" target="_blank">https://www.saiglobal.com/PDFTemp/Previews/OSH/as/misc/handbook/HB171.PDF [PDF, 350 KB]</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="References - Endpoint Security"><paragraph
    title="18.4.6."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Transport Layer Protection&nbsp;Cheat Sheet</strong></td>
<td style="text-align: center;">OWASP</td>
<td><a rel="noopener noreferrer" href="https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet" target="_blank">https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet</a>&nbsp;</td>
</tr>
<tr>
<td><strong>RFC 5246</strong></td>
<td><strong>The Transport Layer Security (TLS) Protocol Version 1.2</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="The Transport Layer Security (TLS) Protocol Version 1.2" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc5246" target="_blank">https://datatracker.ietf.org/doc/html/rfc5246</a></td>
</tr>
<tr>
<td><strong>RFC 8446</strong></td>
<td><strong>The Transport Layer Security (TLS) Protocol Version 1.3</strong></td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a title="The Transport Layer Security (TLS) Protocol Version 1.3" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc8446" target="_blank">https://datatracker.ietf.org/doc/html/rfc8446</a></td>
</tr>
<tr>
<td><strong>RFC 7525</strong></td>
<td><strong>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</strong></td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a title="Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc7525" target="_blank">https://datatracker.ietf.org/doc/html/rfc7525</a></td>
</tr>
<tr>
<td><strong>RFC 6749</strong></td>
<td><strong>The OAuth 2.0&nbsp;Authorization Framework</strong></td>
<td style="text-align: center;"><span>IETF</span></td>
<td><a title="The OAuth 2.0 Authorization Framework" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6749" target="_blank">https://datatracker.ietf.org/doc/html/rfc6749</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>OpenID Connect</strong></td>
<td style="text-align: center;">OpenID Foundation</td>
<td><a rel="noopener noreferrer" href="https://openid.net/connect/" target="_blank">https://openid.net/connect/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>New Zealand Security Assertion Messaging Standard&nbsp;</strong></td>
<td style="text-align: center;">
<p>NZ Government</p>
<p>Department of internal affairs</p>
</td>
<td><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/technology-and-architecture/new-zealand-security-assertion-messaging-standard/" target="_blank">New Zealand Security Assertion Messaging Standard | NZ Digital government</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Intrusion Detection and Prevention strategy (IDS/IPS)"><paragraph
    title="18.4.7.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>An IDS/IPS when configured correctly, kept up to date and supported by appropriate processes, can be an effective way of identifying, responding to and containing known attack types, specific attack profiles or anomalous or suspicious network activities.</p>]]></paragraph>
<paragraph
    title="18.4.7.C.01."

    tags="Network Security,Technical"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="3802"
><![CDATA[<p>Agencies MUST develop, implement and maintain an intrusion detection strategy that includes:</p><ul>
<li>appropriate intrusion detection mechanisms, including network-based IDS/IPSs and host-based IDS/IPSs as necessary;</li>
<li>the audit analysis of event logs, including IDS/IPS logs;</li>
<li>a periodic audit of intrusion detection procedures;</li>
<li>information security awareness and training programs;</li>
<li>a documented Incident Response Plans (IRP); and</li>
<li>provide the capability to detect information security incidents and attempted network intrusions on gateways and provide real-time alerts.</li>
</ul>]]></paragraph>
<paragraph
    title="18.4.7.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3803"
><![CDATA[<p>Agencies SHOULD develop, implement and maintain an intrusion detection strategy that includes:</p><ul>
<li>appropriate intrusion detection mechanisms, including network-based IDS/IPSs and host-based IDS/IPSs as necessary;</li>
<li>the audit analysis of event logs, including IDS/IPS logs;</li>
<li>a periodic audit of intrusion detection procedures;</li>
<li>information security awareness and training programs; and</li>
<li>a documented IRP.</li>
</ul>]]></paragraph>
<paragraph
    title="18.4.7.C.03."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3804"
><![CDATA[<p>Agencies SHOULD ensure sufficient resources are provided for the maintenance and monitoring of IDS/IPS.</p>]]></paragraph>
</block>
<block title="IDS/IPSs on gateways"><paragraph
    title="18.4.8.R.01."

    tags="Network Security,Technical,Gateways"


><![CDATA[<p>If the firewall is configured to block all traffic on a particular range of port numbers, then the IDS should inspect traffic for these port numbers and alert if they are detected.</p>]]></paragraph>
<paragraph
    title="18.4.8.C.01."

    tags="Network Security,Technical,Gateways"


    classification="All Classifications"
    compliance="Should"
    cid="3807"
><![CDATA[<p>Agencies SHOULD deploy IDS/IPSs in all gateways between the agency’s networks and unsecure public networks or BYOD wireless networks.</p>]]></paragraph>
<paragraph
    title="18.4.8.C.02."

    tags="Network Security,Technical,Gateways"


    classification="All Classifications"
    compliance="Should"
    cid="3808"
><![CDATA[<p>Agencies SHOULD deploy IDS/IPSs at all gateways between the agency’s networks and any network not managed by the agency.</p>]]></paragraph>
<paragraph
    title="18.4.8.C.03."

    tags="Network Security,Technical,Gateways"


    classification="All Classifications"
    compliance="Should"
    cid="3809"
><![CDATA[<p>Agencies SHOULD locate IDS/IPSs within the gateway environment, immediately inside the outermost firewall.</p>]]></paragraph>
</block>
<block title="IDS/IPS Maintenance"><paragraph
    title="18.4.9.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>When signature-based intrusion detection is used, the effectiveness of the IDS/IPS will degrade over time as new intrusion methods are developed.  It is for this reason that IDS/IPS systems and signatures need to be up to date to identify the latest intrusion detection methods.</p>]]></paragraph>
<paragraph
    title="18.4.9.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3815"
><![CDATA[<p>Agencies MUST select IDS / IPS that monitor uncharacteristic and suspicious activities.</p>]]></paragraph>
<paragraph
    title="18.4.9.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3843"
><![CDATA[<p>When signature-based intrusion detection is used, agencies MUST keep the signatures and system patching up to date.</p>]]></paragraph>
</block>
<block title="Malicious code counter-measures"><paragraph
    title="18.4.10.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Implementing policies and procedures for preventing and dealing with malicious code outbreaks that enables agencies to provide consistent incident response, as well as giving clear directions to system users on how to respond to an information security incident.</p>]]></paragraph>
<paragraph
    title="18.4.10.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3851"
><![CDATA[<p>Agencies MUST:</p><ul>
<li>develop and maintain a set of policies and procedures covering how to:
<ul style="list-style-type: circle;">
<li>minimise the likelihood of malicious code being introduced into a system;</li>
<li>prevent all unauthorised code from executing on an agency network;&nbsp;</li>
<li>detect any malicious code installed on a system;</li>
</ul>
</li>
<li>make their system users aware of the agency’s policies and procedures; and</li>
<li>ensure that all instances of detected malicious code outbreaks are handled according to established procedures.</li>
</ul>]]></paragraph>
</block>
<block title="Configuring the IDS/IPS"><paragraph
    title="18.4.11.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Generating alerts for any information flows that contravene any rule within the firewall rule set will assist security personnel in identifying and reporting to any possible breaches of agency systems.</p>]]></paragraph>
<paragraph
    title="18.4.11.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3857"
><![CDATA[<p>In addition to agency defined configuration requirements, agencies SHOULD ensure that IDS/IPSs located inside a firewall are configured to generate a log entry, and an alert, for any information flows that contravene any rule within the firewall rule set.</p>]]></paragraph>
<paragraph
    title="18.4.11.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3859"
><![CDATA[<p>Agencies SHOULD test IDS/IPSs rule sets prior to implementation to ensure that they perform as expected.</p>]]></paragraph>
<paragraph
    title="18.4.11.C.03."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3864"
><![CDATA[<p>If a firewall is configured to block all traffic on a particular range of port numbers, the IDP/IPSs SHOULD inspect traffic for these port numbers and generate an alert if they are detected.</p>]]></paragraph>
</block>
<block title="Event management and correlation"><paragraph
    title="18.4.12.R.01."

    tags="Network Security,Technical,Event Logging"


><![CDATA[<p>Deploying tools to manage correlation of suspicious events or events of interest across all agency networks will assist in identifying suspicious patterns in information flows throughout the agency.</p>]]></paragraph>
<paragraph
    title="18.4.12.R.02."

    tags="Network Security,Technical,Event Logging"


><![CDATA[<p>The history of events is important in this analysis and should be accommodated in any archiving decisions.</p>]]></paragraph>
<paragraph
    title="18.4.12.C.01."

    tags="Network Security,Technical,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="3875"
><![CDATA[<p>Agencies SHOULD deploy tools for:</p><ul>
<li>the management and archive of security event information; and</li>
<li>the correlation of suspicious events or events of interest across all agency networks.</li>
</ul>]]></paragraph>
</block>
<block title="Host-based IDS/IPSs"><paragraph
    title="18.4.13.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Host-based IDS/IPS use behaviour-based detection schemes and can therefore assist in the detection of previously unidentified anomalous and suspicious activities such as:</p><ul>
<li>process injection;</li>
<li>keystroke logging;</li>
<li>driver loading;</li>
<li>library additions or supercessions;</li>
<li>call hooking.</li>
</ul><p>They may also identify new malicious code. It should be noted that some anti-virus and similar security products are evolving into converged endpoint security products that incorporate HIDS/HIPS.</p>]]></paragraph>
<paragraph
    title="18.4.13.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3886"
><![CDATA[<p>Agencies SHOULD install host-based IDS/IPSs on authentication, DNS, email, Web and other high value servers.</p>]]></paragraph>
</block>
<block title="Active content blocking"><paragraph
    title="18.4.14.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Filtering unnecessary content and disabling unwanted functionality reduces the number of possible entry points that an attacker can exploit.</p>]]></paragraph>
<paragraph
    title="18.4.14.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3892"
><![CDATA[<p>Agencies SHOULD use:</p><ul>
<li>filters to block unwanted content and exploits against applications that cannot be patched;</li>
<li>settings within the applications to disable unwanted functionality; and</li>
<li>digital signatures to restrict active content to trusted sources only.</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
<section title="18.5. Internet Protocol Version 6"><subsection title="Objective"><paragraph
    title="18.5.1."


><![CDATA[<p>IPv6 is disabled until it is ready to be deployed.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="18.5.2."


><![CDATA[<p>This section covers information on IPv6 and its deployment within networks.  Where this manual specifies requirements for network devices, the requirements apply equally whether deploying IPv6 or IPv4.</p>]]></paragraph>
<paragraph
    title="18.5.3."


><![CDATA[<p>IPv6 was officially launched by the Internet Society in June 2012.  With the change from IPv4 to IPv6, there is the potential to introduce vulnerabilities to agency networks through incorrect or mis-configuration, poor design and poor device compatibility.  Attackers will also be actively seeking to exploit vulnerabilities that will inevitably be exposed.</p>]]></paragraph>
<paragraph
    title="18.5.4."


><![CDATA[<p>Agencies unable to meet the compliance requirements as specified for a control when deploying IPv6 network infrastructure will need to follow the procedures as specified in this manual for varying from a control and the associated compliance requirements.</p>]]></paragraph>
</block>
<block title="DNS Security Extensions (DNSSEC)"><paragraph
    title="18.5.5."

    tags="Technical"


><![CDATA[<p>DNSSEC has been developed to enhance Internet security and can digitally ‘sign’ data to assure validity.  It is essential that DNSSEC is deployed at each step in the lookup from root zone to final domain name (e.g., <a href="https://www.icann.org/" target="_blank">www.icann.org</a>).  Signing the root (deploying DNSSEC on the root zone) is a necessary step in this overall process.  Importantly it does not encrypt data.  It just attests to the validity of the address of the site you visit.  DNSSEC and IPv6 have been engineered to integrate and thus enhance Internet security.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="18.5.6."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Reference</strong></p>
</td>
<td>
<p><strong>Title</strong></p>
</td>
<td>
<p><strong>Publisher</strong></p>
</td>
<td style="width: 33%;">
<p><strong>Source</strong></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>A strategy for the transition to IPv6 for Australian Government agencies. (archived document)</strong></p>
</td>
<td style="text-align: center;">
<p>Australian Government Information Management Office</p>
</td>
<td style="width: 33%;">
<p><a title="A Strategy for the Implementation of IPv6 in Australian Government Agencies" rel="noopener noreferrer" href="https://www.hpc.mil/images/hpcdocs/ipv6/endorsed_strategy_for_the_transition_to_ipv6_for_australian_government_agencies_v2.pdf" target="_blank">https://www.hpc.mil/images/hpcdocs/ipv6/endorsed_strategy_for_the_transition_to_ipv6_for_australian_government_agencies_v2.pdf [PDF, 466 KB]</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>IPv6 First-Hop Security Concerns</strong></p>
</td>
<td style="text-align: center;"><span>Cisco</span></td>
<td style="width: 33%;"><a title="Cisco IPv6 First Hop Security (FHS)" rel="noopener noreferrer" href="https://www.cisco.com/c/en/us/products/ios-nx-os-software/ipv6-first-hop-security-fhs/index.html" target="_blank">https://www.cisco.com/c/en/us/products/ios-nx-os-software/ipv6-first-hop-security-fhs/index.html</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Manageable Network Plan</strong></p>
</td>
<td style="text-align: center;">NSA</td>
<td style="width: 33%;">
<p><a href="https://archive.org/details/pdfy-vAXwuJUZh7w7OnBF">NSA Manageable Network Plan.pdf (PDFy mirror) : Free Download, Borrow, and Streaming : Internet Archive</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Router Security Configuration Guide Supplement – Security for IPv6 Routers, 23 May 2006 Version: 1.0</strong></p>
</td>
<td style="text-align: center;">NSA</td>
<td style="width: 33%;">
<p><a title="Router Security Configuration Guide Supplement - Security for IPv6 Routers" rel="noopener noreferrer" href="https://hpc.mil/images/hpcdocs/ipv6/nsa-router-security-configuration-supplement-guide-for-ipv6.pdf" target="_blank">https://hpc.mil/images/hpcdocs/ipv6/nsa-router-security-configuration-supplement-guide-for-ipv6.pdf [PDF, 1.37 MB]</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Firewall Design Considerations for IPv6, 10/3/2007</strong></p>
</td>
<td style="text-align: center;">NSA</td>
<td style="width: 33%;">
<p><a title="Firewall Design Considerations for IPv6" rel="noopener noreferrer" href="https://www.hpc.mil/images/hpcdocs/ipv6/nsa-firewall-design-ipv6-i733-041r-2007.pdf" target="_blank">https://www.hpc.mil/images/hpcdocs/ipv6/nsa-firewall-design-ipv6-i733-041r-2007.pdf [PDF, 332 KB]</a></p>
</td>
</tr>
<tr>
<td><strong>NIST Special Publication 800-41, Revision 1, September 2009</strong></td>
<td>
<p><strong>Guidelines on Firewalls and Firewall Policy,&nbsp;</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;">
<p><a title="Guidelines on Firewalls and Firewall Policy" rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-41/rev-1/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-41/rev-1/final</a></p>
</td>
</tr>
<tr>
<td><strong>NIST&nbsp;<strong>Special Publication 800-119, December 2010</strong></strong></td>
<td>
<p><strong>Guidelines for secure deployment of IPv6</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;">
<p><a title="Guidelines for the Secure Deployment of IPv6" rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-119/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-119/final</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>A Complete Guide on IPv6 Attack and Defense</strong></p>
</td>
<td style="text-align: center;">
<p>SANS Institute</p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.sans.org/white-papers/33904/?show=complete-guide-ipv6-attack-defense-33904&amp;cat=detection" target="_blank">https://www.sans.org/white-papers/33904/?show=complete-guide-ipv6-attack-defense-33904&amp;cat=detection</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 2460&nbsp;</strong></td>
<td>
<p><strong>Internet Protocol, Version 6 (IPv6) Specification, December 1998</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td style="width: 33%;">
<p><a title="Internet Protocol, Version 6 (IPv6) Specification" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2460" target="_blank">https://datatracker.ietf.org/doc/html/rfc2460</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 4291&nbsp;</strong></td>
<td>
<p><strong>IP Version 6 Addressing Architecture, February 2006</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="IP Version 6 Addressing Architecture" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc4291" target="_blank">https://datatracker.ietf.org/doc/html/rfc4291</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 5952</strong></td>
<td>
<p><strong>A Recommendation for IPv6 Address Text Representation, ISSN: 2070-1721, August 2010</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td style="width: 33%;">
<p><a title="A Recommendation for IPv6 Address Text Representation" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc5952" target="_blank">https://datatracker.ietf.org/doc/html/rfc5952</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 6052&nbsp;</strong></td>
<td>
<p><strong>Ipv6 Addressing of IPv4/IPv6 Translators, ISSN: 2070-1721, October 2010</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td style="width: 33%;">
<p><a title="IPv6 Addressing of IPv4/IPv6 Translators" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6052" target="_blank">https://datatracker.ietf.org/doc/html/rfc6052</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 7136</strong></td>
<td>
<p><strong>Significance of IPv6 Interface Identifiers, ISSN: 2070-1721, February 2014</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td style="width: 33%;">
<p><a title="Significance of IPv6 Interface Identifiers" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc7136" target="_blank">https://datatracker.ietf.org/doc/html/rfc7136</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>RFC 6781</strong></p>
</td>
<td>
<p><strong>DNSSEC Operational Practices, Version 2</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="DNSSEC Operational Practices, Version 2" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc6781/" target="_blank">https://datatracker.ietf.org/doc/rfc6781/</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 6840</strong></td>
<td>
<p><strong>Clarifications and Implementation Notes for DNS Security (DNSSEC)</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="Clarifications and Implementation Notes for DNS Security (DNSSEC)" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6840" target="_blank">https://datatracker.ietf.org/doc/html/rfc6840</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 6841&nbsp;</strong></td>
<td>
<p><strong>A Framework for DNSSEC Policies and DNSSEC Practice Statements</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="A Framework for DNSSEC Policies and DNSSEC Practice Statements" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6841" target="_blank">https://datatracker.ietf.org/doc/html/rfc6841</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 7123</strong></td>
<td>
<p><strong>Security Implications of IPv6 on IPv4 Networks</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="Security Implications of IPv6 on IPv4 Networks" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc7123" target="_blank">https://datatracker.ietf.org/doc/html/rfc7123</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 4861&nbsp;</strong></td>
<td>
<p><strong>Neighbor Discovery for IP version 6 (IPv6)</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="Neighbor Discovery for IP version 6 (IPv6)" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc4861" target="_blank">https://datatracker.ietf.org/doc/html/rfc4861</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 5942&nbsp;&nbsp;</strong></td>
<td>
<p><strong>IPv6 Subnet Model: The Relationship between Links and Subnet Prefixes</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="IPv6 Subnet Model: The Relationship between Links and Subnet Prefixes" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc5942" target="_blank">https://datatracker.ietf.org/doc/html/rfc5942</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 3315&nbsp;</strong></td>
<td>
<p><strong>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="Dynamic Host Configuration Protocol for IPv6 (DHCPv6)" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3315" target="_blank">https://datatracker.ietf.org/doc/html/rfc3315</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 6104&nbsp;</strong></td>
<td>
<p><strong>Rogue IPv6 Router Advertisement Problem Statement</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td style="width: 33%;">
<p><a title="Rogue IPv6 Router Advertisement Problem Statement" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6104" target="_blank">https://datatracker.ietf.org/doc/html/rfc6104</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>DNSSEC – What Is It and Why Is It Important?</strong></p>
</td>
<td style="text-align: center;">
<p>Internet Corporation for Assigned Names and Numbers (ICAAN)</p>
</td>
<td style="width: 33%;">
<p><a title="dnssec-what-is-it-why-important" rel="noopener noreferrer" href="https://www.icann.org/resources/pages/dnssec-what-is-it-why-important-2019-03-05-en" target="_blank">https://www.icann.org/resources/pages/dnssec-what-is-it-why-important-2019-03-05-en#</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Use of dual-stack equipment"><paragraph
    title="18.5.7.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>In order to reduce the attack surface area of agency systems, it is good practice that agencies disable unused services and functions within network devices and operating systems.  If agencies are deploying dual-stack equipment but not using the IPv6 functionality, then that functionality should be disabled.  It can be re-enabled when required.  This will reduce the opportunity to exploit IPv6 functionality before appropriate security measures have been implemented.</p>]]></paragraph>
<paragraph
    title="18.5.7.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3951"
><![CDATA[<p>Agencies not using IPv6, but which have deployed dual-stack network devices and ICT equipment that supports IPv6, MUST disable the IPv6 functionality, unless that functionality is required.</p>]]></paragraph>
<paragraph
    title="18.5.7.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3952"
><![CDATA[<p>Network security devices on IPv6 or dual-stack networks MUST be IPv6 capable.</p>]]></paragraph>
</block>
<block title="Using IPv6"><paragraph
    title="18.5.8.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>The information security implications around the use of IPv6 are still largely unknown and un-tested.  As many of the deployed network protection technologies, such as firewalls and IDSs, do not consistently support IPv6, agencies choosing to implement IPv6 face an increased risk of systems compromise.</p>]]></paragraph>
<paragraph
    title="18.5.8.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>A number of tunnelling protocols have been developed to facilitate interoperability between IPv4 and IPv6.  Disabling IPv6 tunnelling protocols when this functionality is not explicitly required will reduce the risk of bypassing network defences by means of encapsulating IPv6 data inside IPv4 packets.</p>]]></paragraph>
<paragraph
    title="18.5.8.R.03."

    tags="Network Security,Technical"


><![CDATA[<p>Stateless Address Autoconfiguration (SLAAC) is a method of stateless IP address configuration in IPv6.  SLAAC reduces the ability to maintain complete logs of IP address assignment on the network.  To avoid this constraint, stateless IP addressing SHOULD NOT be used.</p>]]></paragraph>
<paragraph
    title="18.5.8.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3960"
><![CDATA[<p>Agencies using IPv6 MUST conduct a security risk assessment on risks that could be introduced as a result of running a dual stack environment or transitioning completely to IPv6.</p>]]></paragraph>
<paragraph
    title="18.5.8.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3961"
><![CDATA[<p>Agencies implementing a dual stack or wholly IPv6 network or environment MUST re-accredit their networks.</p>]]></paragraph>
<paragraph
    title="18.5.8.C.03."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3962"
><![CDATA[<p>IPv6 tunnelling MUST be disabled on all network devices, unless explicitly required.</p>]]></paragraph>
<paragraph
    title="18.5.8.C.04."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3965"
><![CDATA[<p>Dynamically assigned IPv6 addresses SHOULD be configured with DHCPv6 in a stateful manner and with lease information logged and logs stored in a centralised logging facility.</p>]]></paragraph>
</block>
<block title="New systems and networks"><paragraph
    title="18.5.9.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Planning and accommodating changes in technology are an essential part of securing architectures and systems development.</p>]]></paragraph>
<paragraph
    title="18.5.9.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3971"
><![CDATA[<p>Any network defence elements and devices MUST be IPv6 aware.</p>]]></paragraph>
<paragraph
    title="18.5.9.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3972"
><![CDATA[<p>New network devices, including firewalls, IDS and IPS, MUST be IPv6 capable.</p>]]></paragraph>
<paragraph
    title="18.5.9.C.03."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3974"
><![CDATA[<p>Agencies SHOULD consider the use of DNSSEC.</p>]]></paragraph>
</block>
<block title="Introducing IPv6 capable equipment to gateways"><paragraph
    title="18.5.10.R.01."

    tags="Network Security,Technical,Gateways"


><![CDATA[<p>Introducing IPv6 capable network devices into agency gateways can introduce a significant number of new security risks. Undergoing reaccreditation when new IPv6 equipment is introduced will ensure that any IPv6 functionality that is not intended to be used cannot be exploited by an attacker before appropriate information security mechanisms have been put in place.</p>]]></paragraph>
<paragraph
    title="18.5.10.C.01."

    tags="Network Security,Technical,Gateways"


    classification="All Classifications"
    compliance="Must"
    cid="4012"
><![CDATA[<p>IPv6 tunnelling MUST be blocked by network security devices at externally connected network boundaries.</p>]]></paragraph>
<paragraph
    title="18.5.10.C.02."

    tags="Network Security,Technical,Gateways"


    classification="All Classifications"
    compliance="Should"
    cid="4014"
><![CDATA[<p>Agencies deploying IPv6 equipment in their gateway but not enabling the functionality SHOULD undergo reaccreditation.</p>]]></paragraph>
</block>
<block title="Enabling IPv6 in gateways"><paragraph
    title="18.5.11.R.01."

    tags="Network Security,Technical,Gateways"


><![CDATA[<p>Once agencies have completed the transition to a dual-stack environment or completely to an IPv6 environment, reaccreditation will assist in ensuring that the associated information security mechanisms for IPv6 are working effectively.</p>]]></paragraph>
<paragraph
    title="18.5.11.C.01."

    tags="Network Security,Technical,Gateways"


    classification="All Classifications"
    compliance="Must"
    cid="4018"
><![CDATA[<p>Agencies enabling a dual-stack environment or a wholly IPv6 environment in their gateways MUST reaccredit their gateway systems.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="18.6. Peripheral (KVM) Switches"><subsection title="Objective"><paragraph
    title="18.6.1."


><![CDATA[<p>An evaluated peripheral switch is used when sharing keyboards, monitors and mice or other user interface devices, between different systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="18.6.2."


><![CDATA[<p>This section covers information relating specifically to the use of keyboard/video/mouse (KVM) switches.</p>]]></paragraph>
<paragraph
    title="18.6.3."


><![CDATA[<p>It is important to recognise that any cross-connection of system must be carefully controlled in order not to compromise trust zones. &nbsp;The principles of separation and segregation must be applied. &nbsp;These principles are discussed in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17217">Section 22.1 – Cloud Computing</a> and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation</a>.</p>]]></paragraph>
<paragraph
    title="18.6.4."


><![CDATA[<p>Cross-connection of system may also functionally create a gateway, whether or not it meets the technical definition of gateways. &nbsp;It is important to refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16568">Section 19.1 – Gateways</a> and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16643">Section 19.2 – Cross Domain Solutions</a>.</p>]]></paragraph>
</block>
<block title="Peripheral switches with more than two connections"><paragraph
    title="18.6.5."


><![CDATA[<p>If the peripheral switch has more than two systems connected then the level of assurance needed is determined by the highest and lowest of the classifications involved.</p>]]></paragraph>
</block>
<block title="Electrical Safety"><paragraph
    title="18.6.6."


><![CDATA[<p>Electrical safety is paramount.  Cross-connecting systems may create ground loops if different power sources are used for different elements of the computer system.  This may result in catastrophic failure if power supplies connected to different phases are cross-connected.</p>]]></paragraph>
</block>
<block title="Product Assurance"><paragraph
    title="18.6.7."


><![CDATA[<p>Product assurance is discussed in <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12- Product Security</a> &nbsp;It is important to note the role of the Common Criteria, the related CCRA and the use of assurance levels in determining product assurance. chapter 12 also provides essential reference to assurance levels, evaluation levels and defines high assurance as shown in the table 18.6.8 Assurance requirements.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Assurance requirements"><paragraph
    title="18.6.8.R.01."

    tags="Network Security,Technical,Assurance"


><![CDATA[<p>When accessing multiple systems through a peripheral switch it is important that sufficient assurance is available in the operation of the switch to ensure that information does not accidently pass between the connected systems.</p>]]></paragraph>
<paragraph
    title="18.6.8.R.02."

    tags="Network Security,Technical,Assurance"


><![CDATA[<p>It is important to maintain the integrity of Trust Zones and adhere to the principles of separation and segregation in order to avoid inadvertently compromising Trust Zones – even if they are at the same level of classification.</p>]]></paragraph>
<paragraph
    title="18.6.8.C.01."

    tags="Network Security,Technical,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="4051"
><![CDATA[<p>Agencies accessing a classified system and a less classified system via a peripheral switch MUST use an evaluated product with a level of assurance as indicated in the table below.</p><table class="table-main">
<tbody>
<tr>
<td><strong>High System</strong></td>
<td><strong>Low system / Alternate Trust Domain</strong></td>
<td><strong>Required Level of Assurance</strong></td>
</tr>
<tr>
<td><span>RESTRICTED</span></td>
<td>UNCLASSIFIED</td>
<td>EAL2 or PP</td>
</tr>
<tr>
<td rowspan="3">CONFIDENTIAL</td>
<td><span>UNCLASSIFIED</span></td>
<td>high assurance</td>
</tr>
<tr>
<td>RESTRICTED</td>
<td>high assurance</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>high assurance</td>
</tr>
<tr>
<td rowspan="4"><span>SECRET</span></td>
<td><span>UNCLASSIFIED</span></td>
<td>high assurance</td>
</tr>
<tr>
<td><span>RESTRICTED</span></td>
<td>high assurance</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>high assurance</td>
</tr>
<tr>
<td>SECRET</td>
<td>high assurance</td>
</tr>
<tr>
<td style="background-color: #ffffff;" rowspan="5"><br><span>TOP&nbsp;</span><span>SECRET</span></td>
<td><span>UNCLASSIFIED</span></td>
<td>high assurance</td>
</tr>
<tr>
<td><span>RESTRICTED</span></td>
<td>high assurance</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>high assurance</td>
</tr>
<tr>
<td>SECRET</td>
<td>high assurance</td>
</tr>
<tr>
<td>TOP&nbsp;SECRET</td>
<td>high assurance</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Assurance requirements for NZEO systems"><paragraph
    title="18.6.9.R.01."

    tags="Network Security,Technical,Assurance"


><![CDATA[<p>NZEO systems are particularly sensitive.  Additional security measures need to be put in place when connecting them to other systems.</p>]]></paragraph>
<paragraph
    title="18.6.9.C.01."

    tags="Network Security,Technical,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="4058"
><![CDATA[<p>Agencies accessing a system containing NZEO information and a system of the same classification that is not accredited to process NZEO information, MUST use an evaluated product with an EAL2 (or higher) or a PP level of assurance.</p>]]></paragraph>
</block>
<block title="Cross-Connecting Systems with a device other than a KVM"><paragraph
    title="18.6.10.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Cross-connecting systems with any device other than a KVM approved gateway or an approved cross-domain solution may be high risk, may compromise the integrity of Trust Zones, and may create an electrical hazard.</p>]]></paragraph>
<paragraph
    title="18.6.10.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="4066"
><![CDATA[<p>Cross-connection of security domains and Trust Zones MUST be enabled through an approved KVM, Gateway or Cross-Domain solution only.</p><table class="table-main">
<tbody>
<tr>
<td>High system</td>
<td>Low system/ Alternate Trust Domain</td>
<td>Level of assurance</td>
</tr>
<tr>
<td>
<p><strong>RESTRICTED </strong><br><strong>&amp; all lower classifications</strong></p>
</td>
<td>
<p>UNCLASSIFIED</p>
</td>
<td>
<p>EAL2 or PP</p>
</td>
</tr>
<tr>
<td rowspan="3">
<p><strong>CONFIDENTIAL</strong></p>
</td>
<td>UNCLASSIFIED</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>
<p>RESTRICTED</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td rowspan="4"><strong>SECRET</strong></td>
<td>
<p>UNCLASSIFIED</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>
<p>RESTRICTED</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>
<p>CONFIDENTIAL</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>SECRET</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td style="background-color: white;" rowspan="5">
<p><strong>TOP SECRET</strong></p>
</td>
<td>
<p>UNCLASSIFIED</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>
<p>RESTRICTED</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>
<p>CONFIDENTIAL</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>
<p>SECRET</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
<tr>
<td>
<p>TOP SECRET</p>
</td>
<td>
<p>high assurance</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
</subsection>
</section>
<section title="18.7. Inverse split tunnel VPN"><subsection title="Objective"><paragraph
    title="18.7.1."


><![CDATA[<p class="1871">Agencies identify and effectively manage the risks and compensating controls involved in utilising inverse split tunnelling as part of remote access virtual private network (VPN) configurations.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="18.7.2."


><![CDATA[<p class="1871">This section covers information relating specifically to configuring secure remote access services (also known as VPN services) for agency devices that facilitate agency information (e.g., documents or emails) being transferred to remote systems.</p>]]></paragraph>
<paragraph
    title="18.7.3."


><![CDATA[<p class="1871">It is important to recognise that all systems that are able to hold or access agency information need protection from compromise.</p>]]></paragraph>
<paragraph
    title="18.7.4."


><![CDATA[<p class="1871">Traditional network design approaches have focussed on keeping agency information within a defined perimeter unless it is explicitly released through an approved gateway (such as via an email or file transfer system), even when being accessed remotely.</p>]]></paragraph>
<paragraph
    title="18.7.5."


><![CDATA[<p class="1871">There are a number of prevalent architecture patterns for delivering remote access services that support this traditional network design approach.  Typical patterns include:</p><ol style="list-style-type: lower-alpha;">
<li>Always-on VPN services from agency-owned or agency-managed devices.</li>
<li>As-needed VPN services from agency-owned or agency-managed devices.</li>
<li>Remote desktop, or thin client, services from any devices, including BYOD.</li>
<li>Remote, or virtual, applications accessed from any devices, including BYOD.</li>
</ol>]]></paragraph>
<paragraph
    title="18.7.6."


><![CDATA[<p class="1871">With an accelerated adoption of cloud delivered services, and agency moves to increase the level of work being performed remotely through online collaboration systems, the government has <a rel="noopener noreferrer" href="https://www.digital.govt.nz/dmsdocument/166~guide-to-optimising-network-traffic-for-cloud-services/html" target="_blank">published advice on the use of inverse split tunnel architectures</a> for remote access VPN services to improve performance.</p>]]></paragraph>
<paragraph
    title="18.7.7."


><![CDATA[<p class="1871">The architecture advice advocates for the use of inverse split tunnelling, where an explicit list of authorised and trusted internet based services are able to be directly accessed, bypassing agency perimeter controls.  Both the architecture advice, and the NZISM, advise against the use of full split tunnelling (i.e., allowing all internet traffic not destined to the agency internal networks to bypass agency security controls).</p>]]></paragraph>
<paragraph
    title="18.7.8."


><![CDATA[<p class="1871">The use of inverse split tunnel VPN configurations is most likely to be appropriate for agencies that are implementing Zero Trust Architecture approaches to network security.</p>]]></paragraph>
<paragraph
    title="18.7.9."


><![CDATA[<p class="1871">Inverse split tunnel VPN configurations have related, but different, considerations from designs that only support direct access to agency-managed cloud services from the internet (where devices do not also connect to a remote access VPN service).</p>]]></paragraph>
<paragraph
    title="18.7.10."


><![CDATA[<p class="1871">It is also important to recognise that directly accessed services represent cross-connectivity between systems and must be carefully controlled in order not to compromise trust zones.  The principles of separation and segregation must be applied.  These principles are discussed in section 22.1 – Cloud computing, and section 22.2 – Virtualisation.</p>]]></paragraph>
<paragraph
    title="18.7.11."


><![CDATA[<p class="1871">Cross-connection of systems may also create a gateway, whether or not it meets the technical definition of gateways.  It is important to refer to section 19.1 – Gateways, and section 19.2 – Cross domain solutions to understand the implications and relevant controls.</p>]]></paragraph>
<paragraph
    title="18.7.12."


><![CDATA[<p class="1871">In addition to this section, split tunnelling advice is further described in <a title="Distributed working" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-17003">section 21 – Distributed working</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="18.7.13."


><![CDATA[<p class="1871">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td>
<h3>Reference</h3>
</td>
<td>
<h3>Title</h3>
</td>
<td>
<h3>Publisher</h3>
</td>
<td>
<h3>Source</h3>
</td>
</tr>
<tr>
<td>
<pre>&nbsp;</pre>
</td>
<td>
<pre>Guide to optimising network traffic for cloud services</pre>
</td>
<td>
<pre>GCDO</pre>
</td>
<td>
<pre><a rel="noopener noreferrer" href="https://www.digital.govt.nz/dmsdocument/166~guide-to-optimising-network-traffic-for-cloud-services/html" target="_blank">Guide to Optimising Network Traffic for Cloud Services | NZ Digital government</a></pre>
</td>
</tr>
</tbody>
</table><p class="1871">&nbsp;</p><p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Inverse split tunnel in remote access VPN systems"><paragraph
    title="18.7.14.R.01."

    tags="Network Security,Technical,Split tunnelling"


><![CDATA[<p class="NormS17C9">Remote access VPN services that utilise any form of split tunnelling provide a mechanism for agency devices to connect directly to third party services, bypassing the traditional perimeter.  While this provides efficiencies in network routing and can improve agency worker’s device performance, it introduces a broader range of threats and vulnerabilities to be considered.</p>]]></paragraph>
<paragraph
    title="18.7.14.C.01."

    tags="Network Security,Technical,Split tunnelling"


    classification="All Classifications"
    compliance="Must"
    cid="7250"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST undertake a threat and risk assessment on the use of inverse split tunnelling prior to enabling the functionality in remote access VPN systems.</span></p>]]></paragraph>
<paragraph
    title="18.7.14.C.02."

    tags="Network Security,Technical,Split tunnelling"


    classification="All Classifications"
    compliance="Should"
    cid="7251"
><![CDATA[<p class="Normal-nonumbering">When providing inverse split-tunnelled access to internet based services (“directly accessed services”), the following aspects SHOULD be considered as part of the threat and risk assessment:</p><ul>
<li>How do directly accessed services authenticate agency device identities prior to granting access to the service?</li>
<li>How do agency devices securely resolve internet addresses for directly accessed services?</li>
<li>How are the communications between the devices and directly accessed services secured?</li>
<li>How does an agency monitor and account for access made to directly accessed services?</li>
<li>How does an agency protect devices from compromise if they are able to directly access internet based resources, or be directly accessed from the internet?</li>
<li>How do directly accessed services authenticate the user of the agency device prior to granting access to the service (this is separate to authenticating the agency device itself)?</li>
<li>How does an agency enforce the use of multi-factor authentication with directly accessed services?</li>
<li>How does an agency authorise access to directly accessed services, and does this include from devices that are not authorised to connect to agency remote access services (authorisation and authentication are separate activities)?</li>
<li>How is access to directly accessed cloud services removed when staff no longer require access or leave the agency?</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="19. Gateway security"><section title="19.1. Gateways"><subsection title="Objective"><paragraph
    title="19.1.1."


><![CDATA[<p>To ensure that gateways are properly configured to protect agency systems and information transferred between systems from different security domains.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="19.1.2."


><![CDATA[<p>Gateways can be considered to be information flow control mechanisms operating at the Network layer and may also control information flow at the Transport, Session, Presentation and Application layers of the Open Systems Interconnection model (OSI).&nbsp; Specific controls for different technologies can be found in:</p><ul>
<li><a title="Firewalls" href="http://nzism.gcsb.govt.nz/ism-document#Section-16688">Section 19.3 –Firewalls</a></li>
<li><a title="Diodes" href="http://nzism.gcsb.govt.nz/ism-document#Section-16715">Section 19.4 – Diodes</a></li>
<li><a title="Peripherals (KVM) switches" href="http://nzism.gcsb.govt.nz/ism-document#Section-16519">Section 18.6 – Peripheral (KVM) switches;&nbsp;</a>and</li>
<li><a title="Session border controllers" href="http://nzism.gcsb.govt.nz/ism-document#Section-16735">Section 19.5 – Session Border Controllers</a>.</li>
</ul>]]></paragraph>
<paragraph
    title="19.1.3."


><![CDATA[<p class="NormS19C1">Additional information relating to topics covered in this section can be found in the following sections of this manual:</p><ul>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-12591">Section 4.4 – Accreditation Framework</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-13260">Section 8.2 – Servers and Network Devices</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-13284">Section 8.3 – Network Infrastructure</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-13306">Section 8.4 – IT Equipment</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-15349">Section 16.1 – Identification, Authentication and passwords</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-15629">Section 16.6 – Event Logging and Auditing</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16688">Section 19.3 – Firewalls</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16715">Section 19.4 – Diodes</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16735">Section 19.5 – Session Border Controllers</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16836">Section 20.1 – Data Transfers</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16876">Section 20.2 – Data Import and Export</a>; and</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16919">Section 20.3 – Content Filtering</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Deploying Gateways"><paragraph
    title="19.1.4."


><![CDATA[<p>This section provides a baseline for agencies deploying gateways.  Agencies will need to consult additional sections of this manual depending on the specific type of gateways deployed.</p>]]></paragraph>
<paragraph
    title="19.1.5."


><![CDATA[<p>For network devices used to control data flow in bi-directional gateways, <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16688">Section 19.3 – Firewalls</a> will need to be consulted. <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16715">Section 19.4 – Diodes </a>will also need to be consulted for one-way gateways.&nbsp; Additionally, for both types of gateways, <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16836">Section 20.1 - Data Transfers </a>and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16643">Section 19.2 - Cross-Domain Solutions</a>, will need to be consulted for requirements on appropriately controlling data flows.</p>]]></paragraph>
<paragraph
    title="19.1.6."


><![CDATA[<p>The requirements in this manual for content filtering, data import and data export apply to all types of gateways.</p>]]></paragraph>
</block>
<block title="Gateway classification"><paragraph
    title="19.1.7."


><![CDATA[<p>For the purposes of this chapter, the gateway assumes the highest classification of the connected domains.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="19.1.8."


><![CDATA[<p class="NormS10C1b">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td style="text-align: center;"><strong>Reference</strong></td>
<td style="text-align: center;"><strong>Title</strong></td>
<td style="width: 15%; text-align: center;"><strong>Publisher</strong></td>
<td style="text-align: center;"><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Gateway / Cross Domain Solution Audit Guide, Australian Government</strong></td>
<td style="width: 15%; text-align: center;">ASD</td>
<td><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-gateways" target="_blank">https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-gateways</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Good Practices for deploying DNSSEC, ENISA</strong></td>
<td style="width: 15%; text-align: center;"><span>ENISA</span></td>
<td><a rel="noopener noreferrer" href="https://www.enisa.europa.eu/publications/gpgdnssec" target="_blank">https://www.enisa.europa.eu/publications/gpgdnssec</a></td>
</tr>
<tr>
<td><strong><strong>ISO/IEC 27033-4:2014</strong></strong></td>
<td><strong>Information technology -- Security techniques -- Network security -- Part 4: Securing communications between networks using security gateways</strong></td>
<td style="width: 15%; text-align: center;"><span>ISO</span></td>
<td><a title="Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways" rel="noopener noreferrer" href="https://www.iso.org/standard/51583.html" target="_blank">https://www.iso.org/standard/51583.html</a></td>
</tr>
<tr>
<td>
<p><strong><strong>ISO/IEC 7498-1:1994</strong></strong></p>
</td>
<td>
<p><strong>The OSI model</strong></p>
<p><strong>Information Technology – Open Systems Interconnection: The Basic Model</strong></p>
</td>
<td style="width: 15%; text-align: center;">ISO</td>
<td><a title="Information technology — Open Systems Interconnection — Basic Reference Model: The Basic Model" rel="noopener noreferrer" href="https://www.iso.org/standard/20269.html" target="_blank">https://www.iso.org/standard/20269.html</a>&nbsp;</td>
</tr>
<tr>
<td>
<p><strong><strong>NIST Special Publication&nbsp;<strong>800-41, September 2009</strong></strong></strong></p>
</td>
<td>
<p><strong><strong>Guidelines on Firewalls and Firewall Policy</strong></strong></p>
</td>
<td style="width: 15%; text-align: center;"><span>NIST</span></td>
<td><a title="NIST SP 800-41" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41r1.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41r1.pdf [PDF, 331 KB]</a><br><a title="Information technology — Open Systems Interconnection — Basic Reference Model: The Basic Model" rel="noopener noreferrer" href="https://www.iso.org/standard/20269.html" target="_blank"></a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="19.1.9."


><![CDATA[<p class="NormS10C1b">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 100%; height: 138.723px;">
<tbody>
<tr style="height: 75.5417px;">
<td style="width: 23.7347%; height: 75.5417px;"><strong>Reference</strong></td>
<td style="width: 35.2017%; height: 75.5417px;"><strong>Title</strong></td>
<td style="width: 39.4661%; height: 75.5417px;"><strong>Source</strong></td>
</tr>
<tr style="height: 63.181px;">
<td style="width: 23.7347%; height: 63.181px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 35.2017%; height: 63.181px;">
<p>GOV5, GOV6, INFOSEC1, INFOSEC2, INFOSEC3 and INFOSEC4</p>
</td>
<td style="width: 39.4661%; height: 63.181px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Gateways involving cascaded connections"><paragraph
    title="19.1.10.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Protecting a cascaded connection path with the minimum assurance requirement of a direct connection between the highest and lowest networks ensures appropriate reduction in security risks of the extended connection.&nbsp; An illustration of a cascaded connection can be seen below.</p>
<p><img class="leftAlone" title="" src="assets/NZISM/19.1.8.R.01-Cascading-Connections.png" alt="19.1.8.R.01 Cascading Connections" width="600" height="479"></p>]]></paragraph>
<paragraph
    title="19.1.10.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3538"
><![CDATA[<p>When agencies have cascaded connections between networks involving multiple gateways they MUST ensure that the assurance levels specified for network devices between the overall lowest and highest networks are met by the gateway between the highest network and the next highest network within the cascaded connection.</p>]]></paragraph>
</block>
<block title="Using gateways"><paragraph
    title="19.1.11.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Physically locating all gateway components inside a secure server room will reduce the risk of unauthorised access to the device(s).</p>]]></paragraph>
<paragraph
    title="19.1.11.R.02."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>The system owner of the higher security domain of connected security domains would be most familiar with the controls required to protect the more sensitive information and as such is best placed to manage any shared components of gateways.&nbsp; In some cases where multiple security domains from different agencies are connected to a gateway, it may be more appropriate to have a qualified third party manage the gateway on behalf of all connected agencies.</p><p>Gateway components may also reside in a virtual environment – refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation </a>and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17362">Section 22.3 – Virtual Local Area Networks</a></p>]]></paragraph>
<paragraph
    title="19.1.11.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3548"
><![CDATA[<p>Agencies MUST ensure that:</p><ul>
<li>all agency networks are protected from networks in other security domains by one or more gateways;</li>
<li>all gateways contain mechanisms to filter or limit data flow at the network and content level to only the information necessary for business purposes; and</li>
<li>all gateway components, discrete and virtual, are physically located within an appropriately secured server room.</li>
</ul>]]></paragraph>
<paragraph
    title="19.1.11.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3551"
><![CDATA[<p>For gateways between networks in different security domains, any shared components MUST be managed by the system owners of the highest security domain or by a mutually agreed party.</p>]]></paragraph>
</block>
<block title="Configuration of gateways"><paragraph
    title="19.1.12.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Gateways are essential in controlling the flow of information between security domains.  Any failure, particularly at the higher classifications, may have serious consequences.  Hence mechanisms for alerting personnel to situations that may give rise to information security incidents are especially important for gateways.</p>]]></paragraph>
<paragraph
    title="19.1.12.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3562"
><![CDATA[<p>Agencies MUST ensure that gateways:</p><ul>
<li>are the only communications paths into and out of internal networks;</li>
<li>by default, deny all connections into and out of the network;</li>
<li>allow only explicitly authorised connections;</li>
<li>are managed via a secure path isolated from all connected networks (i.e.  physically at the gateway or on a dedicated administration network);</li>
<li>provide sufficient logging and audit capabilities to detect information security incidents, attempted intrusions or anomalous usage patterns; and</li>
<li>provide real-time alerts.</li>
</ul>]]></paragraph>
</block>
<block title="Operation of gateways"><paragraph
    title="19.1.13.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Providing an appropriate logging and audit capability will help to detect information security incidents and attempted network intrusions, allowing the agency to respond and to take measures to reduce the risk of future attempts.</p>]]></paragraph>
<paragraph
    title="19.1.13.R.02."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Storing event logs on a separate, secure log server will assist in preventing attackers from deleting logs in an attempt to destroy evidence of any intrusion.</p>]]></paragraph>
<paragraph
    title="19.1.13.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3578"
><![CDATA[<p>Agencies MUST ensure that all gateways connecting networks in different security domains:</p><ul>
<li>include a firewall of an appropriate assurance level on all gateways to filter and log network traffic attempting to enter the gateway;</li>
<li>are configured to save event logs to a separate, secure log server;</li>
<li>are protected by authentication, logging and audit of all physical access to gateway components; and</li>
<li>have all controls tested to verify their effectiveness after any changes to their configuration.</li>
</ul>]]></paragraph>
</block>
<block title="Demilitarised zones"><paragraph
    title="19.1.14.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Demilitarised zones are used to prevent direct access to information and systems on internal agency networks.  Agencies that require certain information and systems to be accessed <em>from</em> the Internet or some other form of remote access, should place them in the less trusted demilitarised zone instead of on internal agency networks.</p>]]></paragraph>
<paragraph
    title="19.1.14.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="3622"
><![CDATA[<p>Agencies MUST use demilitarised zones to house systems and information directly accessed externally.</p>]]></paragraph>
<paragraph
    title="19.1.14.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3623"
><![CDATA[<p>Agencies SHOULD use demilitarised zones to house systems and information directly accessed externally.</p>]]></paragraph>
</block>
<block title="Risk assessment"><paragraph
    title="19.1.15.R.01."

    tags="Technical,Risk Assessment,Gateways,Gateway Security"


><![CDATA[<p>Performing a risk assessment on the gateway and its configuration prior to its implementation will assist in the early identification and mitigation of security risks.</p>]]></paragraph>
<paragraph
    title="19.1.15.C.01."

    tags="Technical,Risk Assessment,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3626"
><![CDATA[<p>Agencies MUST perform a risk assessment on gateways and their configuration <em>prior</em> to their implementation.</p>]]></paragraph>
</block>
<block title="Risk transfer"><paragraph
    title="19.1.16.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Gateways could connect networks with different domain owners, including across agency boundaries.&nbsp; As a result, all domain and system owners MUST understand and accept the risks from all other networks before gateways are implemented.</p>]]></paragraph>
<paragraph
    title="19.1.16.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3630"
><![CDATA[<p>All domain and system owners connected through a gateway MUST understand and accept the residual security risk of the gateway and from any connected domains including those via a cascaded connection.</p>]]></paragraph>
<paragraph
    title="19.1.16.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3633"
><![CDATA[<p>Agencies SHOULD annually review the security architecture of the gateway and risks of all connected domains including those via a cascaded connection.</p>]]></paragraph>
</block>
<block title="Information stakeholders and Shared Ownership"><paragraph
    title="19.1.17.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Changes to a domain connected to a gateway can affect the security posture of other connected domains.  All domains owners should be considered stakeholders in all connected domains.</p>]]></paragraph>
<paragraph
    title="19.1.17.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="3637"
><![CDATA[<p>Once connectivity is established, domain owners MUST be considered information stakeholders for all connected domains.</p>]]></paragraph>
<paragraph
    title="19.1.17.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3640"
><![CDATA[<p>Once connectivity is established, domain owners SHOULD be considered information stakeholders for all connected domains.</p>]]></paragraph>
</block>
<block title="System user training"><paragraph
    title="19.1.18.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>It is important that system users are competent to use gateways in a secure manner.  This can be achieved through appropriate training before being granted access.</p>]]></paragraph>
<paragraph
    title="19.1.18.C.01."

    tags="Governance,Gateways,Gateway Security"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="3648"
><![CDATA[<p>All system users MUST be trained on the secure use and security risks of the gateways before being granted access.</p>]]></paragraph>
<paragraph
    title="19.1.18.C.02."

    tags="Governance,System Access,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3649"
><![CDATA[<p>All system users SHOULD be trained in the secure use and security risks of the gateways before being granted access.</p>]]></paragraph>
</block>
<block title="Administration of gateways"><paragraph
    title="19.1.19.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Application of role separation and segregation of duties in administration activities will protect against security risks posed by a malicious system user with extensive access to gateways.</p>]]></paragraph>
<paragraph
    title="19.1.19.C.01."

    tags="Technical,System Access,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3660"
><![CDATA[<p>Agencies MUST limit access to gateway administration functions.</p>]]></paragraph>
<paragraph
    title="19.1.19.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3663"
><![CDATA[<p>Agencies MUST ensure that system administrators are formally trained to manage gateways by qualified trainers.</p>]]></paragraph>
<paragraph
    title="19.1.19.C.03."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3668"
><![CDATA[<p>Agencies MUST ensure that all system administrators of gateways that process NZEO information meet the nationality requirements for these endorsements.</p>]]></paragraph>
<paragraph
    title="19.1.19.C.04."

    tags="Technical,Gateways,Gateway Security"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="3672"
><![CDATA[<p>Agencies MUST separate roles for the administration of gateways (e.g.  separate network and security policy configuration roles).</p>]]></paragraph>
<paragraph
    title="19.1.19.C.05."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3676"
><![CDATA[<p>Agencies SHOULD separate roles for the administration of gateways (e.g. separate network and security policy configuration roles).</p>]]></paragraph>
</block>
<block title="System user authentication"><paragraph
    title="19.1.20.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Authentication to networks as well as gateways can reduce the risk of unauthorised access and provide an audit capability to support the investigation of information security incidents.</p>]]></paragraph>
<paragraph
    title="19.1.20.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3683"
><![CDATA[<p>Agencies MUST authenticate system users to all classified networks accessed through gateways.</p>]]></paragraph>
<paragraph
    title="19.1.20.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3685"
><![CDATA[<p>Agencies MUST ensure that only authenticated and authorised system users can use the gateway.</p>]]></paragraph>
<paragraph
    title="19.1.20.C.03."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3686"
><![CDATA[<p>Agencies SHOULD use multi-factor authentication for access to networks and gateways.</p>]]></paragraph>
</block>
<block title="IT equipment authentication"><paragraph
    title="19.1.21.R.01."

    tags="IT Equipment,Technical,Gateways,Gateway Security"


><![CDATA[<p>Authenticating IT equipment to networks accessed through gateways will assist in preventing unauthorised IT equipment connecting to a network.</p>]]></paragraph>
<paragraph
    title="19.1.21.C.01."

    tags="IT Equipment,Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3695"
><![CDATA[<p>Agencies SHOULD authenticate any IT equipment that connects to networks accessed through gateways.</p>]]></paragraph>
</block>
<block title="Configuration control"><paragraph
    title="19.1.22.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>To avoid changes that may introduce vulnerabilities into a gateway, agencies should fully consider any changes and associated risks.&nbsp; Changes may also necessitate re-certification and accreditation of the system, see <a title="System Certification and Accreditation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 – System Certification and Accreditation</a>.</p>]]></paragraph>
<paragraph
    title="19.1.22.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="3702"
><![CDATA[<p>Agencies MUST undertake a risk assessment and update the SRMP before changes are implemented.</p>]]></paragraph>
<paragraph
    title="19.1.22.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3705"
><![CDATA[<p>Agencies MUST document any changes to gateways in accordance with the agency’s Change Management Policy.</p>]]></paragraph>
<paragraph
    title="19.1.22.C.03."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3707"
><![CDATA[<p>Agencies SHOULD undertake a risk assessment and update the SRMP before changes are implemented.</p>]]></paragraph>
</block>
<block title="Testing of gateways"><paragraph
    title="19.1.23.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>The testing of security measures on gateways will assist in ensuring that the integrity of the gateway is being maintained.  An attacker who is aware of the regular testing schedule may cease malicious activities during such periods to avoid detection.  Any test should, therefore, be unannounced and conducted at irregular intervals.</p>]]></paragraph>
<paragraph
    title="19.1.23.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3712"
><![CDATA[<p>Agencies SHOULD ensure that testing of security measures is performed at random intervals no more than six months apart.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="19.2. Cross Domain Solutions (CDS)"><subsection title="Objective"><paragraph
    title="19.2.1."


><![CDATA[<p>Cross-Domain Solutions secure transfers between systems of differing classifications or trust levels with high assurance over the security of systems and information.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="19.2.2."


><![CDATA[<p>This section describes the use and implementation of Cross Domain Solutions (CDS).</p>]]></paragraph>
<paragraph
    title="19.2.3."


><![CDATA[<p>CDS provide information flow control mechanisms at each layer of the OSI model with a higher level of assurance than typical gateways.  This section extends the preceding Gateways section.  CDS systems must apply controls from each section.</p>]]></paragraph>
<paragraph
    title="19.2.4."


><![CDATA[<p>19.2.1.&nbsp;&nbsp;&nbsp;&nbsp; Additional information relating to topics covered in this section can be found in the following chapters and sections:</p><ul>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-12591">Section 4.4 – Accreditation Framework</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-13260">Section 8.2 – Servers and Network Devices</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-13284">Section 8.3 – Network Infrastructure</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-13306">Section 8.4 – IT Equipment</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-15349">Section 16.1 – Identification, Authentication and passwords</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-15629">Section 16.6 – Event Logging and Auditing</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16568">Section 19.1 – Gateways</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16688">Section 19.3 – Firewalls</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16715">Section 19.4 – Diodes</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16735">Section 19.5 – Session Border Controllers</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16836">Section 20.1 – Data Transfers</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16876">Section 20.2 – Data Import and Export</a>; and</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16919">Section 20.3 – Content Filtering</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Deploying Cross Domain Solutions"><paragraph
    title="19.2.5."


><![CDATA[<p>Consult the section on Firewalls in this chapter for devices used to control data flow in bi-directional gateways.</p>]]></paragraph>
<paragraph
    title="19.2.6."


><![CDATA[<p>Consult the section on Diodes in this chapter for devices used to control data flow in uni-directional gateways.</p>]]></paragraph>
<paragraph
    title="19.2.7."


><![CDATA[<p>Consult the Data Transfers and Content Filtering sections for requirements on appropriately controlling data flows in both bi-directional and uni-directional gateways</p>]]></paragraph>
</block>
<block title="Types of gateways"><paragraph
    title="19.2.8."


><![CDATA[<p>This manual defines three types of gateways:</p><ul>
<li>access gateways;</li>
<li>multilevel gateways; and</li>
<li>transfer gateways.</li>
</ul>]]></paragraph>
</block>
<block title="Access Gateway"><paragraph
    title="19.2.9."


><![CDATA[<p>An access gateway provides the system user with access to multiple security domains from a single device.</p>
<p><img class="leftAlone" title="" src="assets/NZISM/19.2.9-Access-gateway.png" alt="19.2.9. Access Gateway" width="600" height="574"></p>]]></paragraph>
<paragraph
    title="19.2.10."


><![CDATA[<p>A transfer gateway facilitates the transfer of information, in one or multiple directions (low to high or high to low) between different security domains.  A traditional gateway to the Internet is considered a form of transfer gateway.</p>]]></paragraph>
<paragraph
    title="19.2.11."


><![CDATA[<p>The following illustrates a Uni-Directional Transfer Cross Domain Solution.</p>
<p><img class="leftAlone" title="" src="assets/NZISM/19.2.11-Uni-DIrectional.png" alt="19.2.11 Uni-Directional" width="600" height="461"></p>]]></paragraph>
<paragraph
    title="19.2.12."


><![CDATA[<p>A Bi-Directional Cross Domain Solution enables access, based on authorisations, to data at multiple classifications and releasability levels.</p>
<p><img class="leftAlone" title="" src="assets/NZISM/19.2.12-Bi-Directional.png" alt="19.2.12 Bi-Directional" width="600" height="519"></p>]]></paragraph>
<paragraph
    title="19.2.13."


><![CDATA[<p>A Multi-Level Transfer Cross Domain Solution enables access, based on authorisations, to data at multiple classifications and releasability levels.</p>
<p><img class="leftAlone" title="" src="assets/NZISM/19.2.13-Multi-Level.png" alt="19.2.13 Multi-Level" width="600" height="663"></p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="19.2.14."


><![CDATA[<p>Additional guidance can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cross Domain Solutions</strong></p>
</td>
<td style="text-align: center;">ASD</td>
<td style="width: 33%;">
<p><a title="Cross Domain Solutions" rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/guidance/cross-domain-solutions" target="_blank"></a><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/introduction-cross-domain-solutions" target="_blank">Introduction to Cross Domain Solutions | Cyber.gov.au</a><a title="Cross Domain Solutions" rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/guidance/cross-domain-solutions" target="_blank"></a></p>
<p><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/fundamentals-cross-domain-solutions" target="_blank">Fundamentals of Cross Domain Solutions | Cyber.gov.au</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Security principles for Cross Domain Solution</strong></td>
<td style="text-align: center;">NCSC UK</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/collection/cross-domain-solutions" target="_blank">Security principles for cross domain solutions - NCSC.GOV.UK</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Cross Domain Security Primer</strong></td>
<td style="text-align: center;">CSE Canada</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.cyber.gc.ca/en/guidance/cross-domain-security-primer-itsb-120" target="_blank">Cross domain security primer (ITSB-120) - Canadian Centre for Cyber Security</a></p>
</td>
</tr>
<tr>
<td><strong><strong>Sse-100-1</strong></strong></td>
<td><strong>Information Assurance Guidance For Systems Based On A Security Real-Time Operating System Systems Security Engineering&nbsp;</strong></td>
<td style="text-align: center;">NSA</td>
<td style="width: 33%;">
<p>Available at:</p>
<p><a rel="noopener noreferrer" href="https://www.amazon.com/National-Information-Assurance-Real-Time-Operating/dp/1508545707" target="_blank">National Security Agency Information Assurance Guidance for Systems Based on a Security Real-Time Operating System: Systems Security Engineering: National Security Agency: 9781508545705: Amazon.com: Books</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Solving the Cross-Domain Conundrum,</strong></p>
<strong>Colonel Bernard F. Koelsch United States Army, 2013</strong></td>
<td style="text-align: center;">US Army War College</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://apps.dtic.mil/sti/pdfs/ADA589325.pdf" target="_blank">ADA589325.pdf (dtic.mil)</a> &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><a href="https://www.microsoft.com/en-us/security/blog/2020/07/29/inside-microsoft-threat-protection-solving-cross-domain-security-incidents-through-the-power-of-correlation-analytics/"></a><strong>Inside Microsoft 365 Defender: Solving cross-domain security incidents through the power of correlation analytics - Microsoft Security Blog</strong></p>
</td>
<td style="text-align: center;">Microsoft</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.microsoft.com/en-us/security/blog/2020/07/29/inside-microsoft-threat-protection-solving-cross-domain-security-incidents-through-the-power-of-correlation-analytics/" target="_blank">Inside Microsoft 365 Defender: Solving cross-domain security incidents through the power of correlation analytics - Microsoft Security Blog</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Shedding Light on Cross Domain Solutions</strong></td>
<td style="text-align: center;">SANS</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.sans.org/reading-room/whitepapers/dlp/shedding-light-cross-domain-solutions-36492" target="_blank">https://www.sans.org/reading-room/whitepapers/dlp/shedding-light-cross-domain-solutions-36492</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Gateway classification"><paragraph
    title="19.2.15.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>The trust level or classification of systems directs users and systems administrators to the appropriate handling instructions and level of protection required for those systems.  This aids in the selection of systems controls.</p>]]></paragraph>
<paragraph
    title="19.2.15.C.01."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3870"
><![CDATA[<p>For the purposes of this Manual, the CDS MUST be classified at the highest classification of connected domains.</p>]]></paragraph>
</block>
<block title="Allowable gateways"><paragraph
    title="19.2.16.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Connecting systems to the Internet attracts significant risk and so highly classified systems are prohibited from being <em>directly</em> connected to each other or to the Internet.  If an agency wishes to connect a highly classified system to the Internet the connection will need to be cascaded through a system of a lesser classification that is approved to connect directly to the Internet.</p>]]></paragraph>
<paragraph
    title="19.2.16.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3880"
><![CDATA[<p>Agencies connecting a TOP SECRET, SECRET OR CONFIDENTIAL network to any other network MUST implement a CDS.</p>]]></paragraph>
<paragraph
    title="19.2.16.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="Secret, Top Secret, Confidential"
    compliance="Must Not"
    cid="3887"
><![CDATA[<p>Agencies MUST NOT implement a gateway permitting data to flow directly from:</p><ul>
<li>a TOP SECRET network to any network below SECRET;</li>
<li>a SECRET network to an UNCLASSIFIED network; or</li>
<li>a CONFIDENTIAL network to an UNCLASSIFIED network.</li>
</ul>]]></paragraph>
</block>
<block title="Implementing Cross Domain Solutions"><paragraph
    title="19.2.17.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>Connecting multiple sets of gateways and Cross Domain Solutions (CDS) increases the threat surface and, consequently, the likelihood and impact of a network compromise.  When a gateway and a CDS share a common network, the higher security domain (such as a classified agency network) can be exposed to malicious activity, exploitation or denial of service from the lower security domain (such as the Internet).</p>]]></paragraph>
<paragraph
    title="19.2.17.R.02."

    tags="Technical,Gateway Security"


><![CDATA[<p>To manage this risk, CDS should implement products that have completed a high assurance evaluation, see <a title="Product Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>.&nbsp; The <a title="AISEP" rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/assessment-and-evaluation-programs/australian-information-security-evaluation-program" target="_blank">AISEP Evaluated Product List (EPL)</a> includes products that have been evaluated in the high assurance scheme but is not an exhaustive list.</p>
<p>Where CDS are not listed on the AISEP EPL, the GCSB can provide guidance on product selection and implementation on request.</p>]]></paragraph>
<paragraph
    title="19.2.17.C.01."

    tags="Technical,Gateway Security"


    classification="Secret, Confidential"
    compliance="Must"
    cid="3926"
><![CDATA[<p>When designing and deploying a CDS, agencies MUST consult with the GCSB and comply with all directions provided.</p>]]></paragraph>
<paragraph
    title="19.2.17.C.02."

    tags="Technical,Gateway Security"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="3927"
><![CDATA[<p>Agencies connecting a typical gateway and a CDS to a common network MUST consult the GCSB on the impact to the security of the CDS and comply with all directions provided.</p>]]></paragraph>
</block>
<block title="Separation of data flows"><paragraph
    title="19.2.18.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>Gateways connecting highly classified systems to lower classified, or Internet connected systems need to incorporate physically separate paths to provide stronger control of information flows.  Typically this is achieved through separate pathing and the use of diodes. Such gateways are generally restricted to process and communicate only highly-structured formal messaging traffic.</p>]]></paragraph>
<paragraph
    title="19.2.18.C.01."

    tags="Technical,Gateway Security"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="3929"
><![CDATA[<p>Agencies MUST ensure that all bi-directional gateways between TOP SECRET and SECRET networks, SECRET and less classified networks, and CONFIDENTIAL and less classified networks, have separate upward and downward paths which use a diode and physically separate infrastructure for each path.</p>]]></paragraph>
</block>
<block title="Trusted sources"><paragraph
    title="19.2.19.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>Trusted sources are designated personnel who have the delegated authority to assess and approve the transfer or release of data or documents.  Trusted sources may include security personnel within the agency such the CISO and the ITSM.</p>]]></paragraph>
<paragraph
    title="19.2.19.C.01."

    tags="Technical,Gateway Security"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3932"
><![CDATA[<p>Trusted sources MUST be:</p><ul>
<li>a strictly limited list derived from business requirements and the result of a security risk assessment;</li>
<li>where necessary an appropriate security clearance is held; and</li>
<li>approved by the Accreditation Authority.</li>
</ul>]]></paragraph>
<paragraph
    title="19.2.19.C.02."

    tags="Technical,Gateway Security"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="3933"
><![CDATA[<p>Trusted sources MUST authorise all data to be exported from a security domain.</p>]]></paragraph>
</block>
<block title="Operation of the Cross Domain Solution"><paragraph
    title="19.2.20.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>The highly sensitive nature of the data within cross domain solutions requires additional audit and logging for control, management, record and forensic purposes.&nbsp; This is in addition to the audit and logging requirements in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15629">Section 16.6 – Event Logging and Auditing</a>.</p>]]></paragraph>
<paragraph
    title="19.2.20.C.01."

    tags="Technical,Gateway Security"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3936"
><![CDATA[<p>All data exported from a security domain MUST be logged.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="19.3. Firewalls"><subsection title="Objective"><paragraph
    title="19.3.1."


><![CDATA[<p>Agencies operating bi-directional gateways implement firewalls and traffic flow filters to provide a protective layer to their networks in both discrete and virtual environments.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="19.3.2."


><![CDATA[<p>This section covers information relating to filtering requirements for bi-direction gateways between networks of different security domains.</p>]]></paragraph>
<paragraph
    title="19.3.3."


><![CDATA[<p>When a control specifies a requirement for a diode or filter the appropriate information can be found within <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16715">Section 19.4 –Diodes </a>and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16919">Section 20.3 – Content Filtering</a>.</p>]]></paragraph>
<paragraph
    title="19.3.4."


><![CDATA[<p>Additional information that also applies to topics covered in the section can be found in:</p><ul>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security </a>which provides advice on the selection of evaluated products;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16836">Section 20.1 – Data Transfers</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16876">Section 20.2 – Data Import and Export</a>; and</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Inter-connecting networks within an agency"><paragraph
    title="19.3.5."


><![CDATA[<p>When connecting networks accredited to the same classification and set of endorsements within an agency the requirements of this section may not apply.  When connecting networks accredited with different classifications or endorsements within an agency the information in this section applies.</p>]]></paragraph>
</block>
<block title="Connecting agency networks to the Internet"><paragraph
    title="19.3.6."


><![CDATA[<p>When connecting an agency network to the Internet, the Internet is considered an UNCLASSIFIED and insecure network.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="19.3.7."


><![CDATA[<p>Further information on the Network Device Protection Profile (NDPP) and firewalls can be found at:</p><table class="table-main">
<tbody>
<tr>
<td style="text-align: center;"><strong>Reference&nbsp;</strong></td>
<td style="text-align: center;"><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td style="text-align: center;"><strong>Source</strong></td>
</tr>
<tr>
<td><strong><strong>NDPP</strong></strong></td>
<td><strong>Network Device Protection Profile (NDPP)</strong></td>
<td style="text-align: center;">(US) National Information Assurance Partnership</td>
<td><a rel="noopener noreferrer" href="https://www.niap-ccevs.org/Profile/Info.cfm?PPID=293&amp;id=293" target="_blank">https://www.niap-ccevs.org/Profile/Info.cfm?PPID=293&amp;id=293</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Firewall assurance levels"><paragraph
    title="19.3.8.R.01."

    tags="Technical"


><![CDATA[<p>The higher the required assurance level for a firewall, the greater the assurance that it provides an appropriate level of protection against an attacker.  For example, an EAL2 firewall is certified to provide protection against a basic threat potential, whilst an EAL4 firewall is certified to provide protection against a moderate threat potential. A Protection Profile (PP) is considered to be equivalent to EAL2 under its Common Criteria Recognition Arrangement.</p>]]></paragraph>
<paragraph
    title="19.3.8.R.02."

    tags="Technical"


><![CDATA[<p>If a uni-directional connection between two networks is being implemented only one gateway is necessary with requirements being determined based on the source and destination networks.  However, if a bi-directional connection between two networks is being implemented both gateways will be configured and implemented with requirements being determined based on the source and destination networks.</p>]]></paragraph>
<paragraph
    title="19.3.8.C.01."

    tags="Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3970"
><![CDATA[<p>All gateways MUST contain a firewall in both physical and virtual environments.</p>]]></paragraph>
<paragraph
    title="19.3.8.C.02."

    tags="Software Security"


    classification="All Classifications"
    compliance="Must"
    cid="3973"
><![CDATA[<p>Agencies MUST check the evaluation has examined the security enforcing functions by reviewing the target of evaluation/security target and other testing documentation.</p>]]></paragraph>
<paragraph
    title="19.3.8.C.03."

    tags="Software Security"


    classification="All Classifications"
    compliance="Must"
    cid="3975"
><![CDATA[<p>Agencies MUST use devices as shown in the following table for their gateway when connecting two networks of different classifications or two networks of the same classification but of different security domains.</p><div align="center">
<table class="table-secondary" cellpadding="5">
<tbody>
<tr>
<td colspan="2"><b>Your network</b></td>
<td><b>Their network</b></td>
<td><b>You require</b></td>
<td><b>They require</b></td>
</tr>
<tr>
<td rowspan="5"><b>RESTRICTED and below</b></td>
<td class="table-cell-black" rowspan="5"> </td>
<td><b>UNCLASSIFIED</b></td>
<td><b>EAL4 firewall</b></td>
<td><b>N/A</b></td>
</tr>
<tr>
<td><b>RESTRICTED</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>CONFIDENTIAL</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>EAL4 firewall</b></td>
</tr>
<tr>
<td><b>SECRET</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>EAL4 firewall</b></td>
</tr>
<tr>
<td><b>TOP SECRET</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>Consultation with GCSB</b></td>
</tr>
<tr>
<td rowspan="5"><b>CONFIDENTIAL</b></td>
<td class="table-cell-green" rowspan="5"> </td>
<td><b>UNCLASSIFIED</b></td>
<td><b>Consultation with GCSB</b></td>
<td><b>N/A</b></td>
</tr>
<tr>
<td><b>RESTRICTED</b></td>
<td><b>EAL4 firewall</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>CONFIDENTIAL</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>SECRET</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>EAL4 firewall</b></td>
</tr>
<tr>
<td><b>TOP SECRET</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>Consultation with GCSB</b></td>
</tr>
<tr>
<td rowspan="5"><b>SECRET</b></td>
<td class="table-cell-blue" rowspan="5"> </td>
<td><b>UNCLASSIFIED</b></td>
<td><b>Consultation with GCSB</b></td>
<td><b>N/A</b></td>
</tr>
<tr>
<td><b>RESTRICTED</b></td>
<td><b>EAL4 firewall</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>CONFIDENTIAL</b></td>
<td><b>EAL4 firewall</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>SECRET</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>TOP SECRET</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>EAL4 firewall</b></td>
</tr>
<tr>
<td rowspan="5"><b>TOP SECRET</b></td>
<td class="table-cell-red" rowspan="5"> </td>
<td><b>UNCLASSIFIED</b></td>
<td><b>Consultation with GCSB</b></td>
<td><b>N/A</b></td>
</tr>
<tr>
<td><b>RESTRICTED</b></td>
<td><b>Consultation with GCSB</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>CONFIDENTIAL</b></td>
<td><b>Consultation with GCSB</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>SECRET</b></td>
<td><b>EAL4 firewall</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>TOP SECRET</b></td>
<td><b>EAL4 firewall</b></td>
<td><b>EAL4 firewall</b></td>
</tr>
</tbody>
</table>
</div>]]></paragraph>
<paragraph
    title="19.3.8.C.04."

    tags="Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3996"
><![CDATA[<p>The requirement to implement a firewall as part of gateway architecture MUST be met separately and independently by both parties (gateways) in both physical and virtual environments.</p><p>Shared equipment DOES NOT satisfy the requirements of this control.</p>]]></paragraph>
</block>
<block title="Firewall assurance levels for NZEO networks"><paragraph
    title="19.3.9.R.01."

    tags="Web Applications"


><![CDATA[<p>As NZEO networks are particularly sensitive, additional security measures need to be put in place when connecting them to other networks.</p>]]></paragraph>
<paragraph
    title="19.3.9.C.01."

    tags="Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3999"
><![CDATA[<p>Agencies MUST use a firewall of at least an EAL4 assurance level between an NZEO network and a foreign network in addition to the minimum assurance levels for firewalls between networks of different classifications or security domains.</p>]]></paragraph>
<paragraph
    title="19.3.9.C.02."

    tags="Software Security"


    classification="All Classifications"
    compliance="Must"
    cid="4000"
><![CDATA[<p>In all other circumstances the table at 19.3.8.C.03 MUST apply.</p>]]></paragraph>
<paragraph
    title="19.3.9.C.03."

    tags="Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="4001"
><![CDATA[<p>Agencies SHOULD use a firewall of at least an EAL2 assurance level or a Protection Profile between an NZEO network and another New Zealand controlled network within a single security domain.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="19.4. Diodes"><subsection title="Objective"><paragraph
    title="19.4.1."


><![CDATA[<p>Networks connected to one-way (uni-directional) gateways implement diodes in order to protect the higher classified system.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="19.4.2."


><![CDATA[<p>This section covers information relating to filtering requirements for one-way gateways used to facilitate data transfers.&nbsp; Additional information that also applies to topics covered in the section can be found in:</p><ul>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security </a>which provides advice on selecting evaluated products.</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16836">Section 20.1 – Data Transfers</a>; and</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16876">Section 20.2 – Data Import and Export</a>;</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="19.4.3."


><![CDATA[<p>Further information on the Evaluated Products List can be found at:</p><table class="table-main">
<tbody>
<tr>
<td style="text-align: center;"><strong>Reference</strong></td>
<td style="text-align: center;"><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td style="text-align: center;"><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Evaluated Products List (EPL)</strong></td>
<td style="text-align: center;">AISEP</td>
<td><a title="EPL" rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/epl-products" target="_blank">https://www.cyber.gov.au/acsc/view-all-content/epl-products</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Diode assurance levels"><paragraph
    title="19.4.4.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p style="text-align: left;">A diode enforces one-way flow of network traffic thus requiring separate paths for incoming and outgoing data.  As such, it is much more difficult for an attacker to use the same path to both launch an attack and release the information.  Using diodes of higher assurance levels for higher classified networks provides an appropriate level of assurance to agencies that the specified security functionality of the product will operate as claimed.</p>]]></paragraph>
<paragraph
    title="19.4.4.C.01."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4015"
><![CDATA[<p>Agencies MUST use devices as shown in the following table for controlling the data flow of one-way gateways between networks of different classifications.</p><div align="center">
<table class="table-secondary" cellpadding="5">
<tbody>
<tr>
<td colspan="2">High network</td>
<td>Low network</td>
<td>You require</td>
</tr>
<tr>
<td rowspan="2">RESTRICTED</td>
<td class="table-cell-black" rowspan="2">&nbsp;</td>
<td>UNCLASSIFIED</td>
<td>EAL2 or PP diode</td>
</tr>
<tr>
<td>RESTRICTED</td>
<td>EAL2 or PP diode</td>
</tr>
<tr>
<td rowspan="3">CONFIDENTIAL</td>
<td class="table-cell-green" rowspan="3">&nbsp;</td>
<td>UNCLASSIFIED</td>
<td>high assurance diode</td>
</tr>
<tr>
<td>RESTRICTED</td>
<td>high assurance diode</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>high assurance diode</td>
</tr>
<tr>
<td rowspan="4">SECRET</td>
<td class="table-cell-blue" rowspan="4">&nbsp;</td>
<td>UNCLASSIFIED</td>
<td>high assurance diode</td>
</tr>
<tr>
<td>RESTRICTED</td>
<td>high assurance diode</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>high assurance diode</td>
</tr>
<tr>
<td>SECRET</td>
<td>high assurance diode</td>
</tr>
<tr>
<td rowspan="5">TOP SECRET</td>
<td class="table-cell-red" rowspan="5">&nbsp;</td>
<td>UNCLASSIFIED</td>
<td>high assurance diode</td>
</tr>
<tr>
<td>RESTRICTED</td>
<td>high assurance diode</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>high assurance diode</td>
</tr>
<tr>
<td>SECRET</td>
<td>high assurance diode</td>
</tr>
<tr>
<td>TOP SECRET</td>
<td>high assurance diode</td>
</tr>
</tbody>
</table>
</div>]]></paragraph>
</block>
<block title="Diode assurance levels for NZEO networks"><paragraph
    title="19.4.5.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>As NZEO networks are particularly sensitive additional security measures are necessary when connecting them to other networks.</p>]]></paragraph>
<paragraph
    title="19.4.5.C.01."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4028"
><![CDATA[<p>Agencies MUST use a diode of at least an EAL4 assurance level between an NZEO network and a foreign network in addition to the minimum assurance levels for diodes between networks of different classifications.</p>]]></paragraph>
<paragraph
    title="19.4.5.C.02."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4030"
><![CDATA[<p>In all other circumstances the table at <a href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-16726">19.4.4.C.01</a> MUST apply.</p>]]></paragraph>
<paragraph
    title="19.4.5.C.03."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4032"
><![CDATA[<p>Agencies SHOULD use a diode of at least an EAL2 assurance level or a Protection Profile between an NZEO network and another New Zealand controlled network within a single security domain.</p>]]></paragraph>
</block>
<block title="Volume Checking"><paragraph
    title="19.4.6.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>Monitoring the volume of data being transferred across a diode will ensure that it conforms to expectations.  It can also alert the agency to potential malicious activity if the volume of data suddenly changes from the norm.</p>]]></paragraph>
<paragraph
    title="19.4.6.C.01."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4039"
><![CDATA[<p>Agencies deploying a diode to control data flow within one-way gateways SHOULD monitor the volume of the data being transferred.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="19.5. Session Border Controllers"><subsection title="Objective"><paragraph
    title="19.5.1."


><![CDATA[<p>To ensure the use of Session Border Controllers (SBCs) is integrated with the agency’s security architecture and that use is consistent with other requirements for gateway security in this chapter.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="19.5.2."


><![CDATA[<p>This section encompasses the use of SBCs in Voice over Internet Protocol (VoIP) and Unified Communication (UC) networks within an agency.  It describes key risks and threats and provides guidance on the conceptual design of security for such systems.</p>]]></paragraph>
<paragraph
    title="19.5.3."


><![CDATA[<p>It is important to note that Service Providers generally have operational objectives different to those of the agency and typically they will:</p><ul>
<li>Design a highly operationally optimised network requiring minimal maintenance;</li>
<li>Provide resources, including SBCs, softswitches and media gateways that are shared between a number of customers (such as multi-tenanted data centres);</li>
<li>The standard model may not accommodate all unique agency or NZ Government requirements which will then require special consideration.</li>
</ul>]]></paragraph>
<paragraph
    title="19.5.4."


><![CDATA[<p>Reference should &nbsp;also be made to the following sections:</p><ul>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13001">Chapter 6 – Information Security Monitoring</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information Security Incidents</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 – Personnel Security</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13958">Chapter 11 – Communications Systems and Devices</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Block-14707">Section 13.1.12 – Archiving</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access control and passwords;</a></li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16369">Section 18.3 - Video &amp; Telephony Conferencing and Internet Protocol Telephony</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Definitions"><paragraph
    title="19.5.5."


><![CDATA[<p>A Session Border Controller (SBC) is a device (physical or virtual) used in IP networks to control and manage the signalling and media streams of real-time UC and VoIP connections.&nbsp; See also <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16369">Section 18.3 – Video &amp; Telephony Conferencing and Internet Protocol Telephony</a>.&nbsp; It includes establishing, controlling, and terminating calls, interactive media communications or other VoIP connections.&nbsp; SBCs enable VoIP traffic to navigate gateways and firewalls and ensure interoperability between different SIP implementations.&nbsp; Careful selection of SBCs will provide such functionality as prevention of toll fraud, resistance to denial of service attacks and resistance to eavesdropping.</p>]]></paragraph>
<paragraph
    title="19.5.6."


><![CDATA[<p>Unified Communications (UC) is a term describing the integration of real-time and near real time communication and interaction services in an organisation or agency.&nbsp; UC may integrate several communication systems including unified messaging, collaboration, and interaction systems; real-time and near real-time communications; and transactional applications.</p>]]></paragraph>
<paragraph
    title="19.5.7."


><![CDATA[<p>UC may, for example, include services such as instant messaging (chat), presence information, voice, mobility, audio, web &amp; video conferencing, data sharing (such as interactive whiteboards), voicemail, e-mail, SMS and fax.  UC is not necessarily a single product, but more usually a set of products designed to provide a unified user-interface and user-experience across multiple devices and media-types.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Purpose"><paragraph
    title="19.5.8."


><![CDATA[<p>Traditional demarcation points, such as media gateways, are no longer natural boundaries.  Older firewall technology impacts the performance of communications systems, including VoIP and UC.  SBCs were introduced to improve performance and provide interoperability with real-time and near real-time communications.  They provide a new natural demarcation point.</p>]]></paragraph>
<paragraph
    title="19.5.9."


><![CDATA[<p>SBCs can provide a demarcation or normalisation point within the agency’s network, allow enforcement of agency specific security policies and provide a greater degree of accountability than the usual contract with service providers.</p>]]></paragraph>
 </subsection>
<subsection title="Risks and Threats"><paragraph
    title="19.5.10"


><![CDATA[<p>Risks and threats associated with the use of VoIP and UC include:</p><ul>
<li>Confidentiality (eavesdropping);</li>
<li>Integrity (enabling fraud and theft as well as compromising privacy); and</li>
<li>Availability (including Denial of Service [DoS or DDoS]).</li>
</ul>]]></paragraph>
 <block title="Confidentiality"><paragraph
    title="19.5.11."


><![CDATA[<p>There is a high likelihood of eavesdropping in VoIP systems. Traditional telephone systems require physical access to tap a line or compromise a PABX or switch.  In VoIP networks, virtual LAN environments can be exploited remotely to identify weaknesses within and between virtual LANs and gain access to valuable information.  Sniffing is another form of eavesdropping that involves capturing unencrypted voice traffic with malware or a specific VoIP sniffer tool.  In common with other Internet connected systems, adversary-in-the-middle exploits are also used to eavesdrop on both data and VoIP networks.</p>]]></paragraph>
</block>
<block title="Integrity"><paragraph
    title="19.5.12."


><![CDATA[<p>Exploits such as caller ID spoofing are relatively easy to execute and can be extremely costly to businesses.  Information from a stolen credit card or acquisition of other sensitive data, can compromise an employee’s caller ID, and have funds transferred while posing as the employee.  Cyber criminals can also change an employee’s registration information in order to eavesdrop on or intercept all incoming calls for that individual.</p>]]></paragraph>
<paragraph
    title="19.5.13."


><![CDATA[<p>Integrity compromise may include modification or insertion into UC.  As many UC elements, such as voicemail or email, may encompass electronic records as defined in legislation it is vital that these elements are preserved unaltered.</p>]]></paragraph>
</block>
<block title="Availability"><paragraph
    title="19.5.14."


><![CDATA[<p>Because VoIP and UC places high levels of demand on any network, managing Quality of Service (QoS), latency, jitter, packet loss and other service impediments are important aspects of availability.  In the event of major faults or outages, diversity and fault tolerance is vital for all key sites.  To enable failover, for example, where calls leave the customer network, call diversity and call failover are essential configuration elements.</p>]]></paragraph>
</block>
<block title="Denial of Service"><paragraph
    title="19.5.15."


><![CDATA[<p>Denial of Service (DoS) attacks abuse signalling protocols to deny availability of VoIP data and degrade performance.  If the telecommunications network is compromised, it is possible to also traverse systems to attack or infect the agency’s data networks and other systems.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Common VoIP and UC Security Risks and Threats"><paragraph
    title="19.5.16."


><![CDATA[<p>Common VoIP and UC security risks and threats.</p><table class="table-main">
<tbody>
<tr>
<td>Risk</td>
<td>Typical Symptoms</td>
<td>Threat</td>
<td>Countermeasures</td>
</tr>
<tr>
<td><strong>Reconnaissance scan</strong></td>
<td>Address or port scan is used to footprint network topology</td>
<td>Targeted denial of service, fraud, theft</td>
<td>
<ul>
<li>Intrusion detection</li>
<li>Protection against registration floods</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Adversary in the middle</strong></td>
<td>Attacker intercepts session to impersonate(spoof) caller</td>
<td>Targeted denial of service, breach of privacy, fraud, theft</td>
<td>
<ul>
<li>TLS encryption for SIP with separate TLS certificates for SIP Service Providers</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Eavesdropping</strong></td>
<td>Attacker “sniffs” session for the purpose of social engineering</td>
<td>Breach of privacy, fraud, theft </td>
<td>
<ul>
<li>Intrusion detection</li>
<li>Encryption</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Session hijacking</strong></td>
<td>Attacker compromises valuable information by rerouting call </td>
<td>Breach of privacy, fraud, theft </td>
<td>
<ul>
<li>Intrusion detection</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Session overload</strong></td>
<td>Excessive signalling or media traffic(malicious, non-malicious) is experienced </td>
<td>Denial of service </td>
<td>
<ul>
<li> Protection against registration floods</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Protocol fuzzing</strong></td>
<td>Malformed packets, semantically or syntactically incorrect flows are encountered </td>
<td>Denial of service </td>
<td>
<ul>
<li>Malformed packet protection</li>
<li>Protocol anomaly protection</li>
<li>TCP reassembly for fragmented packet protection</li>
<li>Strict TCP validation to ensure TCP session state enforcement, validation of sequence and acknowledgement numbers, rejection of bad TCP flag combinations</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Media injection</strong></td>
<td>Attacker inserts unwanted or corrupted content into messages compromising packet/data stream integrity </td>
<td>Denial of service, fraud</td>
<td>
<ul>
<li>Application aware firewalls</li>
<li>Intrusion prevention /detection</li>
<li>Encryption</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Toll Fraud</strong></td>
<td>Unexplained/unusual calling activity, increased costs/carrier notification/alert </td>
<td>Fraud, financial loss, breach of privacy, information loss </td>
<td>
<ul>
<li>Application aware firewalls</li>
<li>Intrusion prevention /detection</li>
<li>Encryption</li>
</ul>
</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="19.5.17."


><![CDATA[<p>Encryption is discussed in <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 - Cryptography</a>.</p>]]></paragraph>
 </subsection>
<subsection title="Product Selection"> <block title="Protection Profiles"><paragraph
    title="19.5.18."


><![CDATA[<p>One Protection Profile for SBCs has been published by NIAP (dated July 24, 2015 - see reference table).&nbsp; Several other Protection profiles (PPs) specifically for SBCs are in development but not yet published (as at September 2015).&nbsp; Gateway and other border control device PPs are used as surrogates in the interim.&nbsp; Refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>.</p>]]></paragraph>
</block>
<block title="Desirable SBC Functionality"><paragraph
    title="19.5.19."


><![CDATA[<p>To manage risks and threats and to safeguard performance there are a number of desirable features in an SBC.  These include:</p><ul>
<li>Security – SBC DoS protection, access control, topology hiding, VPN separation, service infrastructure DoS prevention;</li>
<li>Encryption – Support for Suite B encryption;</li>
<li>Service Reach – surrogate registration IP PBX endpoints, SIP IMS-H.323 PBX IWF; VPN bridging;</li>
<li>SLA assurance – admission control; bandwidth per VPN &amp; site, session agent constraints, policy server; intra-VPN media release; QoS marking/mapping; QoS reporting;</li>
<li>Fraud and Revenue protection – bandwidth policing, QoS theft protection, accounting, session timers;</li>
<li>Regulatory compliance – provision of emergency service calls (111) &amp; lawful intercept.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="Security Architecture"><paragraph
    title="19.5.20."


><![CDATA[<p>Typical use of session border controller in an agency gateway is illustrated in Figure 1 below:</p>
<p><img class="leftAlone" title="" src="assets/NZISM/19.5.20-agency-gateway-rotated.png" alt="19.5.20 Agency Gateway" width="600" height="424"></p>]]></paragraph>
 </subsection>
<subsection title="General References"><paragraph
    title="19.5.21."


><![CDATA[<p>Additional information on Session Border Controllers can be found in the following references:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td><strong>NIST Special Publication 800-58, January 2005</strong></td>
<td><strong>Security Considerations for Voice Over IP Systems</strong></td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;"><a title="NIST SP 800-58" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-58.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-58.pdf [PDF, 922 KB]</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Security Issues and Countermeasure for VoIP</strong></td>
<td style="text-align: center;">SANS</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.sans.org/white-papers/1701/" target="_blank">https://www.sans.org/white-papers/1701/</a></td>
</tr>
<tr>
<td><strong>Report Number: I332-016R-2005</strong></td>
<td><strong>Security Guidance for Deploying IP Telephony Systems Released: 14 February 2006</strong></td>
<td style="text-align: center;">Systems and Network Attack Center (SNAC) NSA</td>
<td style="width: 33%;">https://www.nsa.gov/ia/_files/voip/i332-016r-2005.pdf</td>
</tr>
<tr>
<td><strong>Report Number: I332-009R-2006</strong></td>
<td><strong>Recommended IP Telephony Architecture, Updated: 1May2006 Version1.0</strong></td>
<td style="text-align: center;">Systems and Network Attack Center (SNAC) NSA</td>
<td style="width: 33%;">https://www.nsa.gov/ia/_files/voip/I332-009R-2006.pdf</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Mobility Capability Package March 26 2012 - Secure VoIP Version 1.2</strong></td>
<td style="text-align: center;">NSA</td>
<td style="width: 33%;">https://www.nsa.gov/ia/_files/Mobility_Capability_Pkg_Vers_1_2.pdf</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Protecting Telephone-based Payment Card Data PCI Data Security Standard (PCI DSS) Version:&nbsp; 2.0, March 2011</strong></td>
<td style="text-align: center;">The&nbsp; PCI Security&nbsp; Standards&nbsp; Council (PCI SSC)</td>
<td style="width: 33%;"><a href="https://www.pcisecuritystandards.org/documents/protecting_telephone-based_payment_card_data.pdf">https://www.pcisecuritystandards.org/documents/protecting_telephone-based_payment_card_data.pdf [PDF, 888 KB]</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Understanding Voice over Internet Protocol (VoIP): 2006</strong></td>
<td style="text-align: center;">US-CERT</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.us-cert.gov/sites/default/files/publications/understanding_voip.pdf" target="_blank">https://www.us-cert.gov/sites/default/files/publications/understanding_voip.pdf [PDF, 83 KB]</a></td>
</tr>
<tr>
<td><strong>CNSS Instruction No. 5000 April 2007</strong></td>
<td><strong>Guidelines for Voice over Internet Protocol (VoIP) Computer Telephony</strong></td>
<td style="text-align: center;">Committee on National Security Systems</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.cnss.gov/CNSS/issuances/Instructions.cfm" target="_blank">https://www.cnss.gov/CNSS/issuances/Instructions.cfm</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Infrastructure qualified for Microsoft Lync</strong></td>
<td style="text-align: center;">Microsoft TechNet</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://technet.microsoft.com/en-us/office/dn788945.aspx" target="_blank">https://technet.microsoft.com/en-us/office/dn788945.aspx</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>A Guide to the Public Records Act</strong></td>
<td style="text-align: center;">Archives New Zealand</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://archives.govt.nz/manage-information/how-to-manage-your-information/key-obligations-and-the-standard/key-obligations-public-records-act-2005" target="_blank">https://archives.govt.nz/manage-information/how-to-manage-your-information/key-obligations-and-the-standard/key-obligations-public-records-act-2005</a></td>
</tr>
<tr>
<td><strong>Public Act 2002 No.35</strong></td>
<td><strong>Electronic Transactions Act 2002</strong></td>
<td style="text-align: center;">&nbsp;</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.legislation.govt.nz/act/public/2002/0035/latest/DLM154185.html" target="_blank">https://www.legislation.govt.nz/act/public/2002/0035/latest/DLM154185.html</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller, September 2016, version 1.1</strong></td>
<td style="text-align: center;">NIAP</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.niap-ccevs.org/MMO/PP/ep_sbc_v1.1.pdf" target="_blank">ep_sbc_v1.1.pdf (niap-ccevs.org)</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p>PP-Module for Voice and Video over IP (VVoIP),&nbsp;October 2020, v<strong><span>ersion 1.0</span></strong>&nbsp;</p>
</td>
<td style="text-align: center;">NIAP&nbsp;</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.niap-ccevs.org/MMO/PP/mod_vvoip_v1.0.pdf" target="_blank">mod_vvoip_v1.0.pdf (niap-ccevs.org)</a></p>
<p><a rel="noopener noreferrer" href="https://www.niap-ccevs.org/profile/Info.cfm?PPID=444&amp;id=444" target="_blank">NIAP (niap-ccevs.org)</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014</strong></td>
<td style="text-align: center;">DHS</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.dhs.gov/sites/default/files/publications/4300A%20Handbook%20Attachment%20Q5%20-%20Voice%20over%20IP.pdf" target="_blank">https://www.dhs.gov/sites/default/files/publications/4300A%20Handbook%20Attachment%20Q5%20-%20Voice%20over%20IP.pdf [PDF, 586 KB]</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>2015 Global Fraud Loss Survey</strong></td>
<td style="text-align: center;">CFCA</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://cfca.org/fraudloss-survey/" target="_blank">https://cfca.org/fraudloss-survey/</a><br><a href="http://www.dhs.gov/sites/default/files/publications/4300A%20Handbook%20Attachment%20Q5%20-%20Voice%20over%20IP.pdf"></a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Media Technical References"><paragraph
    title="19.5.22."


><![CDATA[<p>Media technical references are listed below:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>RFC 2833</strong></td>
<td><strong>RTP Payload for DTMF Digits, Telephony Tones and Telephony Signals</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="RTP Payload for DTMF Digits, Telephony Tones and Telephony Signals" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2833" target="_blank">https://datatracker.ietf.org/doc/html/rfc2833</a></td>
</tr>
<tr>
<td><strong>RFC 3313</strong></td>
<td><strong>Private Session Initiation Protocol (SIP) Extensions for Media Authorization</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="Private Session Initiation Protocol (SIP) Extensions for Media Authorization" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3313" target="_blank">https://datatracker.ietf.org/doc/html/rfc3313</a></td>
</tr>
<tr>
<td><strong>RFC 3550</strong></td>
<td><strong>RTP: A Transport Protocol for Real-Time Applications</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="RTP: A Transport Protocol for Real-Time Applications" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3550" target="_blank">https://datatracker.ietf.org/doc/html/rfc3550</a></td>
</tr>
<tr>
<td><strong>RFC 3685</strong></td>
<td><strong>Real Time Control Protocol (RTCP) attribute in Session Description Protocol (SDP)</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="SIEVE Email Filtering: Spamtest and VirusTest Extensions" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3685" target="_blank">https://datatracker.ietf.org/doc/html/rfc3685</a></td>
</tr>
<tr>
<td><strong>RFC 3362</strong></td>
<td><strong>Real-time Facsimile (T.38) - image/t38 MIME Sub-type Registration</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="Real-time Facsimile (T.38) - image/t38 MIME Sub-type Registration" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3362" target="_blank">https://datatracker.ietf.org/doc/html/rfc3362</a></td>
</tr>
<tr>
<td><strong>T.38 (09/2010)</strong></td>
<td><strong>Procedures for real-time Group 3 facsimile communication over IP networks</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td><a rel="noopener noreferrer" href="https://www.itu.int/rec/T-REC-T.38/e" target="_blank">https://www.itu.int/rec/T-REC-T.38/e</a></td>
</tr>
<tr>
<td><strong>V.150.1 (01/2003)</strong></td>
<td>
<p><strong>Modem-over-IP networks: Procedures for the</strong></p>
<strong>end-to-end connection of V-series DCEs</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td><a rel="noopener noreferrer" href="https://www.itu.int/rec/T-REC-V.150.1-200301-I/en" target="_blank">https://www.itu.int/rec/T-REC-V.150.1-200301-I/en</a></td>
</tr>
<tr>
<td><strong>G.711</strong></td>
<td><strong>Pulse code modulation (PCM) of voice frequencies</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td><a rel="noopener noreferrer" href="https://www.itu.int/rec/T-REC-G.711/" target="_blank">https://www.itu.int/rec/T-REC-G.711/</a></td>
</tr>
<tr>
<td><strong>G.726</strong></td>
<td><strong>40, 32, 24, 16 kbit/s adaptive differential pulse code modulation (ADPCM)</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td><a rel="noopener noreferrer" href="https://www.itu.int/rec/T-REC-G.726/e" target="_blank">https://www.itu.int/rec/T-REC-G.726/e</a></td>
</tr>
<tr>
<td><strong>G. 729 (06/2012)&nbsp;</strong></td>
<td><strong>Coding of speech at 8 kbit/s using conjugate-structure algebraic-code-excited linear-prediction (CS-ACELP)</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td><a rel="noopener noreferrer" href="https://www.itu.int/rec/T-REC-G.729/e" target="_blank">https://www.itu.int/rec/T-REC-G.729/e</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Signalling Technical References"><paragraph
    title="19.5.23."


><![CDATA[<p>Signalling technical references are listed below:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 25%;"><strong>Source</strong></td>
</tr>
<tr>
<td><strong>RFC 2705&nbsp;</strong></td>
<td><strong>Media Gateway Control Protocol (MGCP) Version 1.0</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a title="Media Gateway Control Protocol (MGCP) Version 1.0" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2705" target="_blank">https://datatracker.ietf.org/doc/html/rfc2705</a></td>
</tr>
<tr>
<td><strong>RFC 3525</strong></td>
<td><strong>Gateway Control Protocol Version 1.0</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a title="Gateway Control Protocol Version 1" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3525" target="_blank">https://datatracker.ietf.org/doc/html/rfc3525</a></td>
</tr>
<tr>
<td><strong>RFC 3261</strong></td>
<td><strong>SIP: Session Initiation Protocol</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a title="SIP: Session Initiation Protocol" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3261" target="_blank">https://datatracker.ietf.org/doc/html/rfc3261</a></td>
</tr>
<tr>
<td><strong>RFC 3263</strong></td>
<td><strong>Locating SIP Servers</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a title="Session Initiation Protocol (SIP): Locating SIP Servers" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3263" target="_blank">https://datatracker.ietf.org/doc/html/rfc3263</a></td>
</tr>
<tr>
<td><strong>RFC 4028</strong></td>
<td><strong>SIP Session Timer</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc4028" target="_blank">https://datatracker.ietf.org/doc/html/rfc4028</a></td>
</tr>
<tr>
<td><strong>RFC 3966</strong></td>
<td><strong>The tel URI for Telephone Numbers</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a title="The tel URI for Telephone Numbers" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3966" target="_blank">https://datatracker.ietf.org/doc/html/rfc3966</a></td>
</tr>
<tr>
<td><strong>RFC 3924</strong></td>
<td><strong>Cisco Architecture for Lawful Intercept in IP Networks</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a title="Cisco Architecture for Lawful Intercept in IP Networks" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3924" target="_blank">https://datatracker.ietf.org/doc/html/rfc3924</a></td>
</tr>
<tr>
<td><strong>RFC 2327</strong></td>
<td><strong>Session Description Protocol</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;">
<p><a title="SDP: Session Description Protocol" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2327" target="_blank">https://datatracker.ietf.org/doc/html/rfc2327</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 3025</strong></td>
<td><strong>Gateway Control Protocol Version 1, June 2003</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a title="Mobile IP Vendor/Organization-Specific Extensions" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3025" target="_blank">https://datatracker.ietf.org/doc/html/rfc3025</a></td>
</tr>
<tr>
<td><strong>H.248 (03/2013)</strong></td>
<td><strong>Media Gateway Control (Megaco): Version 3</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td style="width: 25%;"><a rel="noopener noreferrer" href="https://www.itu.int/rec/T-REC-H.248.1/en" target="_blank">https://www.itu.int/rec/T-REC-H.248.1/en</a></td>
</tr>
<tr>
<td><strong>H.323 (12/2009)</strong></td>
<td><strong>Packet-based multimedia communications systems</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td style="width: 25%;"><a rel="noopener noreferrer" href="https://www.itu.int/rec/T-REC-H.323/en/" target="_blank">https://www.itu.int/rec/T-REC-H.323/en/</a></td>
</tr>
<tr>
<td><strong>H.450</strong></td>
<td><strong>Supplementary Services for H.323</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td style="width: 25%;"><a rel="noopener noreferrer" href="https://www.itu.int/en/Pages/default.aspx" target="_blank">https://www.itu.int/en/Pages/default.aspx</a></td>
</tr>
<tr>
<td><strong>MSF Technical Report MSF-TR-QoS-001-FINAL</strong></td>
<td><strong>Quality of Service for next generation VoIP networks framework</strong></td>
<td style="text-align: center;">Multiservice Switching Forum (MSF)</td>
<td style="width: 25%;"><a rel="noopener noreferrer" href="http://www.recursosvoip.com/docs/english/MSF-TR-QoS-001-FINAL.pdf" target="_blank">http://www.recursosvoip.com/docs/english/MSF-TR-QoS-001-FINAL.pdf [PDF, 778 KB]</a></td>
</tr>
<tr>
<td><strong>ETSI TS 129 305 V8.0.0 (2009-01)</strong></td>
<td><strong>Universal Mobile Telecommunications System (UMTS); LTE; InterWorking Function (IWF) between MAP based and Diameter based interfaces.</strong></td>
<td style="text-align: center;">European Telecommunications Standards Institute</td>
<td style="width: 25%;"><a rel="noopener noreferrer" href="https://www.etsi.org/deliver/etsi_ts/129300_129399/129305/08.00.00_60/ts_129305v080000p.pdf" target="_blank">https://www.etsi.org/deliver/etsi_ts/129300_129399/129305/08.00.00_60/ts_129305v080000p.pdf [PDF, 425 KB]</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Risk Assessment"><paragraph
    title="19.5.24.R.01."

    tags="Technical,Risk Assessment,Gateway Security"


><![CDATA[<p>The adoption of Voice over Internet Protocol (VoIP) and Unified Communication (UC) networks will introduce a range of technology risks <em>in addition</em> to the technology and systems risks that already exist for agency systems.  It is vital that these risks are identified and assessed in order to design a robust security architecture and to select appropriate controls and countermeasures.</p>]]></paragraph>
<paragraph
    title="19.5.24.R.02."

    tags="Technical,Risk Assessment,Gateway Security"


><![CDATA[<p>The availability of agency systems, business functionality and any customer or client online services, is subject to further risks in an outsourced environment.  A risk assessment will include consideration of business requirements on availability in a VoIP and UC environment.</p>]]></paragraph>
<paragraph
    title="19.5.24.R.03."

    tags="Technical,Risk Assessment,Gateway Security"


><![CDATA[<p>Risks to business functionality may include service outages, such as communications, data centre power, backup and other failures or interruptions.  Entity failures such as the merger, acquisition or liquidation of the service provider may also present a significant business risk to availability.</p>]]></paragraph>
<paragraph
    title="19.5.24.R.04."

    tags="Technical,Risk Assessment,Gateway Security"


><![CDATA[<p>Testing is a valuable tool when assessing risk.  A UC environment with complex communications streams can provide opportunities for exploitation, especially where the configuration is weak or has itself been compromised.  One of the fundamental tools is penetration testing.</p>]]></paragraph>
<paragraph
    title="19.5.24.C.01."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4703"
><![CDATA[<p>Agencies intending to adopt VoIP or UC technologies or services MUST conduct a comprehensive risk assessment <em>before</em> implementation or adoption.</p>]]></paragraph>
<paragraph
    title="19.5.24.C.02."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4705"
><![CDATA[<p>Agencies intending to adopt VoIP or UC technologies or services MUST consider the risks to the availability of systems and information in their design of VoIP and UC systems architecture, fault tolerance, fail over and supporting controls and governance processes.</p>]]></paragraph>
<paragraph
    title="19.5.24.C.03."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4706"
><![CDATA[<p>Agencies MUST ensure risks for any VoIP or UC service adopted are understood and formally accepted by the agency’s Accreditation Authority as part of the Certification and Accreditation process (See <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 - System Certification and Accreditation</a>).</p>]]></paragraph>
<paragraph
    title="19.5.24.C.04."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4707"
><![CDATA[<p>Agencies intending to adopt VoIP or UC technologies or services MUST determine where the responsibility (agency or VoIP and UC service provider) for implementing, managing and maintaining controls lies in accordance with agreed trust boundaries.</p>]]></paragraph>
<paragraph
    title="19.5.24.C.05."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications, Restricted/Sensitive"
    compliance="Must"
    cid="4708"
><![CDATA[<p>Any contracts for the provision of VoIP or UC services MUST include service level, availability, recoverability and restoration provisions as formally determined by business requirements.</p>]]></paragraph>
<paragraph
    title="19.5.24.C.06."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4709"
><![CDATA[<p>Agencies MUST ensure contracts with VoIP or UC service providers include provisions to manage risks associated with the merger, acquisition, liquidation or bankruptcy of the service provider and any subsequent termination of VoIP or UC services.</p>]]></paragraph>
<paragraph
    title="19.5.24.C.07."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4710"
><![CDATA[<p>Agencies procuring or using VoIP or UC services to be used by multiple agencies MUST ensure all interested parties formally agree to the risks, controls and any residual risks of such VoIP and UC services. &nbsp;The lead agency normally has this responsibility (see <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12117">Chapter 2 - Information Security services within Government</a> and <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 - System Certification and Accreditation</a>).</p>]]></paragraph>
<paragraph
    title="19.5.24.C.08."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4711"
><![CDATA[<p>Agencies SHOULD consider the use of assessment tools, such as penetration testing, when undertaking the risk assessment.</p>]]></paragraph>
</block>
<block title="Non-Agency Networks"><paragraph
    title="19.5.25.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>Networks furnished by a service provider are invariably shared networks.  Much of the security configuration is designed to maximise operational efficiency of the Service Providers network.  Any agency specific security requirements may attract additional cost.</p>]]></paragraph>
<paragraph
    title="19.5.25.R.02."

    tags="Technical,Gateway Security"


><![CDATA[<p>It is preferable to maintain an agency designed and controlled gateway to ensure security requirements are properly accommodated.  The use of SBCs should be carefully considered in order to maximise efficiency consistent with security requirements.</p>]]></paragraph>
<paragraph
    title="19.5.25.C.01."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4715"
><![CDATA[<p>Agencies MUST follow the gateway requirements described in <a title="Gateway Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 - Gateway Security</a>.</p>]]></paragraph>
</block>
<block title="Security Architecture and Configuration"><paragraph
    title="19.5.26.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>Trust boundaries must be defined to assist in determining effective controls and where these controls can best be applied. &nbsp;Trust zones and trust boundaries are discussed in <a href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-17223">22.1.3</a>. &nbsp;The use of SBCs will assist with the definition of trust boundaries and allow the segregation of UC and normal data.</p>]]></paragraph>
<paragraph
    title="19.5.26.R.02."

    tags="Technical,Gateway Security"


><![CDATA[<p>The threat model for IP is well understood.  Data packets can be intercepted or eavesdropped anywhere along the transmission path including the corporate network, by the internet service provider and along the backbone.  The prevalence and ease of packet sniffing and other techniques for capturing packets on an IP based network increases this threat level.  VoIP Encryption is an effective means of mitigating this threat.</p>]]></paragraph>
<paragraph
    title="19.5.26.R.03."

    tags="Technical,Gateway Security"


><![CDATA[<p>The nature of traffic through an SBC is an important factor in determining the type and configuration of the SBC.  This also plays an important role in determining the resilience of the system.  Systems may require high availability (HA), depending on business requirements for availability and continuity of service.  The use of split trunks for HA normal traffic may provide resilience at reduced costs.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.01."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4720"
><![CDATA[<p>Agencies intending to adopt VoIP or UC technologies or services MUST determine trust boundaries <em>before</em> implementation.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.02."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4721"
><![CDATA[<p>Updates to the SBC and related devices MUST be verified by the administrator to ensure they are obtained from a trusted source and are unaltered.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.03."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4722"
><![CDATA[<p>Agencies MUST include defence mechanisms for the Common VoIP and UC Security Risks and Threats described in <a title="Risks and threats" href="http://nzism.gcsb.govt.nz/ism-document#SubSection-16750">19.5.10</a>.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.04."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4723"
><![CDATA[<p>Agency networks MUST ensure the SBC includes a topology hiding capability.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.05."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4724"
><![CDATA[<p>Agency networks MUST consider the use of call diversity and call failover configurations.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.06."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4725"
><![CDATA[<p>In a virtualised environment, agencies MUST ensure any data contained in a protected resource is deleted or not available when the virtual resource is reallocated.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.07."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4726"
><![CDATA[<p>Agencies SHOULD conduct a traffic analysis to ensure the agency’s network and architecture is capable of supporting all VoIP, media and UC traffic.  The traffic analysis SHOULD also determine any high availability requirements.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.08."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4727"
><![CDATA[<p>Agencies SHOULD design a security and gateway architecture that segregates UC and normal data traffic. &nbsp;Firewall requirements (<a href="http://nzism.gcsb.govt.nz/ism-document#Section-16688">Section 19.3 - Firewalls</a>) continue to apply to data traffic.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.09."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4728"
><![CDATA[<p>In a virtualised environment, agencies SHOULD create separate virtual LANs for data traffic and UC traffic.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.10."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4729"
><![CDATA[<p>In a non-virtualised environment, agencies SHOULD create separate LANs for data traffic and UC traffic.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.11."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4730"
><![CDATA[<p>Agency networks SHOULD use encryption internally on VoIP and unified communications traffic.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.12."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4731"
><![CDATA[<p>Agency networks SHOULD ensure intrusion prevention systems and firewalls are VoIP-aware.<br><br></p>]]></paragraph>
</block>
<block title="Access Control"><paragraph
    title="19.5.27.R.01."

    tags="Technical,Access Control,Gateway Security"


><![CDATA[<p>Network access control and password requirements are described in <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 - Access control and passwords</a>, in particular <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15629">Section 16.6 – Event Logging and Auditing</a>. &nbsp;Event logging helps improve the security posture of a system by increasing the accountability of all user actions, thereby improving the chances that malicious behaviour will be detected and assist in the investigation of incidents. &nbsp;A fundamental of access control is to manage access rights including physical access, file system and data access permissions and programme execution permissions. &nbsp;In addition, access control provides a record of usage in the event of an incident. &nbsp;Retention of records and archiving is discussed in&nbsp;<a href="http://nzism.gcsb.govt.nz/ism-document#Block-14707">13.1.12 - Archiving</a>.</p>]]></paragraph>
<paragraph
    title="19.5.27.R.02."

    tags="Technical,Access Control,Gateway Security"


><![CDATA[<p>Similar requirements apply to VoIP and UC networks as these are also IP based.  This will include any service enabled as part of the UC environment, such as Chat, IM, video and teleconferencing.</p>]]></paragraph>
<paragraph
    title="19.5.27.R.03."

    tags="Technical,Access Control,Gateway Security"


><![CDATA[<p>There may be special cases, such as a 24x7 operations centre, where VoIP phones are shared by several duty officers on a shift basis.  Workloads may require a number of duty personnel at any one time.  In such cases it may be impractical to allocate individual VoIP or UC UserID and passwords.  The risks in such cases must be clearly identified and compensating controls applied to ensure traceability in the event of fault finding or an incident.  Examples of compensating controls include physical access control, CCTV, and duty registers.  Identification of shared facilities is important and may comprise a UserID such as “Duty Officer”, SOC, or agency name in a multi-agency facility.</p>]]></paragraph>
<paragraph
    title="19.5.27.C.01."

    tags="Technical,Access Control,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4737"
><![CDATA[<p>Any shared facilities MUST be clearly identifiable both physically and logically.</p>]]></paragraph>
<paragraph
    title="19.5.27.C.02."

    tags="Technical,Access Control,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4738"
><![CDATA[<p>Agencies MUST provide a protected communication channel for administrators, and authorised systems personnel.  Such communication MUST be logged.</p>]]></paragraph>
<paragraph
    title="19.5.27.C.03."

    tags="Technical,Access Control,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4739"
><![CDATA[<p>Agencies MUST ensure administrative access to the SBC is available only through a trusted LAN and secure communication path.</p>]]></paragraph>
<paragraph
    title="19.5.27.C.04."

    tags="Technical,Access Control,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4740"
><![CDATA[<p>Access control and password requirements SHOULD apply to VoIP and UC networks in all cases where individual access is granted.</p>]]></paragraph>
<paragraph
    title="19.5.27.C.05."

    tags="Technical,Access Control,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4741"
><![CDATA[<p>In special cases where individual UserIDs and Passwords are impractical, a risk assessment SHOULD be completed and compensating controls applied.</p>]]></paragraph>
<paragraph
    title="19.5.27.C.06."

    tags="Technical,Access Control,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4742"
><![CDATA[<p>Event logs covering all VoIP and UC services SHOULD be maintained in accordance with the requirements of the NZISM. See sections <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15629">16.6 - Event Logging and Auditing</a> and <a title="Archiving" href="http://nzism.gcsb.govt.nz/ism-document#Block-14707">13.1.12 - Archiving</a>.</p>]]></paragraph>
</block>
<block title="Incident Handling and Management"><paragraph
    title="19.5.28.R.01."

    tags="Technical,Incident Management,Gateway Security"


><![CDATA[<p>Service providers may not provide the same level of incident identification and management as provided by agencies.  In some cases, these services will attract additional costs.  Careful management of contracts is required to ensure agency requirements for incident detection and management are fully met when adopting VoIP and UC services.</p>]]></paragraph>
<paragraph
    title="19.5.28.R.02."

    tags="Technical,Incident Management,Gateway Security"


><![CDATA[<p>Deny listing denies calls to specific numbers, range of numbers, or countries.  Allow listing allows calls to numbers, range of numbers, or countries.  A combination of deny and allow listing enables a flexible method of preventing call fraud (hijacking and “call pumping”), for example, by allowing calls to a specific number within a country on a deny list.</p>]]></paragraph>
<paragraph
    title="19.5.28.R.03."

    tags="Technical,Incident Management,Gateway Security"


><![CDATA[<p>Call Rate Limiting allows the restriction of outbound call volumes to specific numbers, range of numbers or countries.  This is a useful mitigation for “traffic pumping” call fraud schemes.  Call rate limiting also allows temporary limits to be placed on call from or to particular destinations while a security incident is investigated.</p>]]></paragraph>
<paragraph
    title="19.5.28.R.04."

    tags="Technical,Incident Management,Gateway Security"


><![CDATA[<p>Call Redirection enables the transfer of blocked calls to another destination including via monitoring and recording systems.  Blocked calls may be dropped or a message played indicating, for example, that calls cannot be connected.</p>]]></paragraph>
<paragraph
    title="19.5.28.C.01."

    tags="Technical,Incident Management,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4748"
><![CDATA[<p>Agencies MUST include incident handling and management services in contracts with service providers.</p>]]></paragraph>
<paragraph
    title="19.5.28.C.02."

    tags="Technical,Incident Management,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4749"
><![CDATA[<p>Agencies MUST develop and implement incident identification and management processes in accordance with this manual (See <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13001">Chapter 6 – Information Security Monitoring</a>, <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information Security Incidents</a>, <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 – Personnel Security </a>and <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access control and passwords</a>).</p>]]></paragraph>
<paragraph
    title="19.5.28.C.03."

    tags="Technical,Incident Management,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4750"
><![CDATA[<p>Agencies SHOULD implement fraud detection monitoring to identify suspicious activity and provide alerting so that remedial action can be taken.</p>]]></paragraph>
<paragraph
    title="19.5.28.C.04."

    tags="Technical,Incident Management,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4751"
><![CDATA[<p>Agencies SHOULD regularly review call detail records for patterns of service theft.</p>]]></paragraph>
<paragraph
    title="19.5.28.C.05."

    tags="Technical,Incident Management,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4752"
><![CDATA[<p>Agencies SHOULD consider the use of allow and deny listing to manage fraudulent calls to known fraudulent call destinations.</p>]]></paragraph>
<paragraph
    title="19.5.28.C.06."

    tags="Technical,Incident Management,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4753"
><![CDATA[<p>Agencies SHOULD consider the use of call rate limiting as a fraud mitigation measure.</p>]]></paragraph>
<paragraph
    title="19.5.28.C.07."

    tags="Technical,Incident Management,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4755"
><![CDATA[<p>Agencies SHOULD consider the use of call redirection to manage blocked calls.</p>]]></paragraph>
</block>
<block title="User Awareness and Training"><paragraph
    title="19.5.29.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>The introduction of VoIP and UC services will introduce change to the appearance and functionality of systems, how users access agency systems and types of user support. It is essential that users are aware of information security and privacy concepts and risks associated with the services they use.</p><p>Support provided by the VoIP and UC service provider may attract additional charges.</p>]]></paragraph>
<paragraph
    title="19.5.29.C.01."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4758"
><![CDATA[<p>Agencies MUST develop and implement user awareness and training programmes to support and enable safe use of VoIP and UC services (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-13361">Section 9.1 – Information Security Awareness and Training</a>).</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="20. Enterprise systems security"><section title="20.1. Cloud Computing"><subsection title="Objective"><paragraph
    title="20.1.1."


><![CDATA[<p>Cloud systems risks are identified and managed and that Official Information and agency information systems are protected in accordance with Cabinet Directives, the <a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">PSR</a>, <a title="Classification System" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/classification-system/" target="_blank">the New Zealand Government Security Classification System</a>, the NZISM and with other government security&nbsp;requirements and guidance.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Terminology"><paragraph
    title="20.1.2."


><![CDATA[<p>Terminology and definitions of cloud models and services used in this section are consistent with NIST Special Publication 800-145, The NIST Definition of Cloud Computing, dated September 2011 (see table of References below).</p>]]></paragraph>
<paragraph
    title="20.1.3."


><![CDATA[<p>A fundamental construct in the management of risk in cloud environment is that of Trust Zones and Trust Boundaries. &nbsp;A Trust Zone is a zoning construct based on levels of trust, classification, information asset value and essential information security. &nbsp;A Trust Boundary is the interface between two or more Trust Zones. &nbsp;Trust Zones use the principles of separation and segregation to manage sensitive information assets and ensure security policies are consistently applied to all assets in a particular trust Zone. &nbsp;Refer also to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation</a>.</p>]]></paragraph>
</block>
<block title="Separation and Segregation"><paragraph
    title="20.1.4."


><![CDATA[<p>Separation and Segregation is determined by system function and the sensitivity of the data the system stores, processes and transmits. &nbsp;One common example is placing systems that require a connection to the Internet into a demilitarized zone (DMZ) that is separated and segregated (isolated) from more sensitive systems.</p>]]></paragraph>
<paragraph
    title="20.1.5."


><![CDATA[<p>Separation and Segregation limits the ability of an intruder to exploit a vulnerability with the intent of elevating privileges to gain access to more sensitive systems on the internal network. &nbsp;VLANs may be used to further separate systems by controlling access and providing segregation thus giving additional protection.</p>]]></paragraph>
</block>
<block title="Mandates and Requirements"><paragraph
    title="20.1.6."


><![CDATA[<p>In August 2013, the Government introduced their approach to cloud computing, establishing a ‘cloud first’ policy and an All-of-Government direction to cloud services development and deployment. This is enabled by the Cabinet Minute [CAB Min (13) 37/6B].</p>]]></paragraph>
<paragraph
    title="20.1.7."


><![CDATA[<p>Under the ‘cloud first’ policy state service agencies are expected to adopt approved cloud services either when faced with new procurements, or an upcoming contract extension decision.</p>]]></paragraph>
<paragraph
    title="20.1.8."


><![CDATA[<p>In October 2013 the Government approved the GCIO risk and assurance framework for cloud computing, which agencies must follow when they are considering using cloud services [CAB Min (13) 37/6B]. &nbsp;It also directs that no data classified above RESTRICTED should be held in a <em>public</em> cloud, whether it is hosted onshore or offshore.</p>]]></paragraph>
<paragraph
    title="20.1.9."


><![CDATA[<p>It is important to note that although agencies can outsource <strong>responsibility</strong> to a service provider for implementing, managing and maintaining security controls, they cannot outsource their <strong>accountability</strong> for ensuring their data is appropriately protected.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="20.1.10."


><![CDATA[<p>The adoption of cloud technologies and services, the hosting of critical data in the cloud and the risk environment requires that agencies exercise caution. &nbsp;Many cloud users are driven by the need for performance, scalability, resource sharing and cost saving so a comprehensive risk assessment is essential in identifying and managing jurisdictional, sovereignty, governance, technical and security risks.</p>]]></paragraph>
<paragraph
    title="20.1.11."


><![CDATA[<p>Typically agencies and other organisations start with a small, private cloud, allowing technical and security architectures, management processes and security controls to be developed and tested and gain some familiarity with cloud technologies and processes. &nbsp;These organisations then progress by using non-critical data, for example email, and other similar applications, in a hybrid, private or public cloud environment.</p>]]></paragraph>
<paragraph
    title="20.1.12."


><![CDATA[<p>There are a number of technical risks associated with cloud computing, in addition to the existing risks inherent in organisational systems. &nbsp;Attention must also be paid to the strategic, governance and management risks of cloud computing. &nbsp;Security architecture and security controls also require careful risk assessment and consideration.</p>]]></paragraph>
<paragraph
    title="20.1.13."


><![CDATA[<p>Cloud service providers will invariably seek to limit services, liability, compensation or penalties through carefully worded service contracts, which may present particular risks.</p>]]></paragraph>
<paragraph
    title="20.1.14."


><![CDATA[<p>Much has been made of the operational cost savings related to cloud technologies, particularly a lower cost of operating. &nbsp;Less obvious are the risks and related cost of managing risk to an acceptable level. &nbsp;It is important to note that short term overall cost increases may, in some cases, be attributed to the adoption of cloud technologies and architectures.</p>]]></paragraph>
<paragraph
    title="20.1.15."


><![CDATA[<p>Some valuable work in mapping the cloud risk landscape has been undertaken by such organisations as the Cloud Security Alliance, the US National Institute of Standards and Technology (NIST), the UK’s Cloud Industry Forum and the European Network and Information Security Agency (ENISA). &nbsp;It is important to note that the extent of the risk landscape continues to evolve and expand.</p>]]></paragraph>
</block>
<block title="Scope"><paragraph
    title="20.1.16."


><![CDATA[<p>This section provides information and some guidance on the risks associated with cloud computing, its implementation and ongoing use. &nbsp;Some controls are specified but agencies will necessarily undertake their own comprehensive risk assessment and select controls to manage those risks.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References - Guidance"><paragraph
    title="20.1.17."


><![CDATA[<p>While NOT an exhaustive list, further information on Cloud can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>CAB Min (12) 29/8A</strong>&nbsp;</td>
<td>
<p><strong>Cabinet Minute of Decision – CAB Min (12) 29/8A – ‘Cloud First’ Policy</strong></p>
</td>
<td style="text-align: center;">
<p><span>Cabinet Office</span></p>
</td>
<td>&nbsp;</td>
</tr>
<tr>
<td><strong>CAB Min (13) 37/6B</strong>&nbsp;</td>
<td>
<p><strong>Cabinet Minute of Decision – CAB Min (13) 37/6B – Cloud Computing Risk and Assurance Framework</strong></p>
</td>
<td style="text-align: center;">
<p>Cabinet Office</p>
</td>
<td>
<p>&nbsp;<a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/about/cabinet-minutes/" target="_blank">Cabinet minutes for public cloud services | NZ Digital government</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>All-of-Government Cloud Services</strong></p>
</td>
<td style="text-align: center;">
<p>Government Chief Information Officer</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/" target="_blank">https://www.digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Risk Assessment Process: Information Security</strong></p>
</td>
<td style="text-align: center;">
<p>Government Chief Information Officer</p>
</td>
<td>
<p><a title="Risk Assessment Process: Information Security" rel="noopener noreferrer" href="https://www.digital.govt.nz/dmsdocument/3~Risk-Assessment-Process-Information-Security.pdf" target="_blank">https://www.digital.govt.nz/dmsdocument/3~Risk-Assessment-Process-Information-Security.pdf [PDF, 282 KB]</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Government Use of Offshore Information and Communication Technologies (ICT) Service Providers – Advice on Risk Management April 2009</strong></p>
</td>
<td style="text-align: center;">
<p>State Services Commission</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://ict.govt.nz/assets/ICT-System-Assurance/offshore-ICT-service-providers-april-2009.pdf" target="_blank">http://ict.govt.nz/assets/ICT-System-Assurance/offshore-ICT-service-providers-april-2009.pdf</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cloud Computing a Guide to Making the Right Choices – February 2013</strong></p>
</td>
<td style="text-align: center;">
<p>Office of the Privacy Commissioner (OPC)</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.privacy.org.nz/publications/statements-media-releases/making-the-right-choices-in-cloud-computing-new-privacy-commissioner-guidance/" target="_blank">Office of the Privacy Commissioner | Making the right choices in cloud computing - new Privacy Commissioner guidance</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cloud Computing Security Considerations</strong></p>
</td>
<td style="text-align: center;">
<p>ASD</p>
</td>
<td>
<p><a title="Cloud Computing Security Configurations" rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/cloud-computing-security-considerations" target="_blank">https://www.cyber.gov.au/acsc/view-all-content/publications/cloud-computing-security-considerations</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cloud Computing Policy and Guidance 2014</strong></p>
</td>
<td style="text-align: center;">
<p>Australian Government Information Management Office (AGIMO)</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.finance.gov.au/agict//policy-guides-procurement/cloud" target="_blank">http://www.finance.gov.au/agict//policy-guides-procurement/cloud</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cloud Control Matrix</strong></p>
</td>
<td style="text-align: center;">
<p>CSA</p>
</td>
<td>
<p><a title="Cloud Control Matrix" rel="noopener noreferrer" href="https://cloudsecurityalliance.org/research/cloud-controls-matrix/" target="_blank">https://cloudsecurityalliance.org/research/cloud-controls-matrix/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Security Guidance for Critical Areas of Focus in Cloud Computing</strong></p>
</td>
<td style="text-align: center;">
<p>CSA</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://cloudsecurityalliance.org/research/guidance/" target="_blank">https://cloudsecurityalliance.org/research/guidance/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Top Threats to Cloud Computing</strong></p>
</td>
<td style="text-align: center;">
<p>CSA</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://cloudsecurityalliance.org/research/working-groups/top-threats/" target="_blank">https://cloudsecurityalliance.org/research/working-groups/top-threats/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Governance, Risk Management and Compliance Stack</strong></p>
</td>
<td style="text-align: center;">
<p>CSA</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.cloudsecurityalliance.org/grcstack.html" target="_blank">http://www.cloudsecurityalliance.org/grcstack.html</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Security &amp; Resilience in Governmental Clouds - Making an informed decision</strong></p>
</td>
<td style="text-align: center;">
<p>ENISA</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.enisa.europa.eu/publications/security-and-resilience-in-governmental-clouds" target="_blank">https://www.enisa.europa.eu/publications/security-and-resilience-in-governmental-clouds</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cloud Computing Information Assurance Framework</strong></p>
</td>
<td style="text-align: center;">
<p>ENISA</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.enisa.europa.eu/publications/cloud-computing-information-assurance-framework" target="_blank">https://www.enisa.europa.eu/publications/cloud-computing-information-assurance-framework</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cloud Computing Security Risk Assessment</strong></p>
</td>
<td style="text-align: center;">
<p>ENISA</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.enisa.europa.eu/publications/cloud-computing-risk-assessment" target="_blank">https://www.enisa.europa.eu/publications/cloud-computing-risk-assessment</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Critical Cloud Computing – A CIIP perspective on cloud computing services</strong></p>
</td>
<td style="text-align: center;">
<p>ENISA</p>
</td>
<td><a rel="noopener noreferrer" href="https://www.enisa.europa.eu/publications/critical-cloud-computing" target="_blank">Critical Cloud Computing-A CIIP perspective on cloud computing services — ENISA (europa.eu)</a></td>
</tr>
<tr>
<td><strong><strong>NIST Special Publication</strong>&nbsp;800-144, December 2011</strong></td>
<td>
<p><strong>Guidelines on Security and Privacy in Public Cloud Computing</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf [PDF, 1.08 MB]</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Enterprise Risk Management for Cloud Computing</strong></p>
</td>
<td style="text-align: center;">
<p>COSO</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.coso.org/Shared%20Documents/Cloud-Computing-Thought-Paper.pdf" target="_blank">Cloud-Computing-Thought-Paper.pdf (coso.org)</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cloud Security</strong></p>
</td>
<td style="text-align: center;">
<p>Cloud Industry Forum</p>
</td>
<td>
<p><a href="https://cloudindustryforum.org/knowledge-hub/">Knowledge Hub - Cloud Industry Forum</a><a rel="noopener noreferrer" href="http://www.cloudindustryforum.org/content/cloud-security" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>OASIS – various reference and guidance documents</strong></p>
</td>
<td style="text-align: center;">
<p>&nbsp;OASIS</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.oasis-open.org/committees/tc_cat.php?cat=cloud" target="_blank">https://www.oasis-open.org/committees/tc_cat.php?cat=cloud</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="References - Standards"><paragraph
    title="20.1.18."


><![CDATA[<p class="NormS10C1b">Further&nbsp;standards can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Reference&nbsp;</strong></p>
</td>
<td>
<p><strong>Title</strong></p>
</td>
<td>
<p><strong>Publisher</strong></p>
</td>
<td>
<p><strong>Source</strong></p>
</td>
</tr>
<tr>
<td><strong><strong>NIST Special Publication 800-145, September 2011</strong></strong></td>
<td>
<p><strong>The NIST Definition of Cloud Computing</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf" target="_blank">http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf [PDF, 84 KB]</a></p>
</td>
</tr>
<tr>
<td><strong><strong>NIST Special Publication 800-146, May 2012</strong></strong></td>
<td>
<p><strong>Cloud Computing Synopsis and Recommendations&nbsp;</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-146.pdf" target="_blank">http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-146.pdf [PDF, 1.44 MB]</a></p>
</td>
</tr>
<tr>
<td><strong><strong>NIST Special Publication 500-291, version 2, July 2013</strong></strong></td>
<td>
<p><strong>Cloud Computing Standards Roadmap&nbsp;</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.nist.gov/itl/cloud/upload/NIST_SP-500-291_Version-2_2013_June18_FINAL.pdf" target="_blank">http://www.nist.gov/itl/cloud/upload/NIST_SP-500-291_Version-2_2013_June18_FINAL.pdf [PDF, 2.19 MB]</a></p>
</td>
</tr>
<tr>
<td><strong><strong>NIST Special Publication 500-292, September 2011</strong></strong></td>
<td>
<p><strong>Cloud Computing Reference Architecture&nbsp;</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909505" target="_blank">http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909505 [PDF, 1.42 MB]</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 17788:2014&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Cloud computing -- Overview and vocabulary</strong></p>
</td>
<td>
<p style="text-align: center;">ISO</p>
</td>
<td>
<p><a title="Information technology — Cloud computing — Overview and vocabulary" rel="noopener noreferrer" href="https://www.iso.org/standard/60544.html" target="_blank">https://www.iso.org/standard/60544.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 17789:2014&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Cloud computing -- Reference architecture</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Information technology — Cloud computing — Reference architecture" rel="noopener noreferrer" href="https://www.iso.org/standard/60545.html" target="_blank">https://www.iso.org/standard/60545.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 17826:2012&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Cloud Data Management Interface (CDMI)</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Information technology — Cloud Data Management Interface (CDMI)" rel="noopener noreferrer" href="https://www.iso.org/standard/60617.html" target="_blank">https://www.iso.org/standard/60617.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC CD 19086-1:2016&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Cloud computing -- Service level agreement (SLA) framework and Technology -- Part 1: Overview and concepts</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts" rel="noopener noreferrer" href="https://www.iso.org/standard/67545.html" target="_blank">https://www.iso.org/standard/67545.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC NP 19086-2:2018&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Cloud computing -- Service level agreement (SLA) framework and Technology -- Part 2: Metrics</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model" rel="noopener noreferrer" href="https://www.iso.org/standard/67546.html" target="_blank">https://www.iso.org/standard/67546.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC NP 19086-3:2017&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Cloud computing -- Service level agreement (SLA) framework and Technology -- Part 3: Core requirements</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements" rel="noopener noreferrer" href="https://www.iso.org/standard/67547.html" target="_blank">https://www.iso.org/standard/67547.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC AWI 19941:2017&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information Technology -- Cloud Computing -- Interoperability and Portability</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Information technology — Cloud computing — Interoperability and portability" rel="noopener noreferrer" href="https://www.iso.org/standard/66639.html" target="_blank">https://www.iso.org/standard/66639.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC AWI 19944-1:2020&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information Technology - Cloud Computing - Data and their Flow across Devices and Cloud Services</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Cloud computing and distributed platforms ─ Data flow, data categories and data use — Part 1: Fundamentals" rel="noopener noreferrer" href="https://www.iso.org/standard/79573.html" target="_blank">https://www.iso.org/standard/79573.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC DIS 27017:2015&nbsp;&nbsp;</strong></td>
<td>
<p><strong>(In Draft) Information technology -- Security techniques -- Code of practice for information security controls based on ISO/IEC 27002 for cloud services</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services" rel="noopener noreferrer" href="https://www.iso.org/standard/43757.html" target="_blank">https://www.iso.org/standard/43757.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27018:2019&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Security techniques -- Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors" rel="noopener noreferrer" href="https://www.iso.org/standard/76559.html" target="_blank">https://www.iso.org/standard/76559.html</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="20.1.19."


><![CDATA[<p class="NormS10C1b">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 109.896%;">
<tbody>
<tr>
<td style="width: 17.3996%;"><strong>Reference</strong></td>
<td style="width: 18.5068%;"><strong>Title</strong></td>
<td style="width: 64.062%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 17.3996%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 18.5068%;">
<p>GOV2, GOV5, GOV6, INFOSEC1, INFOSEC2, INFOSEC3 and INFOSEC4</p>
</td>
<td style="width: 64.062%;">
<p class="MsoNormal"><span style="color: black;"><a title="PSR" rel="noopener noreferrer" href="https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.protectivesecurity.govt.nz%2F&amp;data=05%7C02%7Crs01%40ncsc.govt.nz%7C68454f33f37d4b21719008dcd90a12d5%7C27dc6ab39c394134a7b2beddcf3638e6%7C1%7C0%7C638623884505132156%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=0qDy6FvCP9%2BPMQPL4mKyALzWbrE5oUlulvAcRCUB7%2BI%3D&amp;reserved=0" target="_blank"></a><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><a title="PSR" rel="noopener noreferrer" href="https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.protectivesecurity.govt.nz%2F&amp;data=05%7C02%7Crs01%40ncsc.govt.nz%7C68454f33f37d4b21719008dcd90a12d5%7C27dc6ab39c394134a7b2beddcf3638e6%7C1%7C0%7C638623884505132156%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=0qDy6FvCP9%2BPMQPL4mKyALzWbrE5oUlulvAcRCUB7%2BI%3D&amp;reserved=0" target="_blank"></a></span></p>
<p class="MsoNormal"><span style="color: black;"><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a><a rel="noopener noreferrer" href="https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.protectivesecurity.govt.nz%2Fpolicy%2Fsecurity-governance&amp;data=05%7C02%7Crs01%40ncsc.govt.nz%7C68454f33f37d4b21719008dcd90a12d5%7C27dc6ab39c394134a7b2beddcf3638e6%7C1%7C0%7C638623884505147226%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=utorH6zQaiA4w2vjJc1yshvijV8B%2Fj5OEb6hH8ccAO0%3D&amp;reserved=0" target="_blank"></a></span></p>
<a href="https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.protectivesecurity.govt.nz%2Fpolicy%2Finformation-security&amp;data=05%7C02%7Crs01%40ncsc.govt.nz%7C68454f33f37d4b21719008dcd90a12d5%7C27dc6ab39c394134a7b2beddcf3638e6%7C1%7C0%7C638623884505162103%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=uuc5QM2WYYdHbgcrSQgiS%2BHX6QzZjKLhH4bkdR%2FU0zU%3D&amp;reserved=0"></a><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a><br>
<p>&nbsp;</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Applicability"><paragraph
    title="20.1.20.R.01."

    tags="Cloud Computing,Governance,Public cloud security"


><![CDATA[<p>Security controls may not be available, cost effective or appropriate for all information classification levels. &nbsp;Much will depend on the cloud computing deployment model adopted. &nbsp;It is important that agencies understand when it is appropriate to use cloud services and how to select appropriate cloud services and service models, based on the classification of the information, any special handling endorsements and associated confidentiality, availability and integrity risks.</p>]]></paragraph>
<paragraph
    title="20.1.20.R.02."

    tags="Cloud Computing,Governance"


><![CDATA[<p>Systems and information classified CONFIDENTIAL and above require higher levels of protection. This applies in all types of cloud models including private, community, hybrid, and public cloud models and deployments.</p>]]></paragraph>
<paragraph
    title="20.1.20.C.01."

    tags="Cloud Computing,Governance"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="4800"
><![CDATA[<p>The use of cloud services and infrastructures for systems and data classified CONFIDENTIAL, SECRET or TOP SECRET MUST be approved by the GCSB.</p>]]></paragraph>
<paragraph
    title="20.1.20.C.02."

    tags="Cloud Computing,Governance,Public cloud security"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4801"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services MUST ensure cloud service providers apply the controls specified in this manual to any systems hosting, processing or storing agency data and systems.</p>]]></paragraph>
<paragraph
    title="20.1.20.C.03."

    tags="Cloud Computing,Governance,Public cloud security"


    classification="Confidential, Secret, Top Secret"
    compliance="Must Not"
    cid="4802"
><![CDATA[<p>Agencies MUST NOT use public, hybrid (incorporating a public element), or other external cloud services for systems and data classified CONFIDENTIAL, SECRET or TOP SECRET.</p>]]></paragraph>
<paragraph
    title="20.1.20.C.04."

    tags="Cloud Computing,Governance,Public cloud security"


    classification="All Classifications"
    compliance="Must Not"
    cid="4803"
><![CDATA[<p>Agencies MUST NOT use public or hybrid (incorporating a public element) cloud services to host, process, store or transmit NZEO endorsed information.</p>]]></paragraph>
<paragraph
    title="20.1.20.C.05."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Should"
    cid="4804"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services SHOULD obtain formal assurance cloud service providers will apply the controls specified in this manual to any cloud service hosting, processing or storing agency data and systems.</p>]]></paragraph>
</block>
<block title="Risk Assessment"><paragraph
    title="20.1.21.R.01."

    tags="Cloud Computing,Governance,Risk Management,Risk Assessment,Public cloud security"


><![CDATA[<p>The adoption of cloud technologies will introduce a wide range of technology and information system risks <em>in addition</em> to the risks that already exist for agency systems. &nbsp;It is vital that these additional risks are identified and assessed in order to select appropriate controls and countermeasures. &nbsp;Trust boundaries must be defined to assist in determining effective controls and where these controls can best be applied.</p>]]></paragraph>
<paragraph
    title="20.1.21.R.02."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


><![CDATA[<p>The <strong>responsibility</strong> for the implementation, management and maintenance of controls will depend on the service model and deployment model (refer to NIST SP800-145) used in the delivery of cloud services.</p>]]></paragraph>
<paragraph
    title="20.1.21.C.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4808"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services MUST conduct a risk assessment <em>before</em> implementation or adoption.</p>]]></paragraph>
<paragraph
    title="20.1.21.C.02."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4809"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services MUST determine trust boundaries <em>before</em> implementation.</p>]]></paragraph>
<paragraph
    title="20.1.21.C.03."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4810"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services MUST determine where the responsibility (agency or cloud service provider) for implementing, managing and maintaining controls lies in accordance with agreed trust boundaries.</p>]]></paragraph>
<paragraph
    title="20.1.21.C.04."

    tags="Cloud Computing,Governance,Accreditation,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4811"
><![CDATA[<p>Agencies MUST ensure cloud risks for any cloud service adopted are understood and formally accepted by the Agency Head or Chief Executive (or their formal delegate) and the agency’s Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="20.1.21.C.05."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4812"
><![CDATA[<p>Agencies MUST consult with the GCDO to ensure the strategic and other cloud risks are comprehensively assessed.</p>]]></paragraph>
<paragraph
    title="20.1.21.C.06."

    tags="Cloud Computing,Governance,Residual Risk,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4813"
><![CDATA[<p>Agencies procuring or using cloud services to be used by multiple agencies MUST ensure all interested parties formally agree the risks, controls and any residual risks of such cloud services.</p>]]></paragraph>
<paragraph
    title="20.1.21.C.07."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4814"
><![CDATA[<p>Agencies using cloud services MUST ensure they have conducted a documented risk assessment, accepted any residual risks, and followed the endorsement procedure required by the GCDO.</p>]]></paragraph>
</block>
<block title="Offshore Services"><paragraph
    title="20.1.22.R.01."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


><![CDATA[<p>Cloud services hosted offshore introduce several additional risks, in particular, jurisdictional, sovereignty and privacy risks. &nbsp;Foreign owned cloud service providers operating in New Zealand, are subject to New Zealand legislation and regulation. &nbsp;They may, however, also be subject to a foreign government’s privacy, lawful access and data intercept legislation.</p>]]></paragraph>
<paragraph
    title="20.1.22.R.02."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


><![CDATA[<p>The majority of these jurisdictional, sovereignty and privacy risks cannot be adequately managed with controls available today. &nbsp;They must therefore be carefully considered and accepted by the Agency Head or Chief Executive before the adoption of such cloud services.</p>]]></paragraph>
<paragraph
    title="20.1.22.R.03."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


><![CDATA[<p>Some cloud services hosted within New Zealand may be supported by foreign based technical staff.&nbsp; This characteristic introduces a further risk element to the use of foreign-owned cloud service providers.</p>]]></paragraph>
<paragraph
    title="20.1.22.R.04."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


><![CDATA[<p>Further complexity can be introduced when All-of-Government or multi-agency systems are deployed or integrated with cloud services. &nbsp;Any security breach can affect several agencies and compromise large or aggregated data sets.</p>]]></paragraph>
<paragraph
    title="20.1.22.C.01."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4820"
><![CDATA[<p>Agencies using cloud services hosted offshore MUST ensure jurisdictional, sovereignty and privacy risks are fully considered and formally accepted by the Agency Head or Chief Executive and the agency’s Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="20.1.22.C.02."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4821"
><![CDATA[<p>Agencies using cloud services hosted offshore MUST ensure that the agency retains ownership of its information in any contract with the cloud service provider.</p>]]></paragraph>
<paragraph
    title="20.1.22.C.03."

    tags="Cloud Computing,Data Management,Governance,Residual Risk,Risk Management,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4822"
><![CDATA[<p>Agencies using cloud services hosted offshore and connected to All-of-Government systems MUST ensure they have conducted a risk assessment, accepted any residual risks, and followed the endorsement procedure required by the GCDO.</p>]]></paragraph>
<paragraph
    title="20.1.22.C.04."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


    classification="Confidential, Top Secret, Secret"
    compliance="Must Not"
    cid="4823"
><![CDATA[<p>Agencies MUST NOT use cloud services hosted offshore for information or systems classified CONFIDENTIAL, SECRET or TOP SECRET.</p>]]></paragraph>
<paragraph
    title="20.1.22.C.05."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Must Not"
    cid="4824"
><![CDATA[<p>Agencies MUST NOT use cloud services hosted offshore for information with an NZEO endorsement.</p>]]></paragraph>
<paragraph
    title="20.1.22.C.06."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Risk Assessment,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Should Not"
    cid="4825"
><![CDATA[<p>Agencies SHOULD NOT use cloud services hosted offshore <em>unless</em>:</p>
<ul>
<li>privacy, information sensitivity and information value has been fully assessed by the agency;</li>
<li>a comprehensive risk assessment is undertaken by the agency;</li>
<li>controls to manage identified risks have been specified by the agency; and</li>
<li>the cloud service provider is able to provide adequate assurance that these controls have been properly implemented <em>before</em> the agency uses the cloud service.</li>
</ul>]]></paragraph>
</block>
<block title="System Availability"><paragraph
    title="20.1.23.R.01."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Risk Assessment,Public cloud security"


><![CDATA[<p>The availability of agency systems, business functionality and any customer or client online services, is subject to additional risks in an outsourced cloud environment. &nbsp;A risk assessment will include consideration of business requirements on availability in a cloud environment.</p>]]></paragraph>
<paragraph
    title="20.1.23.R.02."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


><![CDATA[<p>Risks to business functionality may include service outages, such as communications, data centre power, backup and other failures or interruptions. &nbsp;Entity failures such the merger, acquisition or liquidation of the cloud service provider may also present a significant business risk to availability.</p>]]></paragraph>
<paragraph
    title="20.1.23.C.01."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4829"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services MUST consider the risks to the availability of systems and information in their design of cloud systems architectures and supporting controls and governance processes.</p>]]></paragraph>
<paragraph
    title="20.1.23.C.02."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4830"
><![CDATA[<p>Any contracts for the provision of cloud services MUST include service level, availability, recoverability and restoration provisions.</p>]]></paragraph>
<paragraph
    title="20.1.23.C.03."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4831"
><![CDATA[<p>Agencies MUST ensure contracts with cloud service providers include provisions to manage risks associated with the merger, acquisition, liquidation or bankruptcy of the service provider and any subsequent termination of cloud services.</p>]]></paragraph>
</block>
<block title="Unauthorised Access"><paragraph
    title="20.1.24.R.01."

    tags="Cloud Computing,Governance,Access Control,Risk Assessment,Public cloud security"


><![CDATA[<p>Cloud service providers may not provide adequate physical security and physical and logical access controls to meet agencies requirements. &nbsp;An assessment of cloud service risks will include physical and systems security. &nbsp;Refer also to <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 – Gateway Security</a>, <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation</a> and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17362">Section 22.3 – Virtual Local Area Networks</a>.</p>]]></paragraph>
<paragraph
    title="20.1.24.R.02."

    tags="Cloud Computing,Encryption,Governance,Access Control,Public cloud security"


><![CDATA[<p>Some cloud services hosted within New Zealand may be supported by technical staff, presenting additional risk. &nbsp;In some cases the technical staff are based offshore. &nbsp;The use of encryption can provide additional assurance against unauthorised access – refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a>.</p>]]></paragraph>
<paragraph
    title="20.1.24.R.03."

    tags="Cloud Computing,Data Management,Governance,Access Control,Public cloud security"


><![CDATA[<p>Data Loss Prevention (DLP) technologies and techniques are implemented to safeguard sensitive or critical information from leaving the organisation. &nbsp;They operate by identifying unauthorised access and data exfiltration and take remedial action by monitoring, detecting and blocking unauthorised attempts to exfiltrate data. &nbsp;For DLP to be effective, all data states (processing, transmission and storage) are monitored.</p>]]></paragraph>
<paragraph
    title="20.1.24.C.01."

    tags="Cloud Computing,Governance,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="4836"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services SHOULD ensure cloud service providers apply the physical, virtual and access controls specified in this manual for agency systems and data protection.</p>]]></paragraph>
<paragraph
    title="20.1.24.C.02."

    tags="Cloud Computing,Governance,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="4837"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services SHOULD apply separation and access controls to protect data and systems where support is provided by offshore technical staff.</p>]]></paragraph>
<paragraph
    title="20.1.24.C.03."

    tags="Cloud Computing,Data Management,Governance,Access Control,Data Transfers,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="4838"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services SHOULD apply controls to detect and prevent unauthorised data transfers and multiple or large scale data transfers to offshore locations and entities.</p>]]></paragraph>
<paragraph
    title="20.1.24.C.04."

    tags="Cloud Computing,Data Management,Encryption,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="4839"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services SHOULD consider the use of encryption for data in transit and at rest.</p>]]></paragraph>
</block>
<block title="Incident Handling and Management"><paragraph
    title="20.1.25.R.01."

    tags="Cloud Computing,Governance,Incident Management,Public cloud security,Information Security Incidents"


><![CDATA[<p>Cloud service providers may not provide the same level of incident identification and management as provided by agencies. &nbsp;In some cases, these services will attract additional costs. &nbsp;Careful management of contracts is required to ensure agency requirements for incident detection and management are fully met when adopting cloud services.</p>]]></paragraph>
<paragraph
    title="20.1.25.C.01."

    tags="Cloud Computing,Governance,Incident Management,Public cloud security,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="4842"
><![CDATA[<p>Agencies MUST include incident handling and management services in contracts with cloud service providers.</p>]]></paragraph>
<paragraph
    title="20.1.25.C.02."

    tags="Cloud Computing,Governance,Incident Management,Public cloud security,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="4843"
><![CDATA[<p>Agencies MUST develop and implement incident identification and management processes in accordance with this manual (See<a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13001"> Chapter 6 – Information Security Monitoring</a>, <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information Security Incidents</a>, <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 – Personnel Security</a> and <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access Control</a>).</p>]]></paragraph>
</block>
<block title="Backup, Recovery Archiving and Data Remanence"><paragraph
    title="20.1.26.R.01."

    tags="Cloud Computing,Governance,Business Continuity,Public cloud security"


><![CDATA[<p>Cloud service providers will invariably provide some business continuity and disaster recovery plans, including system and data backup, for their own operational purposes. &nbsp;These plans may not include customer data or systems. &nbsp;Where cloud service providers do not adequately meet agency business requirements, an agency defined backup and recovery plan may be necessary.</p>]]></paragraph>
<paragraph
    title="20.1.26.R.02."

    tags="Cloud Computing,Data Management,Technical,Public cloud security"


><![CDATA[<p>Residual information remaining on a device or storage media after clearing or sanitising the device or media is described as data remanence. &nbsp;This characteristic is sometimes also described as data persistence, although this description may include the wider implication of multiple copies.</p>]]></paragraph>
<paragraph
    title="20.1.26.R.03."

    tags="Cloud Computing,Data Management,Governance,Risk Assessment,Public cloud security"


><![CDATA[<p>Full consideration of risks associated with data remanence and data persistence is required to ensure agency requirements for backup, recovery, archiving and data management is included in any cloud service contract.</p>]]></paragraph>
<paragraph
    title="20.1.26.R.04."

    tags="Cloud Computing,Data Management,Governance,Public cloud security"


><![CDATA[<p>In addition to backups, cloud service providers may also archive data. &nbsp;Multi-national or foreign based cloud service providers may have established data centres in several countries. &nbsp;Backup and archiving is invariably automated and there may be no feasible method of determining where and in what jurisdiction the data have been archived. &nbsp;This can create an issue of data remanence and persistence where cloud service contracts are terminated but not all agency data can be effectively purged or deleted from the provider’s systems.</p>]]></paragraph>
<paragraph
    title="20.1.26.C.01."

    tags="Cloud Computing,Data Management,Governance,Business Continuity,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4849"
><![CDATA[<p>Agencies MUST develop and implement a backup, recovery and archiving plan and supporting procedures (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-13074">Section 6.4 – Business Continuity and Disaster Recovery</a>).</p>]]></paragraph>
<paragraph
    title="20.1.26.C.02."

    tags="Cloud Computing,Data Management,Governance,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4850"
><![CDATA[<p>Agencies MUST include a data purge or secure delete process in any cloud service contracts.</p>]]></paragraph>
<paragraph
    title="20.1.26.C.03."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="4851"
><![CDATA[<p>Any data purge or secure delete process in any cloud service contracts MUST be independently verifiable.</p>]]></paragraph>
</block>
<block title="User Awareness and Training"><paragraph
    title="20.1.27.R.01."

    tags="Cloud Computing,Governance,Public cloud security"


><![CDATA[<p>The introduction of cloud services will introduce change to the appearance and functionality of systems, how users access agency systems and types of user support. It is essential that users are aware of information security and privacy concepts and risks associated with the services they use.</p>
<p>Support provided by the cloud service provider may attract additional charges.</p>]]></paragraph>
<paragraph
    title="20.1.27.C.01."

    tags="Cloud Computing,Governance,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4854"
><![CDATA[<p>Agencies MUST develop and implement user awareness and training programmes to support and enable safe use of cloud services (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-13361">Section 9.1 – Information Security Awareness and Training</a>).</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="20.2. Virtualisation"><subsection title="Objective"><paragraph
    title="20.2.1."


><![CDATA[<p>To identify virtualisation specific risks and apply mitigations to minimise risk and secure the virtual environment.</p>]]></paragraph>
 </subsection>
<subsection title="Context"><paragraph
    title="20.2.2."


><![CDATA[<p>Virtualisation is the software simulation of the components of an information system and may include the simulation of hardware, operating systems, applications, infrastructure and storage. Underlying the simulation is hardware and control or simulation software, often described as a virtual machine (VM).</p>]]></paragraph>
<paragraph
    title="20.2.3."


><![CDATA[<p>A Hypervisor is a fundamental component of a virtual environment and provides a supervisory function and framework that enables multiple operating systems, often described as “Guest Operating Systems”, to run on a single physical device.</p>]]></paragraph>
<paragraph
    title="20.2.4."


><![CDATA[<p>A fundamental construct in the management of risk in virtual environments is that of Trust Zones and Trust Boundaries. A Trust Zone is a zoning construct based on levels of trust, classification, information asset value and essential information security. A Trust Boundary is the interface between two or more Trust Zones. Trust Zones use the principles of separation and segregation to manage sensitive information assets and ensure security policies are consistently applied to all assets in a particular trust Zone. As assets are added to a Trust Zone, they inherit the security policies set for that Trust Zone.</p>]]></paragraph>
<paragraph
    title="20.2.5."


><![CDATA[<p>Trust Zones will also apply the Principal of Least Privilege, which requires that each element in the network is permitted to access only those other network elements that are required for the node to perform its business function.</p>]]></paragraph>
<paragraph
    title="20.2.6."


><![CDATA[<p>Virtualisation is radically changing how agencies and other organisations select, deploy implement and manage ICT. &nbsp;While offering significant benefits in efficiency, resource consolidation and utilisation of CIT assets, virtualisation can add risks to the operation of a system and the security of the data processed and managed by that system.</p>]]></paragraph>
<paragraph
    title="20.2.7."


><![CDATA[<p>Virtualisation adds layers of technology and can combine many, traditionally discrete and physically separate components, into a single physical system. &nbsp;This consolidation invariably creates greater impact if faults occur or the system is compromised. &nbsp;Virtual systems are designed to be dynamic and to facilitate the movement and sharing of data. This characteristic is also a prominent attack vector and can make the enforcement and maintenance of security boundaries much more complex.</p>]]></paragraph>
<paragraph
    title="20.2.8."


><![CDATA[<p>Virtualisation is susceptible to the same threats and vulnerabilities as traditional ICT assets but traditional security offers limited visibility of virtualised environments where the assets configurations and security postures are constantly changing. Incidents in virtualised environments can rapidly escalate across multiple services, applications and data sets, causing significant damage and making recovery complex.</p>]]></paragraph>
 <block title="Virtualisation risks"><paragraph
    title="20.2.9."


><![CDATA[<p>Virtualisation risks can be considered in four categories:</p>
<ul>
<li>Risks directly related to virtualisation technologies;</li>
<li>Systems architecture; implementation and management;</li>
<li>The usage and business models; and</li>
<li>Generic technology risks.</li>
</ul>]]></paragraph>
</block>
<block title="Mitigations"><paragraph
    title="20.2.10."


><![CDATA[<p>The controls described elsewhere in this manual deal with generic technology risks. Important steps in risk mitigation for virtual environments include:</p>
<ul>
<li>Identify and accurately characterise all deployed virtualisation and security measures beyond built-in hypervisor controls on VMs.</li>
<li>Comparing security controls against known threats and industry standards to determine gaps and select appropriate controls.</li>
<li>Identify and implement anti-malware tools, intrusion prevention and detection, active vulnerability scanning and systems security management and reporting tools.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="20.2.11."


><![CDATA[<p class="NormS10C1b">Further references can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td>
<p><strong>Publisher</strong></p>
</td>
<td>
<p><strong>Source</strong></p>
</td>
</tr>
<tr>
<td>
<p><strong><strong>NIST&nbsp;<strong>Special Publication</strong></strong>&nbsp;800-125, January 2011</strong></p>
</td>
<td>
<p><strong>Guide to Security for Full Virtualisation Technologies</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-125/final" target="_blank">SP 800-125, Guide to Security for Full Virtualization Technologies | CSRC (nist.gov)</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>The Security Technical Implementation Guides,</strong></p>
</td>
<td style="text-align: center;">
<p>Defense Information Systems Agency,</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://public.cyber.mil/stigs/" target="_blank">Security Technical Implementation Guides (STIGs) – DoD Cyber Exchange</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Virtualization Security Checklist</strong></p>
</td>
<td style="text-align: center;">
<p>ISACA</p>
</td>
<td><a href="https://docplayer.net/656004-Virtualization-security-checklist.html">Virtualization Security Checklist - PDF Free Download (docplayer.net)</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Guidelines for System Hardening&nbsp;</strong></p>
</td>
<td style="text-align: center;">
<p>ACSC</p>
</td>
<td>
<p><a href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-system-hardening">Guidelines for System Hardening | Cyber.gov.au</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Virtual Machine Security Guidelines</strong></p>
</td>
<td style="text-align: center;">
<p>The Center for Internet Security</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://benchmarks.cisecurity.org/tools2/vm/CIS_VM_Benchmark_v1.0.pdf" target="_blank"></a><a href="https://www.cisecurity.org/cis-benchmarks">CIS Benchmarks (cisecurity.org)</a><a rel="noopener noreferrer" href="http://benchmarks.cisecurity.org/tools2/vm/CIS_VM_Benchmark_v1.0.pdf" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Software-Defined Networking (SDN) Definition</strong></p>
</td>
<td style="text-align: center;">
<p>Open Networking Foundation</p>
</td>
<td>
<p><a href="https://opennetworking.org/sdn-definition/">Software-Defined Networking (SDN) Definition - Open Networking Foundation</a><a rel="noopener noreferrer" href="https://www.opennetworking.org/sdn-resources/sdn-definition" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Network segmentation and segregation</strong></p>
</td>
<td style="text-align: center;">
<p>ASD</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/implementing-network-segmentation-and-segregation" target="_blank">Implementing Network Segmentation and Segregation | Cyber.gov.au</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Functional segregation between servers"><paragraph
    title="20.2.12.R.01."

    tags="Technical,Virtualisation"


><![CDATA[<p>Agencies may implement segregation through the use of techniques to restrict a process to a limited portion of the file system, but this is often less effective. &nbsp;Virtualisation technology MUST be carefully architected to avoid cascade failures.</p>]]></paragraph>
<paragraph
    title="20.2.12.R.02."

    tags="Technical,Virtualisation"


><![CDATA[<p>The key element in separating security domains of differing classifications is physical separation. Current virtualisation technology cannot guarantee separation.</p>]]></paragraph>
<paragraph
    title="20.2.12.R.03."

    tags="Technical,Virtualisation"


><![CDATA[<p>The use of virtualisation technology within a security domain is a recognised means of efficiently architecting a system.</p>]]></paragraph>
<paragraph
    title="20.2.12.C.01."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Must Not"
    cid="4877"
><![CDATA[<p>Virtualisation technology MUST NOT be used for functional segregation between servers of different classifications.</p>]]></paragraph>
<paragraph
    title="20.2.12.C.02."

    tags="Technical,Virtualisation"


    classification="Secret, Top Secret, Confidential"
    compliance="Must Not"
    cid="4878"
><![CDATA[<p>Virtualisation technology MUST NOT be used for functional segregation between servers in different security domains at the same classification.</p>]]></paragraph>
<paragraph
    title="20.2.12.C.03."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4879"
><![CDATA[<p>Agencies SHOULD ensure that functional segregation between servers is achieved by:</p>
<ul>
<li>physically, using single dedicated machines for each function; or</li>
<li>using virtualisation technology to create separate virtual machines for each function within the same security domain.</li>
</ul>]]></paragraph>
<paragraph
    title="20.2.12.C.04."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should Not"
    cid="4880"
><![CDATA[<p>Virtualisation technology SHOULD NOT be used for functional segregation between servers in different security domains at the same classification.</p>]]></paragraph>
</block>
<block title="Risk Management"><paragraph
    title="20.2.13.R.01."

    tags="Governance,Risk Management,Risk Assessment,Virtualisation"


><![CDATA[<p>Where virtualisation technologies are to be used, risk identification, assessment and management are important in order to identify virtualisation specific risks, threats and treatments.</p>]]></paragraph>
<paragraph
    title="20.2.13.C.01."

    tags="Governance,Risk Management,Risk Assessment,Virtualisation"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4883"
><![CDATA[<p>Agencies MUST undertake a virtualisation specific risk assessment in order to identify risks, related risk treatments and controls.</p>]]></paragraph>
<paragraph
    title="20.2.13.C.02."

    tags="Governance,Risk Management,Risk Assessment,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4884"
><![CDATA[<p>Agencies SHOULD undertake a virtualisation specific risk assessment in order to identify risks and related risk treatments.</p>]]></paragraph>
</block>
<block title="Systems Architecture"><paragraph
    title="20.2.14.R.01."

    tags="Technical,Virtualisation"


><![CDATA[<p>It is important to include virtualisation specific concepts, constraints, mitigations and controls in the design of systems architectures that propose using virtualisation technologies, in order to gain maximum advantage from the use of these technologies and to ensure security of systems and data is maintained.</p>]]></paragraph>
<paragraph
    title="20.2.14.R.02."

    tags="Technical,Virtualisation"


><![CDATA[<p>Virtual environments enable a small number of technical specialists to cover a wide range of activities such as network, security, storage and application management. &nbsp;Such activities are usually undertaken as discrete activities by a number of individuals in a physical environment. &nbsp;To remain secure and correctly and safely share resources, VMs must be designed following the principles of separation and segregation through the establishment of trust zones.</p>]]></paragraph>
<paragraph
    title="20.2.14.R.03."

    tags="Technical,Virtualisation"


><![CDATA[<p>Software-defined networking (SDN) is an approach to networking in which control is decoupled from hardware and managed by a separate application described as a controller. &nbsp;SDNs are intended to provide flexibility by enabling network engineers and administrators to respond to rapidly changing business requirements. &nbsp;Separation and segregation principles also apply to SDNs.</p>]]></paragraph>
<paragraph
    title="20.2.14.R.04."

    tags="Technical,Virtualisation"


><![CDATA[<p>In addition to segregation of key elements, VM security can be strengthened through functional segregation. &nbsp;For example, the creation of separate security zones for desktops and servers with the objective of minimising intersection points.</p>]]></paragraph>
<paragraph
    title="20.2.14.R.05."

    tags="Technical,Virtualisation"


><![CDATA[<p>Poor control over VM deployments can lead to breaches where unauthorised communication and data exchange can take place between VMs. &nbsp;This can create opportunity for attackers to gain access to multiple VMs and the host system.</p>]]></paragraph>
<paragraph
    title="20.2.14.C.01."

    tags="Technical,Virtualisation"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4891"
><![CDATA[<p>Agencies MUST architect virtualised systems and environments to enforce the principles of separation and segregation of key elements of the system using trust zones or security domains.</p>]]></paragraph>
<paragraph
    title="20.2.14.C.02."

    tags="Technical,Virtualisation"


    classification="Secret, Confidential, Top Secret"
    compliance="Must Not"
    cid="4892"
><![CDATA[<p>Agencies MUST NOT permit the sharing of files or other operating system components between host and guest operating systems.</p>]]></paragraph>
<paragraph
    title="20.2.14.C.03."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4893"
><![CDATA[<p>Agencies SHOULD architect virtualised systems and environments to enforce the principles of separation and segregation of key elements of the system using trust zones.</p>]]></paragraph>
<paragraph
    title="20.2.14.C.04."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4894"
><![CDATA[<p>Agencies SHOULD design virtualised systems and environments to enable functional segregation within a security domain.</p>]]></paragraph>
<paragraph
    title="20.2.14.C.05."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4895"
><![CDATA[<p>Agencies SHOULD harden the host operating systems following an agency or other approved hardening guide.</p>]]></paragraph>
<paragraph
    title="20.2.14.C.06."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4896"
><![CDATA[<p>Agencies SHOULD separate production from test or development virtual environments.</p>]]></paragraph>
<paragraph
    title="20.2.14.C.07."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should Not"
    cid="4897"
><![CDATA[<p>Agencies SHOULD NOT permit the sharing of files or other operating system components between host and guest operating systems.</p>]]></paragraph>
</block>
<block title="Systems Management"><paragraph
    title="20.2.15.R.01."

    tags="Technical,Virtualisation"


><![CDATA[<p>VMs are easy to deploy, often without formal policies or controls to manage the creation, management and decommissioning of VMs. &nbsp;This is sometimes described as “VM sprawl”, which is the unplanned proliferation of VMs. &nbsp;Attackers can take advantage of poorly managed and monitored resources. &nbsp;More deployments also mean more failure points, so VM sprawl can create operational difficulties even if no malicious activity is involved.</p>]]></paragraph>
<paragraph
    title="20.2.15.R.02."

    tags="Technical,Virtualisation"


><![CDATA[<p>A related difficulty occurs with <strong>unsecured VM migration</strong> when a VM is migrated to a new host, and security policies and configuration are not updated. &nbsp;VMs may also be migrated to other physical servers with little or no indication to users that a migration has occurred. &nbsp;Unsecured migration can introduce vulnerabilities through poor configuration and incomplete security and operational monitoring.</p>]]></paragraph>
<paragraph
    title="20.2.15.R.03."

    tags="Technical,Virtualisation"


><![CDATA[<p>Denial of service attacks can be designed specifically to exploit virtual environments. &nbsp;These attacks range from traffic flooding to the exploit of the virtual environment host’s own resources.</p>]]></paragraph>
<paragraph
    title="20.2.15.R.04."

    tags="Technical,Virtualisation"


><![CDATA[<p>The ability to monitor VM backbone network traffic is vital to maintain security and operations. &nbsp;Conventional methods for monitoring network traffic are generally not effective because the traffic is largely contained and controlled within the virtual environment. Careful selection and implementation of hypervisors will ensure effective monitoring tools are enabled, tested and monitored.</p>]]></paragraph>
<paragraph
    title="20.2.15.C.01."

    tags="Technical,SOPs,Virtualisation"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="4903"
><![CDATA[<p>Agencies MUST ensure a VM migration policy and related SOPs are implemented.</p>]]></paragraph>
<paragraph
    title="20.2.15.C.02."

    tags="Technical,Virtualisation"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="4904"
><![CDATA[<p>Agencies MUST implement controls to prohibit unauthorised VM migrations within a virtual environment or between physical environments.</p>]]></paragraph>
<paragraph
    title="20.2.15.C.03."

    tags="Technical,Virtualisation"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="4905"
><![CDATA[<p>Agencies MUST implement controls to safely decommission VMs when no longer required, including elimination of images, snapshots, storage, backup, archives and any other residual data.</p>]]></paragraph>
<paragraph
    title="20.2.15.C.04."

    tags="Technical,SOPs,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4906"
><![CDATA[<p>Agencies SHOULD ensure a VM migration policy and related SOPs are implemented.</p>]]></paragraph>
<paragraph
    title="20.2.15.C.05."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4907"
><![CDATA[<p>Agencies SHOULD implement controls to prohibit unauthorised VM migrations within a virtual environment or between physical environments.</p>]]></paragraph>
<paragraph
    title="20.2.15.C.06."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4908"
><![CDATA[<p>Agencies SHOULD implement controls to safely decommission VMs when no longer required.</p>]]></paragraph>
<paragraph
    title="20.2.15.C.07."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4909"
><![CDATA[<p>Agencies SHOULD implement security and operational management and monitoring tools which include the following minimum capabilities:</p>
<ul>
<li>Identify VMs when initiated;</li>
<li>Validate integrity of files prior to installation;</li>
<li>Scan new VMs for vulnerabilities and misconfigurations;</li>
<li>Load only minimum operating system components and services;</li>
<li>Set resource usage limits;</li>
<li>Establish connections to peripherals only as required;</li>
<li>Ensure host and guest time synchronisation;</li>
<li>Detect snapshot rollbacks and scans after restores;</li>
<li>Track asset migration; and</li>
<li>Monitor the security posture of migrated assets.</li>
</ul>]]></paragraph>
</block>
<block title="Authentication and Access"><paragraph
    title="20.2.16.R.01."

    tags="Technical,Access Control,Virtualisation"


><![CDATA[<p>VM sprawl can compromise authentication and access procedures, identity management, and system logging. &nbsp;This can be complicated with the use of customer-facing interfaces, such as websites.</p>]]></paragraph>
<paragraph
    title="20.2.16.R.02."

    tags="Technical,Access Control,Virtualisation"


><![CDATA[<p>Host and guest interactions and their system vulnerabilities can magnify virtual system vulnerabilities. &nbsp;The co-hosting and multi-tenancy nature of virtual systems and the existence of multiple data sets can make a serious attack on a virtual environment particularly damaging.</p>]]></paragraph>
<paragraph
    title="20.2.16.R.03."

    tags="Technical,Access Control,Virtualisation"


><![CDATA[<p>A guest OS can avoid or ignore its VM encapsulation to interact directly with the hypervisor either as a direct attack or through poor design, configuration and control. &nbsp;This can give the attacker access to all VMs in the virtual environment and potentially, the host machine. &nbsp;Described as a “VM escape”, it is considered to be one of the most serious threats to virtual systems.</p>]]></paragraph>
<paragraph
    title="20.2.16.R.04."

    tags="Technical,Access Control,Virtualisation"


><![CDATA[<p>Hyperjacking is a form of attack that takes direct control of the hypervisor in order to gain access to the hosted VMs and data. &nbsp;This attack typically requires direct access to the hypervisor. &nbsp;While technically challenging, hyperjacking is considered a real-world threat.</p>]]></paragraph>
<paragraph
    title="20.2.16.C.01."

    tags="Technical,Access Control,Virtualisation"


    classification="All Classifications"
    compliance="Must"
    cid="4915"
><![CDATA[<p>Agencies MUST maintain strong physical security and physical access controls.</p>]]></paragraph>
<paragraph
    title="20.2.16.C.02."

    tags="Technical,Access Control,Virtualisation"


    classification="All Classifications"
    compliance="Must"
    cid="4916"
><![CDATA[<p>Agencies MUST maintain strong authentication and access controls.</p>]]></paragraph>
<paragraph
    title="20.2.16.C.03."

    tags="Technical,Access Control,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4917"
><![CDATA[<p>Agencies SHOULD maintain strong data validation checks.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="20.3. Virtual Local Area Networks"><subsection title="Objective"><paragraph
    title="20.3.1."


><![CDATA[<p>Virtual local area networks (VLANs) are deployed in a secure manner that does not compromise the security of information and systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="20.3.2."


><![CDATA[<p>This section covers information relating to the use of VLANs within agency networks.</p>]]></paragraph>
</block>
<block title="Multiprotocol Label Switching"><paragraph
    title="20.3.3."


><![CDATA[<p>For the purposes of this section Multiprotocol Label Switching (MPLS) is considered to be equivalent to VLANs and is subject to the same controls.</p>]]></paragraph>
</block>
<block title="Exceptions for connectivity"><paragraph
    title="20.3.4."


><![CDATA[<p>A single network, managed in accordance with a single SecPlan, for which some functional separation is needed for administrative or similar reasons, can use VLANs to achieve that functional separation.</p>]]></paragraph>
<paragraph
    title="20.3.5."


><![CDATA[<p>VLANs can also be used to separate VTC and IPT traffic from data traffic at the same classification (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16369">Section 18.3 – Video and Telephony Conferencing and Internet Protocol Telephony</a>).</p>]]></paragraph>
</block>
<block title="Software Defined Networking (SDN)"><paragraph
    title="20.3.6."


><![CDATA[<p>Software-defined networking (SDN) is an approach to networking in which control is decoupled from hardware and managed by a separate application described as a controller. &nbsp;SDNs are intended to provide flexibility by enabling network engineers and administrators to respond to rapidly changing business requirements.</p>]]></paragraph>
<paragraph
    title="20.3.7."


><![CDATA[<p>Separation and Segregation principles also apply to SDNs. &nbsp;Refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="20.3.8."


><![CDATA[<p class="NormS10C1b">Further references can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Reference&nbsp;</strong></p>
</td>
<td>
<p><strong>Title</strong></p>
</td>
<td>
<p><strong>Publisher</strong></p>
</td>
<td>
<p><strong>Source</strong></p>
</td>
</tr>
<tr>
<td><strong>IEEE 802.1Q-2011</strong></td>
<td>
<p><strong>IEEE Standard for Local and Metropolitan area networks – Media Access Control (MAC) Bridges, and Virtual Bridged Local Area Networks.</strong></p>
</td>
<td style="text-align: center;">
<p>Institute of Electrical and Electronics Engineers (IEEE)</p>
</td>
<td><a href="https://standards.ieee.org/">IEEE SA - The IEEE Standards Association - Home</a><a rel="noopener noreferrer" href="http://standards.ieee.org" target="_blank"></a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Inter-Switch Link and IEEE 802.1Q Frame Format</strong></p>
</td>
<td style="text-align: center;">
<p>CISCO</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html" target="_blank">Inter-Switch Link and IEEE 802.1Q Frame Format - Cisco</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Dynamic Trunking Protocol (DTP)</strong></p>
</td>
<td style="text-align: center;">
<p>CISCO</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.cisco.com/c/en/us/tech/lan-switching/virtual-lans-vlan-trunking-protocol-vlans-vtp/index.html" target="_blank">Virtual LANs VLAN Trunking Protocol (VLANs VTP) - Cisco</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Using VLANs"><paragraph
    title="20.3.9.R.01."

    tags="Technical,VLANs"


><![CDATA[<p>Limiting the sharing of a common (physical or virtual) switch between VLANs of differing classifications reduces the chance of data leaks that could occur due to VLAN vulnerabilities. &nbsp;Furthermore, disabling trunking on physical switches that carry VLANs of differing security domains will reduce the risk of data leakage across the VLANs. &nbsp;The principles of separation and segregation must be applied to all network designs and architectures.</p>]]></paragraph>
<paragraph
    title="20.3.9.C.01."

    tags="Technical,VLANs"


    classification="All Classifications"
    compliance="Must"
    cid="4942"
><![CDATA[<p>The principles of separation and segregation MUST be applied to the design and architecture of VLANs.</p>]]></paragraph>
<paragraph
    title="20.3.9.C.02."

    tags="Technical,VLANs"


    classification="Confidential, Secret, Top Secret"
    compliance="Must Not"
    cid="4943"
><![CDATA[<p>Agencies MUST NOT use VLANs between classified networks and any other network of a lower classification.</p>]]></paragraph>
<paragraph
    title="20.3.9.C.03."

    tags="Technical,VLANs"


    classification="All Classifications"
    compliance="Must Not"
    cid="4944"
><![CDATA[<p>Agencies MUST NOT use VLANs between any classified network and any unclassified network.</p>]]></paragraph>
<paragraph
    title="20.3.9.C.04."

    tags="Technical,VLANs"


    classification="All Classifications"
    compliance="Must Not"
    cid="4945"
><![CDATA[<p>VLAN trunking MUST NOT be used on switches managing VLANs of differing security domains.</p>]]></paragraph>
</block>
<block title="Configuration and administration"><paragraph
    title="20.3.10.R.01."

    tags="Technical,VLANs"


><![CDATA[<p>When administrative access is limited to originating from the highest classified network on a switch, the security risk of a data spill is reduced.</p>]]></paragraph>
<paragraph
    title="20.3.10.C.01."

    tags="Technical,VLANs"


    classification="All Classifications"
    compliance="Must"
    cid="4948"
><![CDATA[<p>Administrative access MUST be permitted only from the most trusted network.</p>]]></paragraph>
</block>
<block title="Disabling unused ports"><paragraph
    title="20.3.11.R.01."

    tags="Technical,VLANs"


><![CDATA[<p>Disabling unused ports on a switch will reduce the opportunity for direct or indirect attacks on systems.</p>]]></paragraph>
<paragraph
    title="20.3.11.C.01."

    tags="Technical,VLANs"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4951"
><![CDATA[<p>Unused ports on the switches MUST be disabled.</p>]]></paragraph>
<paragraph
    title="20.3.11.C.02."

    tags="Technical,VLANs"


    classification="All Classifications"
    compliance="Should"
    cid="4952"
><![CDATA[<p>Unused ports on the switches SHOULD be disabled.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="21. Data management"><section title="21.1. Data Transfers"><subsection title="Objective"><paragraph
    title="21.1.1."


><![CDATA[<p>Data transfers between systems are controlled and accountable.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="21.1.2."


><![CDATA[<p>This section covers the fundamental requirements of data transfers between systems and applies equally to data transfers using removal media and to data transfers via gateways.</p>]]></paragraph>
<paragraph
    title="21.1.3."


><![CDATA[<p>Additional requirements for data transfers using removal media can be found in the <a href="http://nzism.gcsb.govt.nz/ism-document#Section-14767">Section 13.3 – Media Usage</a> and additional requirements for data transfers via gateways can be found in the <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16876">Section 20.2 – Data Import and Export</a>.</p>]]></paragraph>
<paragraph
    title="21.1.4."


><![CDATA[<p>Transfers from a classified system where strong information security controls exist to a system of lower classification where controls may not be as robust, can lead to data spills, information loss and privacy breaches. &nbsp;It is important that appropriate levels of oversight and accountability are in place to minimise or prevent the undesirable loss or leakage of information.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="21.1.5."


><![CDATA[<p class="NormS10C1b">Relevant PSR requirements can be found at:</p>
<p>&nbsp;</p>
<table class="table-grey" style="width: 100%;">
<tbody>
<tr>
<td style="width: 19.2976%;"><strong>Reference</strong></td>
<td style="width: 17.733%;"><strong>Title</strong></td>
<td style="width: 62.9346%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 19.2976%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 17.733%;">GOV2, GOV6, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PERSEC1, PERSEC2, PERSEC3 and PERSEC4</td>
<td style="width: 62.9346%;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a> &nbsp;</p>
<a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="User responsibilities"><paragraph
    title="21.1.6.R.01."

    tags="Data Management,Governance,Data Transfers"


><![CDATA[<p>When users transfer data to and from systems they need to be aware of the potential consequences of their actions. &nbsp;This could include data spills of classified information onto systems not accredited to handle the classification of the data or the unintended introduction of malicious code. &nbsp;Accordingly agencies will need to hold personnel accountable for all data transfers that they make.</p>]]></paragraph>
<paragraph
    title="21.1.6.C.01."

    tags="Data Management,Governance,Data Transfers"


    classification="All Classifications"
    compliance="Must"
    cid="4138"
><![CDATA[<p>Agencies MUST establish a policy and train staff in the processes for data transfers between systems and the authorisations required before transfers can take place.</p>]]></paragraph>
<paragraph
    title="21.1.6.C.02."

    tags="Data Management,Governance,Data Transfers"


    classification="All Classifications"
    compliance="Must"
    cid="4141"
><![CDATA[<p>Agencies MUST ensure that system users transferring data to and from a system are held accountable for the data they transfer.</p>]]></paragraph>
</block>
<block title="Data transfer processes and procedures"><paragraph
    title="21.1.7.R.01."

    tags="Data Management,Governance,Data Transfers"


><![CDATA[<p>Personnel can assist in preventing information security incidents by checking protective markings (classifications, endorsements and releasability) checks to ensure that the destination system is appropriate for the protection of the data being transferred, performing antivirus checks on data to be transferred to and from a system, and following all processes and procedures for the transfer of data.</p>]]></paragraph>
<paragraph
    title="21.1.7.C.01."

    tags="Data Management,Governance,Data Transfers"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="4147"
><![CDATA[<p>Agencies MUST ensure that data transfers are performed in accordance with processes and procedures approved by the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="21.1.7.C.02."

    tags="Data Management,Governance,Data Transfers"


    classification="All Classifications"
    compliance="Should"
    cid="4148"
><![CDATA[<p>Agencies SHOULD ensure that data transfers are performed in accordance with processes and procedures approved by the Accreditation Authority.</p>]]></paragraph>
</block>
<block title="Data transfer authorisation"><paragraph
    title="21.1.8.R.01."

    tags="Data Management,Governance,Data Transfers"


><![CDATA[<p>Using a trusted source to approve transfers from a classified system to another system of a lesser classification or where a releasability endorsement is applied to the data to be transferred, ensures appropriate oversight and reporting of the activity.</p>]]></paragraph>
<paragraph
    title="21.1.8.C.01."

    tags="Data Management,Governance,Data Transfers"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="4151"
><![CDATA[<p>Agencies MUST ensure that all data transferred to a system of a lesser classification or a less secure system, is approved by a trusted source.</p>]]></paragraph>
</block>
<block title="Trusted sources"><paragraph
    title="21.1.9.R.01."

    tags="Data Management,Governance,Data Transfers"


><![CDATA[<p>Trusted sources are designated personnel who have the delegated authority to assess and approve the transfer or release of data or documents. &nbsp;Trusted sources may include security personnel within the agency such as the CISO and the ITSM.</p>]]></paragraph>
<paragraph
    title="21.1.9.C.01."

    tags="Data Management,Governance,Data Transfers"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="4156"
><![CDATA[<p>Trusted sources MUST be:</p><ul>
<li>a strictly limited list derived from business requirements and the result of a security risk assessment;</li>
<li>where necessary an appropriate security clearance is held; and</li>
<li>approved by the Accreditation Authority.</li>
</ul>]]></paragraph>
</block>
<block title="Import of data"><paragraph
    title="21.1.10.R.01."

    tags="Data Management,Technical,Data Transfers"


><![CDATA[<p>Scanning imported data for active or malicious content reduces the security risk of a system or network being infected, thus allowing the continued confidentiality, integrity and availability of the system or network.</p>]]></paragraph>
<paragraph
    title="21.1.10.R.02."

    tags="Data Management,Technical,Data Transfers"


><![CDATA[<p>Format checks provide a method to prevent known malicious formats from entering the system or network. &nbsp;Keeping and regularly auditing these logs allow for the system or network to be checked for any unusual activity or usage.</p>]]></paragraph>
<paragraph
    title="21.1.10.R.03."

    tags="Data Management,Technical,Data Transfers,Incident Management"


><![CDATA[<p>Personnel reporting unexpected events through the agency’s incident management process provide an early opportunity to contain malware, limit damage and correct errors.</p>]]></paragraph>
<paragraph
    title="21.1.10.C.01."

    tags="Data Management,Technical,Data Transfers"


    classification="All Classifications"
    compliance="Must"
    cid="4165"
><![CDATA[<p>Agencies importing data to a system MUST ensure that the data is scanned for malicious and active content.</p>]]></paragraph>
<paragraph
    title="21.1.10.C.02."

    tags="Data Management,Technical,Data Transfers"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4168"
><![CDATA[<p>Agencies importing data to a system MUST implement the following controls:</p>
<ul>
<li>scanning for malicious and active content;</li>
<li>data format checks;</li>
<li>identify unexpected attachments or embedded objects;</li>
<li>log each event; and</li>
<li>monitoring to detect overuse/unusual usage patterns.</li>
</ul>]]></paragraph>
</block>
<block title="Export of highly formatted textual data"><paragraph
    title="21.1.11.R.01."

    tags="Data Management,Technical,Data Transfers"


><![CDATA[<p>When highly formatted textual data with no free text fields is to be transferred between systems, the checking requirements are lessened because the format of the information is strongly defined.</p>]]></paragraph>
<paragraph
    title="21.1.11.C.01."

    tags="Data Management,Technical,Data Transfers"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="4239"
><![CDATA[<p>When agencies export formatted textual data with no free text fields and all fields have a predefined set of permitted formats and data values, agencies MUST implement the following controls:</p>
<ul>
<li>protective marking checks;</li>
<li>data validation and format checks;</li>
<li>size limits;</li>
<li>keyword checks;</li>
<li>identify unexpected attachments or embedded objects;</li>
<li>log each event; and</li>
<li>monitoring to detect overuse/unusual usage patterns.</li>
</ul>]]></paragraph>
</block>
<block title="Export of other data"><paragraph
    title="21.1.12.R.01."

    tags="Data Management,Technical,Data Transfers"


><![CDATA[<p>Textual data that it is not highly formatted can be difficult to check in an automated manner. &nbsp;Agencies will need to implement measures to ensure that classified information is not accidentally being transferred to another system not accredited for that classification or transferred into the public domain.</p>]]></paragraph>
<paragraph
    title="21.1.12.C.01."

    tags="Data Management,Technical,Data Transfers"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="4245"
><![CDATA[<p>When agencies export data, other than highly formatted textual data, agencies MUST implement the following controls:</p>
<ul>
<li>protective marking checks;</li>
<li>data validation and format checks;</li>
<li>limitations on data types;</li>
<li>size limits;</li>
<li>keyword checks;</li>
<li>identify unexpected attachments or embedded objects;</li>
<li>log each event; and</li>
<li>monitoring to detect overuse/unusual usage patterns.</li>
</ul>]]></paragraph>
</block>
<block title="Preventing export of NZEO data to foreign systems"><paragraph
    title="21.1.13.R.01."

    tags="Data Management,Technical,Data Transfers"


><![CDATA[<p>In order to reduce the security risk of spilling data with an endorsement onto foreign systems, it is important that procedures are developed to detect NZEO marked data and to prevent it from crossing into foreign systems or being exposed to foreign nationals.</p>]]></paragraph>
<paragraph
    title="21.1.13.C.01."

    tags="Data Management,Technical,Data Transfers"


    classification="All Classifications"
    compliance="Must"
    cid="4249"
><![CDATA[<p>Agencies MUST:</p>
<ul>
<li>ensure that keyword searches are performed on all textual data;</li>
<li>ensure that any identified data is quarantined until reviewed and approved for release by a trusted source other than the originator; and</li>
<li>develop procedures to prevent NZEO information in both textual and non-textual formats from being exported.</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
<section title="21.2. Data Import and Export"><subsection title="Objective"><paragraph
    title="21.2.1."


><![CDATA[<p>Data is&nbsp;transferred through gateways in a controlled and accountable manner.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="21.2.2."


><![CDATA[<p>This section covers the specific requirements relating to the movement of data between systems via gateways. &nbsp;Fundamental requirements of data transfers between systems can be found in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16836">Section 20.1 – Data Transfers</a>. &nbsp;These fundamental requirements apply to gateways.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="User responsibilities"><paragraph
    title="21.2.3.R.01."

    tags="Data Management,Governance,Data Transfers"


><![CDATA[<p>When users transfer data to or from a system they need to be aware of the potential consequences of their actions. &nbsp;This could include data spills of sensitive or classified data onto systems not accredited to handle the data, or the unintended introduction of malicious code to a system. &nbsp; Accordingly, users need to be held accountable for all data transfers they make.</p>]]></paragraph>
<paragraph
    title="21.2.3.C.01."

    tags="Data Management,Governance,Data Transfers"


    classification="All Classifications"
    compliance="Must"
    cid="4264"
><![CDATA[<p>Users transferring data to and from a system MUST be held accountable for the data they transfer.</p>]]></paragraph>
</block>
<block title="Data Transfer authorisation"><paragraph
    title="21.2.4.R.01."

    tags="Data Management,Governance,Data Transfers"


><![CDATA[<p>Users can help prevent information security incidents by:</p><ul>
<li>checking protective markings to ensure that the destination system is appropriate for the data being transferred;</li>
<li>performing antivirus checks on data to be transferred to and from a system;</li>
<li>following the processes and procedures for the transfer of data.</li>
</ul>]]></paragraph>
<paragraph
    title="21.2.4.C.01."

    tags="Data Management,Governance,Data Transfers"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="4269"
><![CDATA[<p>All data transferred to a system of a lesser sensitivity or classification MUST be approved by a trusted source.</p>]]></paragraph>
</block>
<block title="Trusted sources"><paragraph
    title="21.2.5.R.01."

    tags="Data Management,Governance,Data Transfers"


><![CDATA[<p>Trusted sources are designated personnel who have the delegated authority to assess and approve the transfer or release of data or documents. Trusted sources may include security personnel within the agency such as the CISO and the ITSM.&nbsp;</p>]]></paragraph>
<paragraph
    title="21.2.5.C.01."

    tags="Data Management,Governance,Data Transfers"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="4277"
><![CDATA[<p>Trusted sources MUST be:</p><ul>
<li>a strictly limited list derived from business requirements and the result of a security risk assessment;</li>
<li>where necessary an appropriate security clearance is held; and</li>
<li>approved by the Accreditation Authority.</li>
</ul>]]></paragraph>
</block>
<block title="Import of data through gateways"><paragraph
    title="21.2.6.R.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


><![CDATA[<p>In order to ensure the continued functioning of systems it is important to constantly analyse data being imported. &nbsp;Converting data from one format into another can effectively destroy most malicious active content.</p>]]></paragraph>
<paragraph
    title="21.2.6.C.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="4280"
><![CDATA[<p>When agencies import data to a system through gateways, the data MUST be filtered by a product specifically designed for that purpose, including filtering malicious and active content.</p>]]></paragraph>
<paragraph
    title="21.2.6.C.02."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="4281"
><![CDATA[<p>When agencies import data to a system through gateways, full or partial audits of the event logs MUST be performed at least monthly.</p>]]></paragraph>
<paragraph
    title="21.2.6.C.03."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Confidential, Secret, Top Secret"
    compliance="Should"
    cid="4282"
><![CDATA[<p>Agencies SHOULD convert data being imported at gateways into an alternative format before entering the network.</p>]]></paragraph>
</block>
<block title="Export of data through gateways"><paragraph
    title="21.2.7.R.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


><![CDATA[<p>In order to ensure the continued integrity and confidentiality of data on an agency network, data MUST pass through a series of checks before it is exported onto systems of a lesser classification.</p>]]></paragraph>
<paragraph
    title="21.2.7.R.02."

    tags="Data Management,Technical,Data Transfers,Gateways"


><![CDATA[<p>Filtering content based on protective markings is an adequate method to protect the confidentiality of lesser classified material.</p>]]></paragraph>
<paragraph
    title="21.2.7.C.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="All Classifications"
    compliance="Should"
    cid="4286"
><![CDATA[<p>Agencies SHOULD restrict the export of data to a system of a lesser classification by filtering data using at least protective marking checks.</p>]]></paragraph>
</block>
<block title="Export of highly formatted textual data through gateways"><paragraph
    title="21.2.8.R.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


><![CDATA[<p>The security risks of releasing higher classified data are partially reduced when the data is restricted to highly formatted textual data. &nbsp;In such cases the data is less likely to contain hidden data and have classified content. &nbsp;Such data can be automatically scanned through a series of checks to detect classified content. &nbsp;Risk is further reduced when there is a gateway filter that blocks (rejects) the export of data classified above the classification of the network outside of the gateway, and logs are regularly reviewed to detect if there has been unusual usage or overuse.</p>]]></paragraph>
<paragraph
    title="21.2.8.C.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4289"
><![CDATA[<p>When the export of highly formatted textual data occurs through gateways agencies MUST implement:</p>
<ul>
<li>checks for protective markings;</li>
<li>data filtering performed by a product specifically designed for that purpose;</li>
<li>data range and data type checks; and</li>
<li>full or partial audits of the event logs performed at least monthly.</li>
</ul>]]></paragraph>
</block>
<block title="Export of other data through gateways"><paragraph
    title="21.2.9.R.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


><![CDATA[<p>Textual data which is not highly formatted can contain hidden data as well as having a higher classification due to the aggregated content. &nbsp;Risk is somewhat reduced by running additional automated checks on non-formatted data being exported, in addition to those checks for highly formatted textual data. &nbsp;Where a classification cannot be automatically determined, a human trusted source should make that determination.</p>]]></paragraph>
<paragraph
    title="21.2.9.C.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="4292"
><![CDATA[<p>When agencies export data, other than highly formatted textual data, through gateways, agencies MUST implement data filtering performed by a product specifically designed for that purpose.</p>]]></paragraph>
<paragraph
    title="21.2.9.C.02."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4293"
><![CDATA[<p>When agencies do not perform audits of the complete data transfer logs at least monthly they MUST perform randomly timed audits of random subsets of the data transfer logs on a weekly basis.</p>]]></paragraph>
<paragraph
    title="21.2.9.C.03."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Top Secret, Secret, Confidential"
    compliance="Should"
    cid="4294"
><![CDATA[<p>Where the classification cannot be determined automatically, a human trusted source SHOULD assess the classification of the data.</p>]]></paragraph>
<paragraph
    title="21.2.9.C.04."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Top Secret, Confidential, Secret"
    compliance="Should"
    cid="4295"
><![CDATA[<p>When the export of other data occurs through gateways agencies SHOULD perform audits of the complete data transfer logs at least monthly.</p>]]></paragraph>
</block>
<block title="Preventing export of NZEO data to foreign systems"><paragraph
    title="21.2.10.R.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


><![CDATA[<p>NZEO networks are particularly sensitive and further security measures need to be put in place when connecting them to other networks.</p>]]></paragraph>
<paragraph
    title="21.2.10.C.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="All Classifications"
    compliance="Must"
    cid="4301"
><![CDATA[<p>To prevent the export of NZEO data to foreign systems, agencies MUST implement NZEO data filtering performed by a product specifically designed or configured for that purpose.</p>]]></paragraph>
<paragraph
    title="21.2.10.C.02."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="All Classifications"
    compliance="Must"
    cid="4303"
><![CDATA[<p>Agencies MUST undertake checks of protective markings and keywords before permitting data export.</p>]]></paragraph>
</block>
<block title="Requirement to sign exported data"><paragraph
    title="21.2.11.R.01."

    tags="Data Management,Technical,Data Transfers,Assurance"


><![CDATA[<p>Digitally signing data being exported, demonstrates authenticity and improves assurance that the data has not been altered in transit.</p>]]></paragraph>
<paragraph
    title="21.2.11.C.01."

    tags="Data Management,Technical,Data Transfers,Assurance"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="4308"
><![CDATA[<p>A trusted source MUST sign the data to be exported if the data is to be communicated over a network to which untrusted personnel or systems have access.</p>]]></paragraph>
<paragraph
    title="21.2.11.C.02."

    tags="Data Management,Technical,Data Transfers,Assurance"


    classification="Secret, Confidential"
    compliance="Must"
    cid="4309"
><![CDATA[<p>Agencies MUST ensure that the gateway verifies authority to release prior to the release of the data to be exported.</p>]]></paragraph>
<paragraph
    title="21.2.11.C.03."

    tags="Data Management,Technical,Data Transfers,Assurance"


    classification="Confidential, Top Secret, Secret"
    compliance="Should"
    cid="4310"
><![CDATA[<p>Agencies SHOULD use a product evaluated to at least an EAL4 assurance level for the purpose of data signing and signature confirmation.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="21.3. Content Filtering"><subsection title="Objective"><paragraph
    title="21.3.1."


><![CDATA[<p>The flow&nbsp;of data within gateways is examined and controls applied in accordance with the agency’s security policy. &nbsp;To prevent unauthorised or malicious content crossing security domain boundaries.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="21.3.2."


><![CDATA[<p>This section covers information relating to the use of content filters within bi-directional or one-way gateways in order to protect security domains.</p>]]></paragraph>
<paragraph
    title="21.3.3."


><![CDATA[<p>Content filters reduce the risk of unauthorised or malicious content crossing a security domain boundary.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Limiting transfers by file type"><paragraph
    title="21.3.4.R.01."

    tags="Data Management,Technical,Content Filtering"


><![CDATA[<p>The level of security risk will be affected by the degree of assurance agencies can place in the ability of their data transfer filters to:</p><ul>
<li>confirm the file type by examination of the contents of the file;</li>
<li>confirm the absence of malicious content;</li>
<li>confirm the absence of inappropriate content;</li>
<li>confirm the classification of the content; and</li>
<li>handle compressed files appropriately.</li>
</ul><p>Reducing the number of allowed file types reduces the number of potential vulnerabilities available for an attacker to exploit.</p>]]></paragraph>
<paragraph
    title="21.3.4.C.01."

    tags="Data Management,Technical,Content Filtering"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="4321"
><![CDATA[<p>Agencies MUST strictly define and limit the types of files that can be transferred based on business requirements and the results of a security risk assessment.</p>]]></paragraph>
<paragraph
    title="21.3.4.C.02."

    tags="Data Management,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="4322"
><![CDATA[<p>Agencies SHOULD strictly define and limit the types of files that can be transferred based on business requirements and the results of a security risk assessment.</p>]]></paragraph>
</block>
<block title="Blocking active content"><paragraph
    title="21.3.5.R.01."

    tags="Data Management,Technical,Content Filtering"


><![CDATA[<p>Many files are executable and are potentially harmful if activated by a system user. &nbsp;Many static file type specifications allow active content to be embedded within the file, which increases the attack surface.</p>]]></paragraph>
<paragraph
    title="21.3.5.C.01."

    tags="Data Management,Technical,Content Filtering"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="4325"
><![CDATA[<p>Agencies MUST block all executables and active content from entering a security domain.</p>]]></paragraph>
<paragraph
    title="21.3.5.C.02."

    tags="Data Management,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="4326"
><![CDATA[<p>Agencies SHOULD block all executables and active content from being communicated though gateways.</p>]]></paragraph>
</block>
<block title="Blocking suspicious data"><paragraph
    title="21.3.6.R.01."

    tags="Data Management,Technical,Content Filtering"


><![CDATA[<p>The definition of suspicious content will depend on the system’s risk profile and what is considered normal traffic. &nbsp;The table below identifies some filtering techniques that can be used to identify suspicious data.</p><table class="table-main">
<tbody>
<tr>
<td>
<p>Technique</p>
</td>
<td>
<p>Purpose</p>
</td>
</tr>
<tr>
<td>
<p><strong>Antivirus scan</strong></p>
</td>
<td>
<p>Scans the data for viruses and other malicious code.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Data format check</strong></p>
</td>
<td>
<p>Inspects data to ensure that it conforms to expected/permitted format(s).</p>
</td>
</tr>
<tr>
<td>
<p><strong>Data range check</strong></p>
</td>
<td>
<p>Checks the data within each field to ensure that it falls within the expected/permitted range.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Data type check</strong></p>
</td>
<td>
<p>Inspects each file header to determine the file type.</p>
</td>
</tr>
<tr>
<td>
<p><strong>File extension check</strong></p>
</td>
<td>
<p>Checks file extensions to ensure that they are permitted.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Keyword search</strong></p>
</td>
<td>
<p>Searches data for keywords or ‘dirty words’ that could indicate the presence of classified or inappropriate material.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Metadata check</strong></p>
</td>
<td>
<p>Inspects files for metadata that should be removed prior to release.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Protective marking check</strong></p>
</td>
<td>
<p>Validates the protective marking of the data to ensure that it complies with the permitted classifications and endorsements.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Manual inspection</strong></p>
</td>
<td>
<p>The manual inspection of data for suspicious content that an automated system could miss, which is particularly important for the transfer of image files, multi-media or content-rich files.</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="21.3.6.C.01."

    tags="Data Management,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Must"
    cid="4329"
><![CDATA[<p>Agencies MUST block, quarantine or drop any data identified by a data filter as suspicious until reviewed and approved for transfer by a trusted source other than the originator.</p>]]></paragraph>
</block>
<block title="Content validation"><paragraph
    title="21.3.7.R.01."

    tags="Data Management,Technical,Content Filtering"


><![CDATA[<p>Content validation aims to ensure that the content received conforms to a defined, approved standard. Content validation can be an effective means of identifying malformed content, allowing agencies to block potentially malicious content. Content validation operates on an allow listing principle, blocking all content except for that which is explicitly permitted. Examples of content validation include:</p>
<ul>
<li>ensuring numeric fields only contain numeric numbers;</li>
<li>other fields operate with defined character sets;</li>
<li>ensuring content falls within acceptable length boundaries;</li>
<li>ensuring XML documents are compared to a strictly defined XML schema.</li>
</ul>]]></paragraph>
<paragraph
    title="21.3.7.C.01."

    tags="Data Management,Technical,Content Filtering"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="4332"
><![CDATA[<p>Agencies MUST perform validation on all data passing through a content filter, blocking content which fails the validation.</p>]]></paragraph>
<paragraph
    title="21.3.7.C.02."

    tags="Data Management,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="4333"
><![CDATA[<p>Agencies SHOULD perform validation on all data passing through a content filter, blocking content which fails the validation.</p>]]></paragraph>
</block>
<block title="Content conversion and transformation"><paragraph
    title="21.3.8.R.01."

    tags="Data Management,Technical,Content Filtering"


><![CDATA[<p>Content conversion, file conversion or file transformation can be an effective method to render potentially malicious content harmless by separating the presentation format from the data. By converting a file to another format, the exploit, active content and/or payload can often be removed or disrupted enough to be ineffective.<br>Examples of file conversion and content transformation to mitigate the threat of content exploitation include:</p>
<ul>
<li>converting a Microsoft Word document to a PDF file;</li>
<li>converting a Microsoft PowerPoint presentation to a series of JPEG images;</li>
<li>converting a Microsoft Excel spreadsheet to a Comma Separated Values (CSV) file; or</li>
<li>converting a PDF document to a plain text file.</li>
</ul>
<p>Some file types, such as XML, will not benefit from conversion. The conversion process should also be applied to any attachments or files contained within other files, for example, archive files or encoded files embedded in XML.</p>]]></paragraph>
<paragraph
    title="21.3.8.C.01."

    tags="Data Management,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="4336"
><![CDATA[<p>Agencies SHOULD perform content conversion, file conversion or both for all ingress or egress data transiting a security domain boundary.</p>]]></paragraph>
</block>
<block title="Content sanitisation"><paragraph
    title="21.3.9.R.01."

    tags="Data Management,Technical,Content Filtering"


><![CDATA[<p>Sanitisation is the process of attempting to make potentially malicious content safe to use by removing or altering active content while leaving the original content as intact as possible. Sanitisation is not as secure a method of content filtering as conversion, though many techniques may be combined. Extraneous application and protocol data, including metadata, should also be inspected and filtered where possible. Examples of sanitisation to mitigate the threat of content exploitation include:</p>
<ul>
<li>removal of document properties information in Microsoft Office documents;</li>
<li>removal or renaming of JavaScript sections from PDF files;</li>
<li>removal of metadata such as EXIF information from within JPEG files.</li>
</ul>]]></paragraph>
<paragraph
    title="21.3.9.C.01."

    tags="Data Management,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="4339"
><![CDATA[<p>Agencies SHOULD perform content and file sanitisation on suitable file types if content conversion or file conversion is not appropriate for data transiting a security domain boundary.</p>]]></paragraph>
</block>
<block title="Antivirus scans"><paragraph
    title="21.3.10.R.01."

    tags="Data Management,Technical,Content Filtering"


><![CDATA[<p>Antivirus scanning is used to prevent, detect and remove malicious software that includes computer viruses, worms, Trojans, spyware and adware.</p>]]></paragraph>
<paragraph
    title="21.3.10.C.01."

    tags="Data Management,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="4348"
><![CDATA[<p>Agencies SHOULD perform antivirus scans on all content using up-to-date engines and signatures, using multiple different scanning engines.</p>]]></paragraph>
</block>
<block title="Archive and container files"><paragraph
    title="21.3.11.R.01."

    tags="Data Management,Technical,Content Filtering"


><![CDATA[<p>Archive and container files can be used to bypass content filtering processes if the content filter does not handle the file type and embedded content correctly. &nbsp;The content filtering process should recognise archived and container files, ensuring the embedded files they contain are subject to the same content filtering measures as un-archived files.</p>]]></paragraph>
<paragraph
    title="21.3.11.R.02."

    tags="Data Management,Technical,Content Filtering"


><![CDATA[<p>Archive files can be constructed in a manner which can pose a denial-of-service risk due to processor, memory or disk space exhaustion. &nbsp;To limit the risk of such an attack, content filters can specify resource constraints/quotas while extracting these files. &nbsp;If these constraints are exceeded the inspection is terminated, the content blocked and a security administrator alerted.</p>]]></paragraph>
<paragraph
    title="21.3.11.C.01."

    tags="Data Management,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="4401"
><![CDATA[<p>Agencies SHOULD extract the contents from archive and container files and subject the extracted files to content filter tests.</p>]]></paragraph>
<paragraph
    title="21.3.11.C.02."

    tags="Data Management,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="4402"
><![CDATA[<p>Agencies SHOULD perform controlled inspection of archive and container files to ensure that content filter performance and availability is not adversely affected.</p>]]></paragraph>
<paragraph
    title="21.3.11.C.03."

    tags="Data Management,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="4403"
><![CDATA[<p>Agencies SHOULD block files that cannot be inspected and generate an alert or notification.</p>]]></paragraph>
</block>
<block title="Allow listing permitted content"><paragraph
    title="21.3.12.R.01."

    tags="Data Management,Technical,Content Filtering"


><![CDATA[<p>Creating and enforcing an allow list of allowed content/files is a strong content filtering method. &nbsp;Allowing content that satisfies a business requirement only can reduce the attack surface of the system. &nbsp;As a simple example, an email content filter might allow only Microsoft Office documents and PDF files.</p>]]></paragraph>
<paragraph
    title="21.3.12.C.01."

    tags="Data Management,Technical,Content Filtering"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4406"
><![CDATA[<p>Agencies MUST create and enforce an allow list of permitted content types based on business requirements and the results of a security risk assessment.</p>]]></paragraph>
<paragraph
    title="21.3.12.C.02."

    tags="Data Management,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="4407"
><![CDATA[<p>Agencies SHOULD create and enforce an allow list of permitted content types based on business requirements and the results of a security risk assessment.</p>]]></paragraph>
</block>
<block title="Data integrity"><paragraph
    title="21.3.13.R.01."

    tags="Data Management,Technical,Content Filtering"


><![CDATA[<p>Ensuring the authenticity and integrity of content reaching a security domain is a key component in ensuring its trustworthiness. It is also essential that content that has been authorised for release from a security domain is not modified or contains other data not authorised for release, for example by the addition or substitution of sensitive information.</p>]]></paragraph>
<paragraph
    title="21.3.13.R.02."

    tags="Data Management,Technical,Content Filtering"


><![CDATA[<p>If content passing through a filter contains a form of integrity protection, such as a digital signature, the content filter should verify the content’s integrity before allowing it through. If the content fails these integrity checks it may have been spoofed or tampered with and should be dropped or quarantined for further inspection.</p>
<p>Examples of data integrity checks include:</p>
<ul>
<li>an email server or content filter verifying an email protected by DKIM;</li>
<li>a web service verifying the XML digital signature contained within a SOAP request;</li>
<li>validating a file against a separately supplied hash;</li>
<li>checking that data to be exported from the security domain has been digitally signed by the release authority.</li>
</ul>]]></paragraph>
<paragraph
    title="21.3.13.C.01."

    tags="Data Management,Technical,Content Filtering"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="4411"
><![CDATA[<p>If data is signed, agencies MUST ensure that the signature is validated before the data is exported.</p>]]></paragraph>
<paragraph
    title="21.3.13.C.02."

    tags="Data Management,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="4412"
><![CDATA[<p>Agencies SHOULD verify the integrity of content where applicable, and block the content if verification fails.</p>]]></paragraph>
</block>
<block title="Encrypted data"><paragraph
    title="21.3.14.R.01."

    tags="Data Management,Encryption,Technical,Content Filtering"


><![CDATA[<p>Encryption can be used to bypass content filtering if encrypted content cannot be subject to the same checks performed on unencrypted content. Agencies will need to consider the need to decrypt content, depending on:</p>
<ul>
<li>the security domain they are communicating with;</li>
<li>whether the need-to-know principle is to be enforced;</li>
<li>end-to-end encryption requirements; or</li>
<li>any privacy and policy requirements.</li>
</ul>]]></paragraph>
<paragraph
    title="21.3.14.R.02."

    tags="Data Management,Encryption,Technical,Content Filtering"


><![CDATA[<p>Choosing not to decrypt content poses a risk of encrypted malicious software communications and data moving between security domains. &nbsp;Additionally, encryption could mask the movement of information at a higher classification being allowed to pass to a security domain of lower classification, which could result in a data spill.</p>]]></paragraph>
<paragraph
    title="21.3.14.R.03."

    tags="Data Management,Encryption,Technical,Content Filtering"


><![CDATA[<p>Some systems allow encrypted content through external/boundary/perimeter controls to be decrypted at a later stage, in which case the content should be subject to all applicable content filtering controls after it has been decrypted.</p>]]></paragraph>
<paragraph
    title="21.3.14.C.01."

    tags="Data Management,Encryption,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="4417"
><![CDATA[<p>Agencies SHOULD decrypt and inspect all encrypted content, traffic and data to allow content filtering.</p>]]></paragraph>
</block>
<block title="Monitoring data import and export"><paragraph
    title="21.3.15.R.01."

    tags="Data Management,Technical,Content Filtering"


><![CDATA[<p>To ensure the continued confidentiality and integrity of systems and data, import and export processes should be monitored and audited.</p>]]></paragraph>
<paragraph
    title="21.3.15.C.01."

    tags="Data Management,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Must"
    cid="4420"
><![CDATA[<p>Agencies MUST use protective marking checks to restrict the export of data from each security domain, including through a gateway.</p>]]></paragraph>
<paragraph
    title="21.3.15.C.02."

    tags="Data Management,Technical,Content Filtering"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="4421"
><![CDATA[<p>When importing data to each security domain, including through a gateway, agencies MUST audit the complete data transfer logs at least monthly.</p>]]></paragraph>
</block>
<block title="Exception Handling"><paragraph
    title="21.3.16.R.01."

    tags="Data Management,Technical,Content Filtering"


><![CDATA[<p>Legitimate reasons may exist for the transfer of data that may be identified as suspicious according to the criteria established for content filtering. &nbsp;It is important to have an accountable and auditable mechanism in place to deal with such exceptions.</p>]]></paragraph>
<paragraph
    title="21.3.16.C.01."

    tags="Data Management,Technical,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="4424"
><![CDATA[<p>Agencies SHOULD create an exception handling process to deal with blocked or quarantined file types that may have a valid requirement to be transferred.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="21.4. Databases"><subsection title="Objective"><paragraph
    title="21.4.1."


><![CDATA[<p>Database content is protected from personnel without a need-to-know.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="21.4.2."


><![CDATA[<p>This section covers information relating to databases and interfaces to databases such as search engines.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Data labelling"><paragraph
    title="21.4.3.R.01."

    tags="Data Management,Technical"


><![CDATA[<p>Protective markings can be applied to records, tables or to the database as a whole, depending on structure and use. &nbsp;Query results will often need a protective marking to reflect the aggregate of the information retrieved.</p>]]></paragraph>
<paragraph
    title="21.4.3.C.01."

    tags="Data Management,Technical"


    classification="Top Secret"
    compliance="Must"
    cid="4434"
><![CDATA[<p>Agencies MUST ensure that all classified information stored within a database is associated with an appropriate protective marking if the information:</p><ul>
<li>could be exported to a different system; or</li>
<li>contains differing classifications or different handling requirements.</li>
</ul>]]></paragraph>
<paragraph
    title="21.4.3.C.02."

    tags="Data Management,Technical"


    classification="Top Secret"
    compliance="Must"
    cid="4435"
><![CDATA[<p>Agencies MUST ensure that protective markings are applied with a level of granularity sufficient to clearly define the handling requirements for any classified information retrieved or exported from a database.</p>]]></paragraph>
<paragraph
    title="21.4.3.C.03."

    tags="Data Management,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="4436"
><![CDATA[<p>Agencies SHOULD ensure that all classified information stored within a database is associated with an appropriate protective marking if the information:</p><ul>
<li>could be exported to a different system; or</li>
<li>contains differing classifications or different handling requirements.</li>
</ul>]]></paragraph>
<paragraph
    title="21.4.3.C.04."

    tags="Data Management,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="4437"
><![CDATA[<p>Agencies SHOULD ensure that protective markings are applied with a level of granularity sufficient to clearly define the handling requirements for any classified information retrieved or exported from a database.</p>]]></paragraph>
</block>
<block title="Database files"><paragraph
    title="21.4.4.R.01."

    tags="Data Management,Technical"


><![CDATA[<p>Even though a database may provide access controls to stored data, the database files themselves MUST also be protected.</p>]]></paragraph>
<paragraph
    title="21.4.4.C.01."

    tags="Data Management,Technical"


    classification="Top Secret"
    compliance="Must"
    cid="4440"
><![CDATA[<p>Agencies MUST protect database files from access that bypasses the database’s normal access controls.</p>]]></paragraph>
<paragraph
    title="21.4.4.C.02."

    tags="Data Management,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="4441"
><![CDATA[<p>Agencies SHOULD protect database files from access that bypass normal access controls.</p>]]></paragraph>
</block>
<block title="Accountability"><paragraph
    title="21.4.5.R.01."

    tags="Data Management,Governance"


><![CDATA[<p>If system users’ interactions with databases are not logged and audited, agencies will not be able to appropriately investigate any misuse or compromise of database content.</p>]]></paragraph>
<paragraph
    title="21.4.5.C.01."

    tags="Data Management,Governance"


    classification="Top Secret"
    compliance="Must"
    cid="4444"
><![CDATA[<p>Agencies MUST enable logging and auditing of system users’ actions.</p>]]></paragraph>
<paragraph
    title="21.4.5.C.02."

    tags="Data Management,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="4445"
><![CDATA[<p>Agencies SHOULD ensure that databases provide functionality to allow for auditing of system users’ actions.</p>]]></paragraph>
</block>
<block title="Search engines"><paragraph
    title="21.4.6.R.01."

    tags="Data Management,Technical,Access Control,System Access"


><![CDATA[<p>Even if a search engine restricts viewing of classified information that a system user does not have sufficient security clearances to access, the associated metadata can contain information above the security clearances of the system user. &nbsp;In such cases, restricting access to, or sanitising, this metadata effectively controls the possible release of information the system user is not cleared to view.</p>]]></paragraph>
<paragraph
    title="21.4.6.C.01."

    tags="Data Management,Technical,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="4448"
><![CDATA[<p>If results from database queries cannot be appropriately filtered, agencies MUST ensure that all query results are appropriately sanitised to meet the minimum security clearances of system users.</p>]]></paragraph>
<paragraph
    title="21.4.6.C.02."

    tags="Data Management,Technical,System Access"


    classification="All Classifications"
    compliance="Should"
    cid="4449"
><![CDATA[<p>Agencies SHOULD ensure that system users who do not have sufficient security clearances to view database contents cannot see or interrogate associated metadata in a list of results from a search engine query.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="22. Distributed Working"><section title="22.1. Agency-owned Mobile Devices"><subsection title="Objective"><paragraph
    title="22.1.1."


><![CDATA[<p>Information&nbsp;on agency-owned mobile devices is protected from unauthorised disclosure.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="22.1.2."


><![CDATA[<p>This section covers information relating to the use of agency-owned mobile devices including, but not restricted to, mobile phones, smartphones, portable electronic devices, personal digital assistants, laptops, netbooks, tablet computers, and other portable Internet connected devices.</p>]]></paragraph>
<paragraph
    title="22.1.3."


><![CDATA[<p>It is important to note that product security, selection, maintenance, sanitisation and disposal requirements in <a title="Product Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 - Product Security</a> also apply to agency-owned mobile devices.</p>]]></paragraph>
</block>
<block title="Trusted Operating Environments"><paragraph
    title="22.1.4."


><![CDATA[<p>A Trusted Operating Environment (TOE) provides assurance that every reasonable effort has been made to secure the operating system of a mobile device such that it presents a managed risk to an agency’s information and systems. &nbsp;Any residual risks are explicitly accepted by the agency.</p>]]></paragraph>
<paragraph
    title="22.1.5."


><![CDATA[<p>Special care is necessary when dealing with All-of-Government systems or systems that affect several agencies. Security measures that can be implemented to assist in the development of a TOE include:</p><ul>
<li>strong usage policies are in place;</li>
<li>unnecessary hardware, software and operating system components are removed;</li>
<li>unused or undesired functionality in software and operating systems is removed or disabled;</li>
<li>anti-malware and other security software is installed and regularly updated;</li>
<li>downloads of software, data or documents are limited or not permitted;</li>
<li>installation of unapproved applications is not permitted;</li>
<li>software-based firewalls limiting inbound and outbound network connections are installed;</li>
<li>patching of installed the operating system and other software is current;</li>
<li>each connection is authenticated (multi-factor) before permitting access to an agency network;</li>
<li>both the user and mobile device are authenticated during the authentication process;</li>
<li>mobile device configurations may be validated before a connection is permitted;</li>
<li>privileged access from the mobile device to the agency network is not allowed;</li>
<li>access to some data may not be permitted; and</li>
<li>agency control of the mobile device may supersede any convenience aspects.</li>
</ul>]]></paragraph>
</block>
<block title="Treating workstations as mobile devices"><paragraph
    title="22.1.6."


><![CDATA[<p>When an agency issues a workstation for home-based work instead of a mobile device the requirements in this section apply equally to the issued workstation.</p>]]></paragraph>
</block>
<block title="Devices with multiple operating states"><paragraph
    title="22.1.7."


><![CDATA[<p>Some mobile devices may have functionality to allow them to operate in either an unclassified state or a classified state. &nbsp;In such cases the mobile devices will need to be handled according to the state that it is being operated in at the time. &nbsp;For example, some devices can start-up in an unclassified mode or start-up in a cryptographically protected mode.</p>]]></paragraph>
</block>
<block title="Bluetooth and Infra-Red Devices"><paragraph
    title="22.1.8."


><![CDATA[<p>Bluetooth and Infra-Red devices, such as keyboards, headsets and mice are subject to an additional set of risks. &nbsp;Refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13958">Chapter 11 – Communication Systems and Devices</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="22.1.9."


><![CDATA[<p class="NormS10C1b">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 109.722%;">
<tbody>
<tr>
<td style="width: 17.4271%;"><strong>Reference</strong></td>
<td style="width: 19.3283%;"><strong>Title</strong></td>
<td style="width: 63.2129%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 17.4271%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 19.3283%;">
<p>GOV2, GOV4, GOV6, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</p>
</td>
<td style="width: 63.2129%;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a> &nbsp;&nbsp;</p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a><br><br></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Mobile devices usage policy"><paragraph
    title="22.1.10.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>As mobile devices routinely leave the office environment and the physical protection it affords it is important that policies are developed to ensure that they are protected in an appropriate manner when used outside of controlled agency facilities.</p>]]></paragraph>
<paragraph
    title="22.1.10.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must"
    cid="4471"
><![CDATA[<p>Agencies MUST develop a policy governing the use of mobile devices.</p>]]></paragraph>
<paragraph
    title="22.1.10.C.02."

    tags="Governance,Mobile Devices"


    classification="Secret, Top Secret, Confidential"
    compliance="Must Not"
    cid="4472"
><![CDATA[<p>Agencies MUST NOT allow mobile devices to process or store TOP SECRET information unless explicitly approved by GCSB to do so.</p>]]></paragraph>
<paragraph
    title="22.1.10.C.03."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4473"
><![CDATA[<p>Agencies SHOULD implement a Mobile Device Management (MDM) solution.</p>]]></paragraph>
</block>
<block title="Personnel awareness"><paragraph
    title="22.1.11.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>Mobile devices can have both a data and voice component capable of processing or communicating classified information. In such cases, personnel will need to be aware of the approved classification level for each function.</p>
<p>This includes Paging Services, Multi-Media Message Service (MMS) and Short Message Service (SMS) which are NOT appropriate for sensitive or classified information. Paging and message services do not appropriately encrypt information and cannot be relied upon for the communication of classified information.</p>]]></paragraph>
<paragraph
    title="22.1.11.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must"
    cid="4476"
><![CDATA[<p>Agencies MUST advise personnel of the maximum permitted classifications for data and voice communications when using mobile devices.</p>]]></paragraph>
<paragraph
    title="22.1.11.C.02."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Should Not"
    cid="4477"
><![CDATA[<p>Agencies SHOULD NOT use Paging Services, SMS or MMS for sensitive or classified communications.</p>]]></paragraph>
</block>
<block title="Non-agency owned and controlled mobile devices"><paragraph
    title="22.1.12.R.01."

    tags="Governance,Mobile Devices,BYOD"


><![CDATA[<p>Agencies need to retain control of any non-agency device that contains agency or government information. &nbsp;Non-agency devices are discussed in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17126">Section 21.4 – BYOD</a>.</p>]]></paragraph>
<paragraph
    title="22.1.12.C.01."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4480"
><![CDATA[<p>Agencies MUST apply the full set of BYOD controls for devices NOT directly owned and controlled by the agency. &nbsp;These controls are detailed in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17126">Section 21.4 – BYOD</a>.</p>]]></paragraph>
</block>
<block title="Agency owned mobile device storage encryption"><paragraph
    title="22.1.13.R.01."

    tags="Encryption,Technical,Mobile Devices"


><![CDATA[<p>Encrypting the internal storage and removable media of agency owned mobile devices will reduce the risk of data loss associated with a lost or stolen device. While the use of encryption may not be suitable to treat the device as an unclassified asset it will still present a significant challenge to a malicious actor looking to gain easy access to information stored on the device. To ensure that the benefits of encryption on mobile devices are maintained, users must not store passphrases, passwords, PINS or other access codes for the encryption software on, or with, the device.</p>]]></paragraph>
<paragraph
    title="22.1.13.R.02."

    tags="Encryption,Technical,Mobile Devices"


><![CDATA[<p>Information on the use of encryption to reduce storage and physical transfer requirements is detailed in&nbsp;<a href="http://nzism.gcsb.govt.nz/ism-document#Section-15746">Section 17.1 – Cryptographic Fundamentals</a>&nbsp;and&nbsp;<a href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">17.2 – Approved Cryptographic Algorithms</a>.</p>]]></paragraph>
<paragraph
    title="22.1.13.R.03."

    tags="Encryption,Technical,Mobile Devices"


><![CDATA[<p>Refer to the&nbsp;<a title="PSR - Mobile and Remote working" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/managing-specific-scenarios/mobile-and-remote-working/" target="_blank">PSR - Mobile and Remote working</a></p><p>Refer to the&nbsp;<a title="Handling requirements for protectively marked information and equipment" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/classification-system-and-handling-requirements/handling-requirements/" target="_blank">PSR&nbsp;- Handling Requirements for protectively marked information and equipment</a></p>]]></paragraph>
<paragraph
    title="22.1.13.C.01."

    tags="Encryption,Technical,Mobile Devices"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="4483"
><![CDATA[<p>Agencies unable to lower the storage and physical transfer requirements of a mobile device to an unclassified level through the use of encryption MUST physically store or transfer the device as a classified asset in accordance with the relevant handling instructions.</p>]]></paragraph>
<paragraph
    title="22.1.13.C.02."

    tags="Encryption,Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Must Not"
    cid="4484"
><![CDATA[<p>Users MUST NOT store passwords, passphrases, PINs or other access codes for encryption on or with the mobile device on which data will be encrypted when the device is issued for normal operations.</p>]]></paragraph>
<paragraph
    title="22.1.13.C.03."

    tags="Encryption,Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4485"
><![CDATA[<p>Agencies unable to lower the storage and physical transfer requirements of a mobile device to an unclassified level through the use of encryption SHOULD physically store or transfer the device as a classified asset in accordance with the relevant handling instructions.</p>]]></paragraph>
<paragraph
    title="22.1.13.C.04."

    tags="Approved Cryptographic Algorithms,Encryption,Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4486"
><![CDATA[<p>Agencies SHOULD encrypt classified information on all mobile devices using an Approved Cryptographic Algorithm.</p>]]></paragraph>
<paragraph
    title="22.1.13.C.05."

    tags="Encryption,Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4487"
><![CDATA[<p>Pool or shared devices SHOULD be reissued with unique passwords, passphrases, PINs or other access codes for each separate issue or deployment.</p>]]></paragraph>
</block>
<block title="Mobile device communications encryption"><paragraph
    title="22.1.14.R.01."

    tags="Encryption,Technical,Mobile Devices"


><![CDATA[<p>The above approach cannot be used for communicating classified information over public infrastructure, the internet or non-agency controlled networks. &nbsp;If appropriate encryption is not available the mobile device will not be approved for communicating classified information.</p>]]></paragraph>
<paragraph
    title="22.1.14.R.02."

    tags="Encryption,Technical,Mobile Devices"


><![CDATA[<p>Note: This applies to information and systems classified as RESTRICTED/SENSITIVE and any higher classification.</p>]]></paragraph>
<paragraph
    title="22.1.14.R.03."

    tags="Encryption,Technical,Mobile Devices"


><![CDATA[<p>Encryption does not change the classification level of the information or system itself but allows reduced handling requirements to be applied.</p>]]></paragraph>
<paragraph
    title="22.1.14.C.01."

    tags="Encryption,Technical,Mobile Devices"


    classification="Secret, Confidential, Top Secret, Restricted/Sensitive"
    compliance="Must"
    cid="4492"
><![CDATA[<p>Agencies MUST use encryption on mobile devices communicating over public infrastructure, the Internet or non-agency controlled networks.</p>]]></paragraph>
<paragraph
    title="22.1.14.C.02."

    tags="Encryption,Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4493"
><![CDATA[<p>Agencies SHOULD use encryption for Official Information or any classified information on mobile devices communicating over public infrastructure, the Internet or non-agency controlled networks.</p>]]></paragraph>
</block>
<block title="Mobile device privacy filters"><paragraph
    title="22.1.15.R.01."

    tags="Technical,Mobile Devices"


><![CDATA[<p>Privacy filters can be applied to the screens of mobile devices to prevent onlookers from reading the contents off the screen of the device. &nbsp;This assists in mitigating a shoulder surfing or other oversight attack or compromise.</p>]]></paragraph>
<paragraph
    title="22.1.15.C.01."

    tags="Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4496"
><![CDATA[<p>Agencies SHOULD apply privacy filters to the screens of mobile devices.</p>]]></paragraph>
</block>
<block title="Disabling Bluetooth functionality"><paragraph
    title="22.1.16.R.01."

    tags="Bluetooth,Technical,Mobile Devices"


><![CDATA[<p>As Bluetooth provides little security for the information that is passed between devices and a number of exploits have been publicised, it SHOULD NOT be used on mobile devices. Refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13958">Chapter 11 – Communications Systems and Devices</a>.</p>]]></paragraph>
<paragraph
    title="22.1.16.C.01."

    tags="Bluetooth,Technical,Mobile Devices"


    classification="Secret, Top Secret, Confidential"
    compliance="Must Not"
    cid="4499"
><![CDATA[<p>Agencies MUST NOT enable Bluetooth functionality on mobile devices.</p>]]></paragraph>
<paragraph
    title="22.1.16.C.02."

    tags="Bluetooth,Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should Not"
    cid="4500"
><![CDATA[<p>Agencies SHOULD NOT enable Bluetooth functionality on mobile devices.</p>]]></paragraph>
</block>
<block title="Configuration control"><paragraph
    title="22.1.17.R.01."

    tags="Technical,Mobile Devices"


><![CDATA[<p>Poorly controlled devices are more vulnerable to compromise and provide an attacker with a potential access point into agency systems. &nbsp;Although agencies may initially provide a secure device, the state of security may degrade over time. &nbsp;The agency will need to revaluate the security of devices regularly to ensure their integrity.</p>]]></paragraph>
<paragraph
    title="22.1.17.C.01."

    tags="Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Must Not"
    cid="4503"
><![CDATA[<p>Agency personnel MUST NOT disable security functions or security configurations on a mobile device once provisioned.</p>]]></paragraph>
<paragraph
    title="22.1.17.C.02."

    tags="Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4504"
><![CDATA[<p>Agencies SHOULD control the configuration of mobile devices in the same manner as devices in the agency’s office environment.</p>]]></paragraph>
<paragraph
    title="22.1.17.C.03."

    tags="Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4505"
><![CDATA[<p>Agencies SHOULD prevent personnel from installing unauthorised applications on a mobile device once provisioned.</p>]]></paragraph>
</block>
<block title="Maintaining mobile device security"><paragraph
    title="22.1.18.R.01."

    tags="Technical,Mobile Devices"


><![CDATA[<p>As mobile devices are not continually connected to ICT systems within an agency it is important that they are routinely returned to the agency so that patches can be applied and they can be tested to ensure that they are still secure.</p>
<p>Alternatively a mobile device management solution may implement policy checks and updates on connection to agency systems.</p>]]></paragraph>
<paragraph
    title="22.1.18.C.01."

    tags="Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4508"
><![CDATA[<p>Agencies SHOULD ensure that mobile devices have security updates applied on a regular basis and are tested to ensure that the mobile devices are still secure.</p>]]></paragraph>
<paragraph
    title="22.1.18.C.02."

    tags="Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4509"
><![CDATA[<p>Agencies SHOULD conduct policy checks as mobile devices connect to agency systems.</p>]]></paragraph>
</block>
<block title="Connecting mobile devices to the Internet"><paragraph
    title="22.1.19.R.01."

    tags="Technical,Mobile Devices"


><![CDATA[<p>During the period that a device is connected to the Internet, without a VPN connection, it is exposed to attacks. &nbsp;This period needs to be minimised to reduce the security risks. &nbsp;Minimising this period includes ensuring that system users do not connect directly to the Internet to access the Web between VPN sessions.</p>]]></paragraph>
<paragraph
    title="22.1.19.R.02."

    tags="Technical,Mobile Devices,Split tunnelling"


><![CDATA[<p>A split tunnel VPN can allow access to an agency’s systems from another network, including unsecure networks such as the Internet. &nbsp;If split tunnelling is enabled there is an increased security risk that the VPN connection is susceptible to attack from such networks.</p>]]></paragraph>
<paragraph
    title="22.1.19.C.01."

    tags="Technical,Mobile Devices,Split tunnelling"


    classification="All Classifications"
    compliance="Must"
    cid="4513"
><![CDATA[<p>Agencies MUST disable split tunnelling when using a VPN connection from a mobile device to connect to an agency network.</p>]]></paragraph>
<paragraph
    title="22.1.19.C.02."

    tags="Technical,Mobile Devices"


    classification="Secret, Confidential, Top Secret"
    compliance="Should Not"
    cid="4514"
><![CDATA[<p>Agencies SHOULD NOT allow mobile devices to connect to the Internet except when temporarily connecting to facilitate the establishment of a VPN connection to an agency network.</p>]]></paragraph>
</block>
<block title="Emergency destruction"><paragraph
    title="22.1.20.R.01."

    tags="Technical,Mobile Devices,Emergency Destruction,Emergency Procedures"


><![CDATA[<p>Where a mobile device carries classified information, or there is an increased risk of loss or compromise of the device, agencies will need to develop emergency destruction procedures. &nbsp;Such procedures should focus on the destruction of information on the mobile device and not necessarily the device itself. &nbsp;Many mobile devices used for classified information achieve this through the use of a cryptographic key zeroise or sanitisation function.</p>]]></paragraph>
<paragraph
    title="22.1.20.R.02."

    tags="Governance,Mobile Devices,Emergency Destruction,Emergency Procedures"


><![CDATA[<p>Staff will need to understand the rationale and be familiar with emergency destruction procedures, especially where there is a higher probability of loss, theft or compromise.</p>]]></paragraph>
<paragraph
    title="22.1.20.C.01."

    tags="Governance,Mobile Devices,Emergency Destruction,Emergency Procedures"


    classification="All Classifications"
    compliance="Must"
    cid="4519"
><![CDATA[<p>Agencies MUST develop an emergency destruction plan for mobile devices.</p>]]></paragraph>
<paragraph
    title="22.1.20.C.02."

    tags="Technical,Mobile Devices,Emergency Destruction,Emergency Procedures"


    classification="All Classifications"
    compliance="Must"
    cid="4520"
><![CDATA[<p>If a cryptographic zeroise or sanitise function is provided for cryptographic keys on a mobile device it MUST be used as part of the emergency destruction procedures.</p>]]></paragraph>
<paragraph
    title="22.1.20.C.03."

    tags="Governance,Mobile Devices,Emergency Destruction,Emergency Procedures"


    classification="All Classifications"
    compliance="Should"
    cid="4521"
><![CDATA[<p>Agencies SHOULD ensure personnel are trained in emergency destruction procedures and are familiar with the emergency destruction plan.</p>]]></paragraph>
</block>
<block title="Labelling"><paragraph
    title="22.1.21.R.01."

    tags="Governance,Mobile Telephony"


><![CDATA[<p>Agencies may wish to affix an additional label to mobile devices asking finders of lost devices to hand it in to any New Zealand police station, or if overseas, a New Zealand embassy, consulate or high commission.</p>]]></paragraph>
<paragraph
    title="22.1.21.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4524"
><![CDATA[<p>Agencies SHOULD use soft labelling for mobile devices when appropriate to reduce their attractiveness value.</p>]]></paragraph>
</block>
<block title="Unauthorised use of mobile devices"><paragraph
    title="22.1.22.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>Where mobile devices are issued to personnel for business purposes their use for private purposes should be governed by agency policy and agreed by the employee or contractor to whom the device is issued.</p>]]></paragraph>
<paragraph
    title="22.1.22.R.02."

    tags="Governance,Mobile Devices,Risk Management"


><![CDATA[<p>Agencies must recognise the risks and costs associated with personal use of an agency device.</p>]]></paragraph>
<paragraph
    title="22.1.22.C.01."

    tags="Governance,Mobile Devices,Risk Management"


    classification="All Classifications"
    compliance="Should"
    cid="4530"
><![CDATA[<p>Agencies SHOULD develop a policy to manage the non-business or personal use of an agency owned device.</p>]]></paragraph>
<paragraph
    title="22.1.22.C.02."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Should Not"
    cid="4531"
><![CDATA[<p>Mobile devices SHOULD NOT be used other than by personnel specifically authorised by the agency.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="22.2. Working Outside the Office"><subsection title="Objective"><paragraph
    title="22.2.1."


><![CDATA[<p>Information&nbsp;on mobile devices is not accessed from public or insecure locations.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="22.2.2."


><![CDATA[<p>This section covers information on accessing information using agency-owned mobile devices from unsecured locations outside the office and home environments. &nbsp;This section does not apply to working from home; requirements relating to home-based work are outlined in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17108">Section 21.3 – Working From Home</a>. &nbsp;Further information on the use of mobile devices can be found in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17004">Section 21.1 – Agency Owned Mobile Devices</a>.</p>]]></paragraph>
<paragraph
    title="22.2.3."


><![CDATA[<p>Also refer to <a title="Product Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 - Product Security</a>&nbsp;for requirements on product security, selection, maintenance, sanitisation and disposal.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Working outside the office"><paragraph
    title="22.2.4.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>As the security risk relating to specific targeting of mobile devices capable of processing highly classified information is high, these mobile devices cannot be used outside of facilities certified to an appropriate level to allow for their use. &nbsp;In addition, as agencies have no control over public locations including, but not limited to, such locations as public transport, transit lounges, hotel lobbies, and coffee shops, mobile devices are <strong>not</strong> approved to process classified information as the security risk of classified information being overheard or observed is considered to be too high in such locations.</p>]]></paragraph>
<paragraph
    title="22.2.4.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must Not"
    cid="4541"
><![CDATA[<p>Agencies MUST NOT allow personnel to access or communicate classified information on mobile devices outside of secure areas unless there is a reduced chance of being overheard and having the screen of the device observed.</p>]]></paragraph>
<paragraph
    title="22.2.4.C.02."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Should Not"
    cid="4542"
><![CDATA[<p>Agencies allowing personnel to access or communicate classified information outside of the office SHOULD NOT allow personnel to do so in public locations (e.g. public transport, transit lounges, hotel lobbies and coffee shops).</p>]]></paragraph>
</block>
<block title="Carrying mobile devices"><paragraph
    title="22.2.5.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>Mobile devices used outside the office are frequently transferred through areas not certified to process the classified information on the device. &nbsp;Mechanisms need to be put in place to protect the information stored on those devices.</p>]]></paragraph>
<paragraph
    title="22.2.5.R.02."

    tags="Governance,Mobile Devices"


><![CDATA[<p>When agencies apply encryption to mobile devices to reduce their physical transfer requirements it is only effective when the encryption function of the device is not authenticated. &nbsp;In most cases this will mean the mobile device will be in an unpowered state (i.e. &nbsp;not turned on), however, some devices are capable of deauthenticating the cryptography when it enters a locked state after a predefined timeout period. &nbsp;Such mobile devices can be carried in a locked state in accordance with reduced physical transfer requirements based on the assurance given in the cryptographic functions.</p>]]></paragraph>
<paragraph
    title="22.2.5.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must"
    cid="4546"
><![CDATA[<p>Agencies MUST ensure mobile devices are carried in a secured state when not being actively used, by:</p>
<ul>
<li>power off; or</li>
<li>power on but pass code enabled.</li>
</ul>]]></paragraph>
</block>
<block title="Using mobile devices"><paragraph
    title="22.2.6.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>Mobile devices are portable in nature and can be easily stolen or misplaced. &nbsp;It is strongly advised that personnel do not leave mobile devices unattended at any time.</p>]]></paragraph>
<paragraph
    title="22.2.6.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must"
    cid="4550"
><![CDATA[<p>When in use mobile devices MUST be kept under continual direct supervision.</p>]]></paragraph>
</block>
<block title="Travelling with mobile devices"><paragraph
    title="22.2.7.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>If personnel place mobile devices or media in checked-in luggage when travelling they lose control over the devices. &nbsp;Such situations provide an opportunity for mobile devices to be stolen or tampered with by an attacker.</p>]]></paragraph>
<paragraph
    title="22.2.7.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must"
    cid="4554"
><![CDATA[<p>When travelling with mobile devices and media, personnel MUST retain control over them at all times including by not placing them in checked-in luggage or leaving them unattended.</p>]]></paragraph>
<paragraph
    title="22.2.7.C.02."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must"
    cid="4555"
><![CDATA[<p>Travelling personnel requested to decrypt mobile devices for inspection or from whom mobile devices are taken out of sight by border control MUST report the potential compromise of classified information or the device to an ITSM as soon as possible.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="22.3. Working From Home"><subsection title="Objective"><paragraph
    title="22.3.1."


><![CDATA[<p>Personnel&nbsp;working from home protect classified information in the same manner as in the office environment.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="22.3.2."


><![CDATA[<p>This section covers accessing official information and agency information using mobile devices from a home environment in order to conduct home-based work. &nbsp;Further information on the use of mobile devices can be found in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17004">Section 21.1 – Agency Owned Mobile Devices</a>.</p>]]></paragraph>
</block>
<block title="The use of workstations instead of mobile devices"><paragraph
    title="22.3.3."


><![CDATA[<p>Where an agency chooses to issue a workstation for home-based work instead of a mobile device, the requirements for mobile devices within <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17004">Section 21.1 – Agency Owned Mobile Devices</a>, equally apply to the workstation that is used.</p>]]></paragraph>
<paragraph
    title="22.3.4."


><![CDATA[<p>It is important to note that product security, selection, maintenance, sanitisation and disposal requirements in&nbsp;<a title="Product Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 - Product Security</a>&nbsp;apply to <strong>all</strong> agency-owned mobile devices.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Storage requirements"><paragraph
    title="22.3.5.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>All mobile devices have the potential to store classified information and therefore need protection against loss and compromise.</p>]]></paragraph>
<paragraph
    title="22.3.5.R.02."

    tags="Governance,Mobile Devices"


><![CDATA[<p>Refer to the&nbsp;<a title="PSR - Mobile and Remote working" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/managing-specific-scenarios/mobile-and-remote-working/" target="_blank">PSR - Mobile and Remote working</a></p>
<p>Refer to the&nbsp;<a title="Handling requirements for protectively marked information and equipment" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/classification-system-and-handling-requirements/handling-requirements/" target="_blank">PSR&nbsp;- Handling Requirements for protectively marked information and equipment</a></p>]]></paragraph>
<paragraph
    title="22.3.5.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must"
    cid="4571"
><![CDATA[<p>Agencies MUST ensure that when mobile devices are not being actively used they are secured in accordance with the minimum physical security requirements as stated in the <a title="Protective Security Requirements - Physical Security" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/physical-security/" target="_blank">PSR</a>.</p>]]></paragraph>
</block>
<block title="Processing requirements"><paragraph
    title="22.3.6.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>When agencies consider allowing personnel to work from a home environment they need to be aware that implementing physical security measures may require modifications to the person’s home, or the provision of approved containers or secure storage units at the expense of the agency.</p>]]></paragraph>
<paragraph
    title="22.3.6.R.02."

    tags="Governance,Mobile Devices"


><![CDATA[<p>Refer to the&nbsp;<a title="PSR - Mobile and Remote working" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/managing-specific-scenarios/mobile-and-remote-working/" target="_blank">PSR - Mobile and Remote working</a></p><p>Refer to the&nbsp;<a title="Handling requirements for protectively marked information and equipment" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/classification-system-and-handling-requirements/handling-requirements/" target="_blank">PSR&nbsp;- Handling Requirements for protectively marked information and equipment</a></p>]]></paragraph>
<paragraph
    title="22.3.6.C.01."

    tags="Governance,Mobile Devices,Physical Security"


    classification="All Classifications"
    compliance="Must"
    cid="4575"
><![CDATA[<p>Agencies MUST ensure that the area within which mobile devices are used meets the minimum physical security requirements as stated in the <a title="Protective Security Requirements - Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/physical-security/" target="_blank">PSR</a>.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="22.4. Non-Agency Owned Devices and Bring Your Own Device (BYOD)"><subsection title="Objective"><paragraph
    title="22.4.1."


><![CDATA[<p>Where an Agency&nbsp;permits personnel to supply their own mobile devices (such as smartphones, tablets and laptops), Official Information and agency information systems are protected to a level equivalent to an agency provided and managed office environment.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="22.4.2."


><![CDATA[<p>This section provides information on the use and security of <strong>non-agency owned or provided</strong> mobile devices when used for official business. This is commonly known as Bring Your Own Device (BYOD). The use of agency owned devices is described earlier in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17004">Section 21.1 – Agency Owned Mobile Devices</a>.</p>]]></paragraph>
<paragraph
    title="22.4.3."


><![CDATA[<p>In the context of this section, a BYOD Network is any agency owned or provided network dedicated to BYOD. &nbsp;A BYOD Network is usually within an agency’s premises but does NOT include networks and related services provided by commercial telecommunication or other technology providers.</p>]]></paragraph>
<paragraph
    title="22.4.4."


><![CDATA[<p>BYOD will introduce a wide range of risks, including information and privacy risks, to an organisation, in addition to the existing ICT risks and threats. &nbsp;Agencies will need to carefully examine and consider the security, privacy, governance, assurance and compliance risks and implications of BYOD.</p>]]></paragraph>
<paragraph
    title="22.4.5."


><![CDATA[<p>Mobile devices are a “soft” target for malware and cybercrime providing a further attack channel or vector for organisational ICT infrastructures and networks. Risks fall principally into the following categories:</p>
<ul>
<li>Data exfiltration and theft;</li>
<li>Data tampering;</li>
<li>Data loss;</li>
<li>Malware;</li>
<li>System outages and Denial of Service; and</li>
<li>Increased incident management and recovery costs.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="22.4.6."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Risk Management of Enterprise Mobility including Bring Your Own Device</strong></p>
</td>
<td style="text-align: center;">
<p>ASD</p>
</td>
<td style="width: 33%;">
<p><a title="Risk Management of Enterprise Mobility" rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/risk-management-enterprise-mobility-including-bring-your-own-device" target="_blank">https://www.cyber.gov.au/acsc/view-all-content/publications/risk-management-enterprise-mobility-including-bring-your-own-device</a>&nbsp;</p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong><strong>BYOD Guidance: Device Security Considerations</strong></strong></p>
</td>
<td style="text-align: center;">
<p><span>GOV.UK</span></p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/360960/BYOD_Guidance_-_Device_Security_Considerations.pdf" target="_blank">https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/360960/BYOD_Guidance_-_Device_Security_Considerations.pdf [PDF, 235 KB]</a><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/eud-guidance" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>End User Devices Security and Configuration Guidance</strong></p>
</td>
<td style="text-align: center;">
<p>NCSC, UK</p>
</td>
<td style="width: 33%;">
<p><a title="BYOD Security Guidance" rel="noopener noreferrer" href="https://www.ncsc.gov.uk/collection/device-security-guidance/bring-your-own-device" target="_blank">https://www.ncsc.gov.uk/collection/device-security-guidance/bring-your-own-device</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>NIST Special Publication 800-121, Revision 2, May 2017</strong></p>
</td>
<td>
<p><strong>Guide to Bluetooth Security</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td style="width: 33%;">
<p><a title="NIST SP 800-121" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-121r2.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-121r2.pdf [PDF, 2.1 MB]</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>NIST Special Publication 800-46,&nbsp;<strong>Revision 2, July 2016</strong></strong></p>
</td>
<td>
<p><strong>Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td style="width: 33%;">
<p><a title="NIST SP 800-46" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-46r2.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-46r2.pdf [PDF, 570 KB]</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>NIST Special Publication 800-114,&nbsp;<strong>Revision 1, July 2016</strong></strong></p>
</td>
<td>
<p><strong>User’s Guide to Telework and Bring Your Own Device (BYOD) Security</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;">
<p><a title="NIST SP 800-114" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-114r1.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-114r1.pdf [PDF, 435 KB]</a></p>
</td>
</tr>
</tbody>
</table><p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Risk Assessment"><paragraph
    title="22.4.7.R.01."

    tags="Governance,Mobile Devices,BYOD,Risk Assessment"


><![CDATA[<p>Commonly termed “Bring Your Own Device” (BYOD), personal use of mobile computing in an organisational environment is widespread and personnel have become accustomed to the use of a variety of personal mobile devices. &nbsp;BYOD can have many advantages for an agency and for personnel. &nbsp;At the same time, BYOD will introduce a range of new information security risks and threats and may exacerbate existing risks.</p>]]></paragraph>
<paragraph
    title="22.4.7.C.01."

    tags="Governance,Mobile Devices,BYOD,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="4597"
><![CDATA[<p>Agencies MUST undertake a risk assessment and implement appropriate controls BEFORE implementing a BYOD Policy and permitting the use of BYOD.</p>]]></paragraph>
<paragraph
    title="22.4.7.C.02."

    tags="Governance,Mobile Devices,BYOD,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="4598"
><![CDATA[<p>Agencies MUST take an integrated approach to BYOD security, covering policy, training, support, systems architecture, security, systems management, change management, incident detection &amp; management and business continuity.</p>]]></paragraph>
</block>
<block title="Applicability and Usage"><paragraph
    title="22.4.8.R.01."

    tags="Governance,Mobile Devices,BYOD"


><![CDATA[<p>BYOD introduces number of additional risks and attack vectors to agency systems. &nbsp;Not all BYOD risks can be fully mitigated with technologies available today. &nbsp;It is therefore important that, where feasible, all the controls specified in this section are implemented.</p>]]></paragraph>
<paragraph
    title="22.4.8.C.01."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4623"
><![CDATA[<p>BYOD MUST <strong>only</strong> be permitted for agency information systems up to and including RESTRICTED.</p>]]></paragraph>
<paragraph
    title="22.4.8.C.02."

    tags="Governance,Mobile Devices,BYOD"


    classification="Confidential, Top Secret, Secret"
    compliance="Must Not"
    cid="4624"
><![CDATA[<p>BYOD MUST NOT be used for CONFIDENTIAL, SECRET or TOP SECRET systems.</p>]]></paragraph>
</block>
<block title="Technical Controls"><paragraph
    title="22.4.9.R.01."

    tags="Technical,Mobile Devices,BYOD"


><![CDATA[<p>“Jail-Breaking” and “rooting” are terms applied to devices where operating systems controls have been by-passed to allow installation of alternate operating systems or software applications that are not otherwise permitted. &nbsp;This is a risky practice and can create opportunities for device compromise. &nbsp;Users may wish to alter settings to allow the download of personal apps. &nbsp;This can result in security setting violations.</p>]]></paragraph>
<paragraph
    title="22.4.9.C.01."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must Not"
    cid="4627"
><![CDATA[<p>Devices that have been “jail-broken”, “rooted” or have settings violations MUST NOT be used for any agency business or be allowed to connect to any agency systems UNLESS this been specifically authorised.</p>]]></paragraph>
</block>
<block title="BYOD Policy"><paragraph
    title="22.4.10.R.01."

    tags="Governance,Mobile Devices,BYOD,Risk Assessment"


><![CDATA[<p>Technical controls fall into two categories: organisational systems and device controls. &nbsp;Protection for organisational systems will start with a risk assessment which guides the development of a secure architecture to support BYOD operations. &nbsp;Additional controls will need to be applied to individual devices. &nbsp;The privacy of user data should be considered. A user policy is essential.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.01."

    tags="Governance,Mobile Devices,BYOD,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="4630"
><![CDATA[<p>Agencies may identify additional policy provisions and controls that are required, based on their assessment of risk. &nbsp;Agencies MUST implement the additional controls and protocols before implementing BYOD.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.02."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4631"
><![CDATA[<p>Agencies MUST implement a BYOD acceptable use policy, agreed and signed by each person using a BYOD device.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.03."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4632"
><![CDATA[<p>The agency’s policy MUST clearly establish eligibility of personnel for participation in the agency BYOD scheme.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.04."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4633"
><![CDATA[<p>Personnel MUST have written authorisation (usually managerial approval) before a connection is enabled (on-boarding).</p>]]></paragraph>
<paragraph
    title="22.4.10.C.05."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4634"
><![CDATA[<p>Written authorisation MUST include the nature and extent of agency access approved, considering:</p>
<ul>
<li>time, day of the week;</li>
<li>location; and</li>
<li>local or roaming access.</li>
</ul>]]></paragraph>
<paragraph
    title="22.4.10.C.06."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4635"
><![CDATA[<p>Procedures MUST be established for removal of agency installed software and any agency data when the user no longer has a need to use BYOD, is redeployed or ceases employment (off-boarding).</p>]]></paragraph>
<paragraph
    title="22.4.10.C.07."

    tags="Governance,Mobile Devices,BYOD,SOPs"


    classification="All Classifications"
    compliance="Must"
    cid="4637"
><![CDATA[<p>Standard Operating Procedures for the agency’s BYOD network MUST be established.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.08."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4638"
><![CDATA[<p>Provision MUST be made for contractors and other authorised non-employees. &nbsp;It is at the agency’s discretion whether this activity is permitted. &nbsp;The risk assessment MUST reflect this factor.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.09."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4639"
><![CDATA[<p>Ownership of data on BYOD devices MUST be clearly articulated and agreed.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.10."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4643"
><![CDATA[<p>Agency policies MUST clearly articulate the separation between corporate support and where individuals are responsible for the maintenance and support of their own devices.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.11."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4644"
><![CDATA[<p>Agency policies MUST clearly articulate the acceptable use of any GPS or other tracking capability.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.12."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4645"
><![CDATA[<p>Individual responsibility for the cost of any BYOD device and its accessories MUST be agreed.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.13."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4646"
><![CDATA[<p>Individual responsibility for replacement in the event of loss or theft MUST be agreed.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.14."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4647"
><![CDATA[<p>Individuals MUST be responsible for the installation and maintenance of any mandated BYOD-based firewalls and anti-malware software and for implementing operating system updates and patches on their device.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.15."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4648"
><![CDATA[<p>The procedures for purchasing and installing business related applications on the mobile devices MUST be specified and agreed.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.16."

    tags="Data Management"


    classification="All Classifications"
    compliance="Must"
    cid="4650"
><![CDATA[<p>The responsibility for payment of voice and data plans and roaming charges MUST be specified and agreed.</p>]]></paragraph>
</block>
<block title="BYOD Infrastructure and System Controls"><paragraph
    title="22.4.11.R.01."

    tags="Infrastructure,Technical,Mobile Devices,Risk Management,BYOD"


><![CDATA[<p>The use of BYOD presents increased risk and threat to agency systems. &nbsp;Changes to an agency’s security architecture are necessary in order to minimise and manage the increased risk and threat to agency systems, information and information privacy.</p>]]></paragraph>
<paragraph
    title="22.4.11.R.02."

    tags="Infrastructure,Technical,Mobile Devices,Risk Management,BYOD"


><![CDATA[<p>It is important that the principles of separation and segregation are applied to any system architecture or design to assist in the management of risk in BYOD systems.</p>]]></paragraph>
<paragraph
    title="22.4.11.R.03."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


><![CDATA[<p>BYOD devices will seek to establish multiple connections through Wi-Fi “hot spots”, Bluetooth connection and simultaneous internet and cellular connections. &nbsp;This behaviour creates multiple simultaneous “back channels” which can provide attack vectors for malicious activities and is considered to be high risk.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.01."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4655"
><![CDATA[<p>A security architectural review MUST be undertaken by the agency before allowing BYOD devices to connect to agency systems.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.02."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4656"
><![CDATA[<p>The BYOD network segment MUST be segregated from other elements of the agency’s network.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.03."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4657"
><![CDATA[<p>Agencies MUST architecturally separate guest and public facing networks from BYOD networks.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.04."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4658"
><![CDATA[<p>Network configuration policies and authentication mechanisms MUST allow access to agency resources ONLY through the BYOD network segment.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.05."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4659"
><![CDATA[<p>Access to internal resources and servers MUST be carefully managed and confined to only those services for which there is a defined and properly authorised business requirement.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.06."

    tags="Infrastructure,Technical,WLANs,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4660"
><![CDATA[<p>Wireless access points used for access to agency networks MUST be implemented and secured in accordance with the directions in this manual (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16241">Section 18.2 – Wireless Local Area Networks</a>).</p>]]></paragraph>
<paragraph
    title="22.4.11.C.07."

    tags="Bluetooth,Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4661"
><![CDATA[<p>Bluetooth on BYOD devices MUST be disabled while within designated secure areas on agency premises.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.08."

    tags="Infrastructure,Technical,Access Control,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4662"
><![CDATA[<p>Access Controls MUST be implemented in accordance with <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access Control</a>.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.09."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4663"
><![CDATA[<p>Agencies MUST maintain a list of permitted operating systems, including operating system version numbers, for BYOD devices.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.10."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4664"
><![CDATA[<p>Agencies MUST check each BYOD device for malware and sanitise the device appropriately before installing agency software or operating environments.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.11."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4665"
><![CDATA[<p>Agencies MUST check each BYOD device for malware and sanitise the device appropriately before permitting access to agency data.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.12."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4666"
><![CDATA[<p>BYOD MUST have a Mobile Device Management (MDM) solution implemented with a minimum of the following enabled:</p>
<ul>
<li>The MDM is enabled to “wipe” devices of any agency data if lost or stolen;</li>
<li>If the MDM cannot discriminate between agency and personal data, all data, including personal data, is deleted if the device is lost or stolen;</li>
<li>The MDM is capable of remotely applying agency security configurations for BYOD devices;</li>
<li>Mobile device security configurations are validated (health check) by the MDM before a device is permitted to connect to the agency’s systems;</li>
<li>“Jail-broken”, “rooted” or settings violations MUST be detected and isolated;&nbsp;</li>
<li>“Jail-broken” devices are NOT permitted to access agency resources;&nbsp;</li>
<li>Access to agency resources is limited until both the device and user is fully compliant with policy and SOPs;</li>
<li>Auditing and logging is enabled; and</li>
<li>Changes of Subscriber Identity Module (SIM) card are monitored to allow remote blocking and wiping in the event of theft or compromise.</li>
</ul>]]></paragraph>
<paragraph
    title="22.4.11.C.13."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4667"
><![CDATA[<p>Intrusion detection systems MUST be implemented.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.14."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4668"
><![CDATA[<p>Continuous monitoring MUST be established to detect actual or potential security compromises or incidents from BYOD devices. &nbsp;Refer also to <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13001">Chapter 6 - Information Security Monitoring</a>.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.15."

    tags="Cloud Computing,Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4669"
><![CDATA[<p>Agencies MUST maintain a list of approved cloud applications that may be used on BYOD devices.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.16."

    tags="Cloud Computing,Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4670"
><![CDATA[<p>Agencies MUST block the use of unapproved cloud applications for processing any agency or organisational data.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.17."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must Not"
    cid="4671"
><![CDATA[<p>BYOD devices MUST NOT be permitted direct connection to internal hosts, including all other devices on the local network.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.18."

    tags="Cloud Computing,Infrastructure,Technical,Mobile Devices,BYOD,Public cloud security"


    classification="All Classifications"
    compliance="Must Not"
    cid="4672"
><![CDATA[<p>BYOD devices connecting to guest and public facing networks MUST NOT be permitted access to the corporate network other than through a VPN over the Internet.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.19."

    tags="Bluetooth,Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Should"
    cid="4674"
><![CDATA[<p>Bluetooth on BYOD devices SHOULD be disabled while within agency premises and while accessing agency systems and data.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.20."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Should"
    cid="4675"
><![CDATA[<p>BYOD devices and systems SHOULD use Multi-factor (at least two-factor) authentication to connect to agency systems and prior to being permitted access to agency data.</p>]]></paragraph>
</block>
<block title="Wireless IDS / IPS systems"><paragraph
    title="22.4.12.R.01."

    tags="Technical,Mobile Devices,BYOD"


><![CDATA[<p>Devices will automatically associate with the strongest signal and associated Access Point (AP). &nbsp;A rogue AP may belong to another organisation in an adjacent building, contractor, customer, supplier or other visitor. &nbsp;Association with a rogue AP can provide a means for the installation of malware.</p>]]></paragraph>
<paragraph
    title="22.4.12.R.02."

    tags="Technical,Mobile Devices,BYOD"


><![CDATA[<p>Wireless IDS / IPS systems have the ability to detect rogue wireless AP’s by channel, MAC address, frequency band and SSID. &nbsp;They can continuously monitor wireless networks and detect and block denial-of-service and adversary-in-the-middle wireless attacks. &nbsp;Establishing baselines of known authorised and unauthorised devices and AP’s will assist in detecting and isolating any rogue devices and AP’s.</p>]]></paragraph>
<paragraph
    title="22.4.12.C.01."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4679"
><![CDATA[<p>Agencies MUST implement a wireless IDS /IPS on BYOD wireless networks.</p>]]></paragraph>
<paragraph
    title="22.4.12.C.02."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4680"
><![CDATA[<p>Agencies MUST implement rogue AP and wireless “hot spot” detection and implement response procedures where detection occurs.</p>]]></paragraph>
<paragraph
    title="22.4.12.C.03."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Should"
    cid="4681"
><![CDATA[<p>Agencies SHOULD conduct a baseline survey to identify:</p>
<ul>
<li>All authorised devices and AP’s; and</li>
<li>Any unauthorised devices and AP’s.</li>
</ul>]]></paragraph>
</block>
<block title="BYOD Device Controls"><paragraph
    title="22.4.13.R.01."

    tags="Technical,Mobile Devices,BYOD"


><![CDATA[<p>Mobile devices are susceptible to loss, theft and being misplaced. &nbsp;These devices can be easily compromised when out of the physical control of the authorised user or owner. &nbsp;To protect agency systems it is important that BYOD devices are also secured and managed on an ongoing basis.</p>]]></paragraph>
<paragraph
    title="22.4.13.C.01."

    tags="Encryption,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4684"
><![CDATA[<p>Any agency data exchanged with the mobile device MUST be encrypted in transit (See <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a>).</p>]]></paragraph>
<paragraph
    title="22.4.13.C.02."

    tags="Encryption,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4685"
><![CDATA[<p>Any agency data stored on the device MUST be encrypted (including keys, certificates and other essential session establishment data).</p>]]></paragraph>
<paragraph
    title="22.4.13.C.03."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4686"
><![CDATA[<p>The use of virtual containers, sandboxes, wraps or similar mechanisms on the mobile device MUST be established for each authorised session for any organisational data. &nbsp;These mechanisms MUST be non-persistent and be removed at the end of each session.</p>]]></paragraph>
<paragraph
    title="22.4.13.C.04."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4687"
><![CDATA[<p>Any sensitive agency data MUST be removed and securely deleted, or encrypted at the end of a session.</p>]]></paragraph>
<paragraph
    title="22.4.13.C.05."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4688"
><![CDATA[<p>Connections to the agency network MUST be time limited to avoid leaving a session “logged on”.</p>]]></paragraph>
<paragraph
    title="22.4.13.C.06."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4689"
><![CDATA[<p>Communications between the mobile device and the agency network MUST be established through a Virtual Private Network (VPN).</p>]]></paragraph>
<paragraph
    title="22.4.13.C.07."

    tags="Technical,Mobile Devices,BYOD,Split tunnelling"


    classification="All Classifications"
    compliance="Must"
    cid="4690"
><![CDATA[<p>Agencies MUST disable split-tunnelling when using a BYOD device to connect to an agency network (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17004">Section 21.1 – Agency Owned Mobile Devices</a>).</p>]]></paragraph>
<paragraph
    title="22.4.13.C.08."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4691"
><![CDATA[<p>Agencies MUST disable the ability for a BYOD device to establish simultaneous connections (e.g. wireless and cellular) when connected to an agency’s network.</p>]]></paragraph>
<paragraph
    title="22.4.13.C.09."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4692"
><![CDATA[<p>The use of passwords or PINs to unlock the BYOD device MUST be enforced in addition to all other agency authentication mechanisms.</p>]]></paragraph>
<paragraph
    title="22.4.13.C.10."

    tags="Technical,Mobile Devices,BYOD,Passwords"


    classification="All Classifications"
    compliance="Must"
    cid="4693"
><![CDATA[<p>BYOD device passwords MUST be distinct from any agency access and authentication passwords.</p>]]></paragraph>
<paragraph
    title="22.4.13.C.11."

    tags="Technical,Mobile Devices,BYOD,Passwords"


    classification="All Classifications"
    compliance="Must"
    cid="4694"
><![CDATA[<p>BYOD passwords MUST be distinct from other fixed or mobile agency network passwords (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15349">Section 16.1 – Identification and Authentication</a> for details on password requirements).</p>]]></paragraph>
</block>
<block title="Additional Controls"><paragraph
    title="22.4.14.R.01."

    tags="Technical,Mobile Devices,BYOD"


><![CDATA[<p>There are many new devices and operating system versions being frequently released. &nbsp;It may not be feasible or cost-effective for an agency to support all combinations of device and operating system.</p>]]></paragraph>
<paragraph
    title="22.4.14.C.01."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Should"
    cid="4697"
><![CDATA[<p>Agencies SHOULD compile a list of approved BYOD devices and operating systems for the guidance of staff.</p>]]></paragraph>
<paragraph
    title="22.4.14.C.02."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Should"
    cid="4698"
><![CDATA[<p>Agencies SHOULD consider the implementation of Data Loss Prevention (DLP) technologies.</p>]]></paragraph>
<paragraph
    title="22.4.14.C.03."

    tags="Data Management,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Should"
    cid="4699"
><![CDATA[<p>Agencies SHOULD consider the use of bandwidth limits as a means of controlling data downloads and uploads.</p>]]></paragraph>
<paragraph
    title="22.4.14.C.04."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Should"
    cid="4700"
><![CDATA[<p>Agencies SHOULD take legal advice on the provisions in their BYOD policy.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="23. Public Cloud Security"><section title="23.1. Public Cloud Security Concepts"><subsection title="Objective"><paragraph
    title="23.1.1."


><![CDATA[<p>Agencies understand key concepts and implement controls related to securing their use of public cloud services.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="23.1.2."


><![CDATA[<p class="NormS23C1">This section covers information about the key security concepts and architecture patterns related to public cloud services.</p>]]></paragraph>
<paragraph
    title="23.1.3."


><![CDATA[<p class="NormS23C1">Cloud technologies require a different approach to the delivery of ICT services, and this extends to the way information security controls are implemented for cloud services.</p>]]></paragraph>
<paragraph
    title="23.1.4."


><![CDATA[<p class="NormS23C1">Public cloud security builds on the application of Zero Trust concepts and principles.  Zero Trust is the recommended approach to ICT system security, especially when using public cloud services.</p>]]></paragraph>
<paragraph
    title="23.1.5."


><![CDATA[<p class="NormS23C2">Reference to other chapters and sections in this document is essential.&nbsp; In particular:</p><ul>
<li><a title="Using cloud services" href="http://nzism.gcsb.govt.nz/ism-document#Section-12164">Section 2.3 – Using cloud services</a></li>
</ul>]]></paragraph>
</block>
<block title="Mandates, directives and requirements"><paragraph
    title="23.1.6."


><![CDATA[<p class="NormS23C1">In August 2013, the government introduced their approach to cloud computing, establishing a ‘cloud first’ policy and an All-of-Government direction to cloud services development and deployment. This is enabled by the Cabinet Minute [CAB&nbsp;Min&nbsp;(13)&nbsp;37/6B].</p>]]></paragraph>
<paragraph
    title="23.1.7."


><![CDATA[<p class="NormS23C1">Under the ‘cloud first’ policy public service agencies are expected to adopt approved cloud services either when faced with new procurements, or an upcoming contract extension decision.</p>]]></paragraph>
<paragraph
    title="23.1.8."


><![CDATA[<p class="NormS23C1">In July 2016, Cabinet subsequently agreed that agencies can also use public cloud to deliver office productivity services, provided they comply with security guidance issued by the GCDO and the GCSB [CAB-16-MIN-0316].</p>]]></paragraph>
<paragraph
    title="23.1.9."


><![CDATA[<p class="NormS23C1">Agencies are required to identify and manage risks associated with the use of cloud services through the GCDO Cloud Risk Assessment process [CAB Min (13) 37/6B].&nbsp; More information regarding cloud specific risk management can be found at <a title="Digital.gov" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/assess-the-risks/" target="_blank">digital.govt.nz</a>.</p>]]></paragraph>
<paragraph
    title="23.1.10."


><![CDATA[<p class="NormS23C1">Agencies are also required to certify and accredit their ICT systems and services, including those delivered through cloud technologies.  Chapter 4 of this manual describes the certification and accreditation processes and these also apply to cloud services.</p>]]></paragraph>
<paragraph
    title="23.1.11."


><![CDATA[<p class="NormS23C1">CAB Min (13) 37/6B directs that no data classified above RESTRICTED may be held in a public cloud.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="23.1.12."


><![CDATA[<p class="NormS23C1">Adopting or using cloud services introduces new approaches to:</p><ul>
<li>Workload descriptions and management.</li>
<li>Procurement and contract management.</li>
<li>Virtualisation and the separation of resources using hyperscale technologies and strict control-plane/data-plane, tenant/tenant and tenant/provider segregation.</li>
<li>Key information security services used to control the information boundary: using identity, directories and authorisation, instead of networks, gateways and firewalls.</li>
<li>The approach to and selection of critical security services such as intrusion detection, key management, encryption, endpoint controls, privileged and user access management and authentication (including MFA).</li>
</ul>]]></paragraph>
</block>
<block title="Public cloud use within other cloud deployment models"><paragraph
    title="23.1.13."


><![CDATA[<p class="NormS23C1">All the standard cloud deployment models described by ISO and NIST could incorporate elements of public cloud, including:</p><ul>
<li>Private cloud, hosted on third party public cloud infrastructure.</li>
<li>Multi cloud, combining elements of different vendors’ public cloud services.</li>
<li>Hybrid cloud, combining elements of private and public cloud services.</li>
</ul>]]></paragraph>
<paragraph
    title="23.1.14."


><![CDATA[<p class="NormS23C1">The focus of this chapter is on security concerns related to the use of public cloud technologies irrespective of the cloud service’s primary deployment model.  This is to avoid these concerns being considered out of scope due to inconsistencies in definitions being applied.</p>]]></paragraph>
</block>
<block title="Characteristics of public cloud"><paragraph
    title="23.1.15."


><![CDATA[<p class="NormS23C1">There is not a single accepted definition of exactly what constitutes public cloud.  Typically public cloud refers to cloud services that are generally available for anyone to use and are accessed through the internet.</p>]]></paragraph>
<paragraph
    title="23.1.16."


><![CDATA[<p class="NormS23C1">For the avoidance of doubt, information in this chapter relates to public cloud services where:</p><ul>
<li>The infrastructure used to deliver the public cloud services is not owned by the agency (i.e., server hardware, network devices).</li>
<li>The cloud infrastructure is shared between many customers (‘multi-tenanted’) and is accessible from the internet.</li>
<li>Service provisioning is automated and customer managed.</li>
<li>There is strict isolation between customer instances, and between customer instances and the service provider’s management plane.</li>
<li>Customer data is isolated and controls are in place that strictly manage access by the service provider.</li>
<li>There is a defined shared responsibility matrix for ensuring the services meet customer security requirements.  It should be noted that regardless of the model, agencies will retain ultimate accountability for the security of their information.</li>
<li>There is limited flexibility in how the services are configured, and in at least some aspects there may be no flexibility to customise the service.</li>
</ul>]]></paragraph>
</block>
<block title="Responsibility for security in public cloud is necessarily shared"><paragraph
    title="23.1.17."


><![CDATA[<p class="NormS23C1">Agencies share responsibility for the security of their public cloud environments with their cloud service providers.</p>]]></paragraph>
<paragraph
    title="23.1.18."


><![CDATA[<p class="NormS23C1">Due to differences in how cloud providers operate, there is no single model that can fully describe the boundary between agency security responsibilities and those of the cloud service provider.  Cloud service provider responsibilities may even vary between their different service offerings.</p>]]></paragraph>
<paragraph
    title="23.1.19."


><![CDATA[<p class="NormS23C1">The following is an example of how responsibilities for security in a cloud service could be shared, although every service is different:&nbsp;</p>
<p class="NormS23C1"><img class="leftAlone" title="" src="assets/NZISM/PCS-Section-1-Diagram-1-Shared-Responsibility2.png" alt="" width="600" height="240"></p>]]></paragraph>
<paragraph
    title="23.1.20."


><![CDATA[<p class="NormS23C1">It is essential that agencies understand where the cloud service provider’s responsibilities end and their own begin for each cloud service they consume, so there is no gap left unaddressed.</p>]]></paragraph>
<paragraph
    title="23.1.21."


><![CDATA[<p class="NormS23C1">Agency security processes, such as certification and accreditation or incident response, must be revised to ensure compatibility with their cloud service provider’s responsibilities.</p>]]></paragraph>
</block>
<block title="Risks and benefits associated with public cloud services"><paragraph
    title="23.1.22."


><![CDATA[<p class="NormS23C1">Public cloud services can provide agencies with significant security benefits when adopted in a controlled and well understood manner, including:</p><ul>
<li>Pervasive identity and authorisation model.</li>
<li>Consistent, software-orchestrated environments running immutable workloads.</li>
<li>Automated response to security incidents or misconfigurations.</li>
<li>Fine-grained access control.</li>
<li>Scalable logging, monitoring and audit.</li>
<li>Improved levels of baseline security.</li>
<li>Enhanced visibility of security state.</li>
</ul>]]></paragraph>
<paragraph
    title="23.1.23."


><![CDATA[<p class="NormS23C1">The use of public cloud services introduces additional specific risks that require careful control selection to manage.</p>]]></paragraph>
<paragraph
    title="23.1.24."


><![CDATA[<p class="NormS23C1">The following examples highlight key areas of public cloud-specific risks that need to be understood and managed:</p><ul>
<li>Traditional barriers limiting the movement of agency data across legal jurisdictions can be significantly reduced through the use of cloud services.</li>
<li>Cloud service provider self-service tools can be subject to manipulation impacting agency infrastructure.</li>
<li>Agency systems delivered using cloud services are typically accessible from the internet, including management interfaces, unless controls are put in place.</li>
<li>Agency data is stored on shared platforms, in multiple locations, with agencies ultimately being accountable for ensuring information is secured.</li>
<li>Cloud environments present large, high value targets, where single exploits can impact large numbers of customers.</li>
<li>Cloud services are easier to consume without needing to involve common governance processes, such as change control, increasing the risk of using shadow services without adequate information security controls in place.</li>
<li>On-demand services, coupled with rapid-elasticity, can lead to inappropriate use of agency cloud environments.  Agencies are responsible for tracking billing and usage metrics and ensuring appropriate controls are in place to manage fiscal constraints.</li>
</ul>]]></paragraph>
<paragraph
    title="23.1.25."


><![CDATA[<p class="NormS23C1">The GCDO Cloud Risk Assessment process is intended to help agencies understand these, and other, risks associated with the use of public cloud.</p><p class="NormS23C1"> </p>]]></paragraph>
</block>
<block title="Public cloud impacts on security control selection"><paragraph
    title="23.1.26."


><![CDATA[<p class="NormS23C1">Depending on whether responsibility for implementing security controls rests on the cloud service provider or the agency, enterprise security controls or standards may not be possible to implement uniformly in public cloud services, for example:</p><ol style="list-style-type: lower-alpha;">
<li>Agents used to manage configuration or collect system telemetry may not be able to be deployed across public cloud services.</li>
<li>Log messages may not be able to be centrally collected, or log information tailored to agency requirements, from public cloud services.</li>
<li>Network information, such as packet captures, may not be feasible to collect.</li>
<li>Traditional security devices, such as firewalls and proxy servers, may not be able to be deployed.</li>
</ol>]]></paragraph>
</block>
<block title="Security boundaries in cloud"><paragraph
    title="23.1.27."


><![CDATA[<p class="NormS23C1">Security boundaries exist to identify where differing security requirements and policies need to be applied to information and infrastructure assets operated in support of agency outcomes.&nbsp; Well defined security boundaries are a key construct in support of:</p><ul>
<li>Protecting environments by providing control enforcement points to manage information flows between internal systems and externally to the environment.</li>
<li>Providing containment points where the impact of incidents can be limited in scope, which also aids in recovery.</li>
</ul>]]></paragraph>
<paragraph
    title="23.1.28."


><![CDATA[<p class="NormS23C1">Well defined security boundaries can ensure that information is accessible for authorised users and that restrictions do not limit those users’ access to information to which they are entitled.</p>]]></paragraph>
<paragraph
    title="23.1.29."


><![CDATA[<p class="NormS23C1">There are three key constructs used to describe security policy boundaries in the NZISM.&nbsp; These are <em>classification</em>, <em>security domain</em> and <em>trust zone</em>. &nbsp;Information and systems are subject to the combined requirements described in these policies.&nbsp;</p>
<p class="NormS23C1"><img class="leftAlone" title="" src="assets/NZISM/PCS-Section-1-Diagram-2-Security-boundaries-1.png" alt="" width="600" height="316"></p>]]></paragraph>
<paragraph
    title="23.1.30."


><![CDATA[<p class="NormS23C1">In public cloud, the <em>classified system</em> refers to the highest level of classified information that can be stored, or processed, by systems in the agency’s cloud environment.  The highest level of classified information the classified system can store or process is based on the lower of:</p><ul>
<li>The highest classification the system is accredited to operate at, AND</li>
<li>The lowest clearance level authorised users of the system hold.</li>
</ul><p class="NormS17C1">The highest classification of information a <em>classified system</em> in public cloud can be accredited to operate with is RESTRICTED.</p>]]></paragraph>
<paragraph
    title="23.1.31."


><![CDATA[<p class="NormS23C1">Minimum security requirements based on classification are described in the Protective Security Requirements and the NZISM.</p>]]></paragraph>
<paragraph
    title="23.1.32."


><![CDATA[<p class="NormS23C1">A <em>security domain</em> in public cloud can be categorised as a group of <em>trust zones</em> operating under a common set of security requirements and policies.  These security requirements and policies are formed through a combination of:</p><ul>
<li>Minimum security control requirements from the PSR and NZISM, determined by the classification.</li>
<li>Security control requirements to manage the unique threat environment presented by the use of the public cloud services.</li>
<li>Additional security control requirements to manage specific risks identified through risk assessments.</li>
</ul>]]></paragraph>
<paragraph
    title="23.1.33."


><![CDATA[<p class="NormS23C1">Examples of the unique threat environment related to the use of public cloud services include:</p><ul>
<li>Access to the underlying infrastructure by the public cloud service provider systems and staff.</li>
<li>Differing relative importance of security controls, such as identity, and the addition of different types of privileged access such as for managing service subscriptions and billing (including terminating services) that can have immediate effect.</li>
<li>Geographic locations where the public cloud services are being delivered from.</li>
<li>Security controls being defined and implemented by the public cloud service provider.</li>
<li>The ease of extending access to third parties, including third party applications, through in-built federation and directory integration services in public cloud.</li>
<li>The ease of shifting data between services and geographic locations in public cloud environments compared to on-premise systems.</li>
<li>The control and visibility of the security state of the underlying infrastructure platforms, including the physical hosting environment.</li>
</ul>]]></paragraph>
<paragraph
    title="23.1.34."


><![CDATA[<p class="NormS23C1">Defining <em>trust zones</em> provides a mechanism to differentiate security controls used to manage access to information and services within an agency’s public cloud environment.</p>]]></paragraph>
<paragraph
    title="23.1.35."


><![CDATA[<p>In the public cloud environment, <em>trust zones</em> represent combinations of public cloud services (made up of user, system and data objects) that are authorised to interact with each other and are protected by a common set of security capabilities. &nbsp;The security controls associated with these security capabilities are applied at policy enforcement points:</p>
<p><img class="leftAlone" title="" src="assets/NZISM/PCS-Section-1-Diagram-3-Security-Boundaries-3.png" alt="" width="600" height="305"></p>]]></paragraph>
<paragraph
    title="23.1.36."


><![CDATA[<p class="NormS23C1">Traditional policy enforcement point implementations based on location-based network perimeter security controls can be difficult to successfully replicate in public cloud environments. </p>]]></paragraph>
<paragraph
    title="23.1.37."


><![CDATA[<p>In public cloud, access control policy enforcement points are tied to authorised combinations of user, system, and data object identities.</p>]]></paragraph>
</block>
<block title="Security boundaries between cloud providers and customers"><paragraph
    title="23.1.38."


><![CDATA[<p class="NormS23C1">A significant difference between public cloud and traditional computing is the additional set of administration services used by the cloud service provider to manage the overall cloud platform.</p>]]></paragraph>
<paragraph
    title="23.1.39."


><![CDATA[<p class="NormS23C1">Some of these administration services are exposed to tenants to facilitate tenancy management, such as maintaining customer contact and billing details or creating and deleting top level tenant resources.  In some circumstances, third parties can be provided access to perform these actions on behalf of tenants.</p>]]></paragraph>
<paragraph
    title="23.1.40."


><![CDATA[<p class="NormS23C1">Due to the significant impact from a compromise, access to these services and the associated privileged identities requires a high degree of trust in those responsible.&nbsp; Ensuring separation of duties (i.e., multi-user authorisation, see section <a href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-15709">16.7.19</a>) in this area is highly recommended. <strong><br></strong></p>
<p class="NormS23C1"><img class="leftAlone" title="" src="assets/NZISM/PCS-Section-1-Diagram-4-Security-Boundaries-4.png" alt="" width="600" height="370"></p>]]></paragraph>
</block>
<block title="Virtualisation and multi-tenant security in public cloud"><paragraph
    title="23.1.41."


><![CDATA[<p class="NormS23C1">Within a public cloud environment adequately architected, designed, and implemented virtualisation technologies can be used to provide isolation between tenants and separation between security domains.</p>]]></paragraph>
<paragraph
    title="23.1.42."


><![CDATA[<p class="NormS23C1">Public cloud service providers that are designed to use technology to implement strict isolation between tenant environments, and separate customer management from platform management, are more likely to provide adequately architected security controls to support security domain separation in a virtualised environment.</p>]]></paragraph>
<paragraph
    title="23.1.43."


><![CDATA[<p class="NormS23C1">Examples of adequately architected security controls that support tenant isolation in public cloud services can include:</p><ol style="list-style-type: lower-alpha;">
<li>Zero touch configuration of infrastructure using well defined infrastructure as code pipelines.</li>
<li>Separation of the cloud provider platform’s administrative control interfaces from customer accessible tenant management services.</li>
<li>An inability for cloud provider staff to access customer data except through customer authorised access channels (i.e., the platform does not provide ‘back door’ access to customer data).</li>
</ol>]]></paragraph>
<paragraph
    title="23.1.44."


><![CDATA[<p>At a minimum, a security domain control boundary exists between components where different parties undertake configuration and management responsibilities. <strong><br></strong></p>
<p><img class="leftAlone" title="" src="assets/NZISM/PCS-Section-1-Diagram-5-Virtualisation-Multi-tenancy-2.png" alt="" width="600" height="468"></p>]]></paragraph>
</block>
<block title="Collaboration between agencies in public cloud"><paragraph
    title="23.1.45."


><![CDATA[<p class="NormS23C1">Public cloud services, due to their multi-tenant design and support for integration to multiple identity providers, can provide a convenient platform for collaboration systems between agencies.</p>]]></paragraph>
<paragraph
    title="23.1.46."


><![CDATA[<p class="NormS23C1">It is usually not possible, nor desirable, to implement traditional DMZ or Landing Zone network architectures to facilitate third party access to an agency’s public cloud services where collaboration is the goal.</p>]]></paragraph>
<paragraph
    title="23.1.47."


><![CDATA[<p class="NormS23C1">For public cloud collaboration systems, it is often more practical to grant access to individual third party identities, or to federate (i.e., trust) the third party’s identity service to perform authentication on the collaboration system’s behalf.</p>]]></paragraph>
<paragraph
    title="23.1.48."


><![CDATA[<p class="NormS23C1">When multiple identity systems are used to control access to shared public cloud collaboration systems, the shared system operates to a <em>common policy</em> that covers all of the participating agencies security requirements.</p>]]></paragraph>
<paragraph
    title="23.1.49."


><![CDATA[<p class="NormS23C1">The <em>common policy</em> reflects a different security domain from each of the participating agencies, providing the equivalence of a DMZ environment in public cloud. <strong><br></strong></p>
<p class="NormS23C1"><img class="leftAlone" title="" src="assets/NZISM/PCS-Section-1-Diagram-6-Virtualisation-Multi-tenancy-3.png" alt="" width="600" height="325"></p>]]></paragraph>
<paragraph
    title="23.1.50."


><![CDATA[<p class="NormS23C1">When systems are operating in separate security domains, agencies must follow the guidance regarding <em>Information transfer and release in public cloud </em>described in this chapter of the NZISM.</p>]]></paragraph>
</block>
<block title="Information transfer and release in public cloud"><paragraph
    title="23.1.51."


><![CDATA[<p class="NormS23C1">Information being released from trust zones, destined either internally or externally to the security domain, must always follow the requirements for <a title="Data management" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16835"><em>Data management</em> described in Chapter 20</a> and <a title="Gateway security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567"><em>Gateway security</em> described in Chapter 19</a> of the NZISM.&nbsp; This includes where data is being backed up or replicated to systems operating in a different trust zone.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="23.1.52."


><![CDATA[<p class="NormS23C1">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>CAB Min (13) 37/6B</strong></td>
<td>&nbsp;Cloud computing risk and assurance framework (CAB Min (13) 37/6B)</td>
<td>&nbsp;</td>
<td><a title="Cabinet minute (13) 37/6B" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/about/cabinet-minutes/" target="_blank">Cabinet minutes for public cloud services | NZ Digital government</a></td>
</tr>
<tr>
<td><strong>CAB-16-MIN-0316</strong></td>
<td>&nbsp;Accelerating the adoption of public cloud services CAB-16-MIN-0316&nbsp;</td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td><strong>&nbsp;NIST SP 800-145 (2011)</strong></td>
<td>&nbsp;The NIST definition of cloud computing&nbsp;</td>
<td>&nbsp;NIST</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-145/final" target="_blank">SP 800-145, The NIST Definition of Cloud Computing | CSRC</a></td>
</tr>
<tr>
<td><strong>NIST SP 500-293 (2014)</strong></td>
<td>&nbsp;US Government cloud computing technology roadmap</td>
<td>&nbsp;NIST</td>
<td><a rel="noopener noreferrer" href="https://www.nist.gov/publications/us-government-cloud-computing-technology-roadmap-volume-i-high-priority-requirements" target="_blank">US Government Cloud Computing Technology Roadmap Volume I: High-Priority Requirements to Further USG Agency Cloud Computing Adoption; and Volume II: Useful Information for Cloud Adopters | NIST</a></td>
</tr>
<tr>
<td><strong>NIST SP 500-291 (2011)</strong></td>
<td>&nbsp;NIST cloud computing standards roadmap</td>
<td>&nbsp;NIST</td>
<td><a rel="noopener noreferrer" href="https://www.nist.gov/publications/nist-sp-500-291-nist-cloud-computing-standards-roadmap" target="_blank">NIST-SP 500-291, NIST Cloud Computing Standards Roadmap | NIST</a></td>
</tr>
<tr>
<td><strong>NIST SP 800-144 (2011)</strong></td>
<td>&nbsp;Guidelines on security and privacy in public cloud computing&nbsp;</td>
<td>&nbsp;NIST</td>
<td><a rel="noopener noreferrer" href="https://www.nist.gov/publications/guidelines-security-and-privacy-public-cloud-computing" target="_blank">Guidelines on Security and Privacy in Public Cloud Computing | NIST</a></td>
</tr>
<tr>
<td><strong>NIST SP-800-210 (2020)</strong></td>
<td>&nbsp;General access control guidance for cloud systems&nbsp;</td>
<td>&nbsp;NIST</td>
<td><a rel="noopener noreferrer" href="https://www.nist.gov/publications/general-access-control-guidance-cloud-systems" target="_blank">General Access Control Guidance for Cloud Systems | NIST</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 17789:2014</strong></td>
<td>&nbsp;Information technology -- Cloud computing -- Reference architecture&nbsp;</td>
<td>&nbsp;ISO/IEC</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/standard/60545.html" target="_blank">ISO - ISO/IEC 17789:2014 - Information technology — Cloud computing — Reference architecture</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 27017:2015</strong></td>
<td>&nbsp;Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services</td>
<td>&nbsp;ISO/IEC</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/standard/43757.html" target="_blank">ISO - ISO/IEC 27017:2015 - Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;CSF Tools</td>
<td>&nbsp;CSF</td>
<td><a rel="noopener noreferrer" href="https://csf.tools/" target="_blank">Welcome to CSF Tools - CSF Tools</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span>Trusted internet connections</span></td>
<td><span>CISA</span></td>
<td><a rel="noopener noreferrer" href="https://www.cisa.gov/tic" target="_blank">TIC | CISA</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Cloud security technical reference architecture</td>
<td>CISA</td>
<td><a rel="noopener noreferrer" href="https://www.cisa.gov/cloud-security-technical-reference-architecture" target="_blank">Cloud Security Technical Reference Architecture | CISA</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span>Cloud Security Alliance</span></td>
<td><span>CISA</span></td>
<td><a rel="noopener noreferrer" href="https://cloudsecurityalliance.org/" target="_blank">Home | CSA (cloudsecurityalliance.org)</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR References"><paragraph
    title="23.1.53."


><![CDATA[<p class="NormS23C2">Relevant PSR requirements can be found at:</p><table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR mandatory requirements</strong></td>
<td>
<p class="NormS5C1">GOV2 - Take a risk-based approach</p>
<p class="NormS5C1">GOV5 - Manage risks when working with others</p>
<p class="NormS5C1">GOV6 - Manage security incidents</p>
<p class="NormS5C1">INFOSEC1 - Understand what you need to protect</p>
<p class="NormS5C1">INFOSEC2 - Design your information security</p>
<p class="NormS5C1">INFOSEC3 - Validate your security measures</p>
INFOSEC4 - Keep your security up to date</td>
<td><a rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/governance/mandatory-requirements/" target="_blank">Mandatory requirements | Protective Security Requirements</a></td>
</tr>
<tr>
<td><strong>PSR protocol for information security</strong></td>
<td>Management protocol for information security</td>
<td><a rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/management-protocol-2/" target="_blank">Management protocol for information security | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Cloud security boundaries"><paragraph
    title="23.1.54.R.01."

    tags="Cloud Computing,Technical,Public cloud security"


><![CDATA[<p>Security boundaries identify the scope of security policy applicability, and determine where <em>data management</em> controls will apply.&nbsp; Refer to <a title="Data Management" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16835">Chapter 20 – Data Management</a>.</p>]]></paragraph>
<paragraph
    title="23.1.54.C.01."

    tags="Cloud Computing,Technical,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7349"
><![CDATA[<p>Agencies MUST clearly identify and understand where classification, security domain, and trust zone boundaries exist <strong>prior</strong> to implementation or adoption of public cloud services.</p>]]></paragraph>
<paragraph
    title="23.1.54.C.02."

    tags="Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7350"
><![CDATA[<p>Where multiple identity systems under different security policies are used to control access to an agency’s instance of a public cloud service, the instance MUST be considered to be in a separate security domain from services where access control is managed solely by the agency’s identity system.</p>]]></paragraph>
</block>
<block title="Shared responsibility model"><paragraph
    title="23.1.55.R.01."

    tags="Cloud Computing,Technical,Public cloud security"


><![CDATA[<p>The responsibility for the selection, implementation, management, and maintenance of controls in public cloud services is shared between the provider and the consumer.  Precisely where the responsibilities lie depends on the provider and the service and deployment models (refer to NIST SP 800-145) used in the delivery of the specific public cloud service.</p>]]></paragraph>
<paragraph
    title="23.1.55.C.01."

    tags="Cloud Computing,Technical,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7353"
><![CDATA[<p>Agencies MUST clearly identify and understand their cloud service provider’s security responsibilities for each service consumed, and the aspects of security that the agency is responsible for, <strong>prior</strong> to implementation or adoption of the service.</p>]]></paragraph>
<paragraph
    title="23.1.55.C.02."

    tags="Cloud Computing,Technical,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7354"
><![CDATA[<p>Agencies SHOULD clearly document the aspects of security they and their provider are responsible for.</p>]]></paragraph>
<paragraph
    title="23.1.55.C.03."

    tags="Cloud Computing,Technical,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7355"
><![CDATA[<p>Agencies SHOULD review existing security processes to ensure compatibility with their cloud service provider’s responsibilities.</p>]]></paragraph>
</block>
<block title="Automation and infrastructure as code"><paragraph
    title="23.1.56.R.01."

    tags="Cloud Computing,Technical,Public cloud security"


><![CDATA[<p>Tools and APIs that generate code used to configure cloud services enable automated deployment and management of resources in a repeatable manner.</p>]]></paragraph>
<paragraph
    title="23.1.56.R.02."

    tags="Cloud Computing,Technical,Public cloud security"


><![CDATA[<p>Infrastructure as code, where resources and their configurations are defined in machine-readable code, can drive automated deployment tools that support software engineering techniques such as version control, continuous integration and deployment, and automated security testing.  In particular, disciplined version control can support the ability to roll back failed changes to the “last known good” configuration as part of agency change control processes.</p>]]></paragraph>
<paragraph
    title="23.1.56.C.01."

    tags="Cloud Computing,Technical,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7359"
><![CDATA[<p>Agencies SHOULD deploy and manage their cloud infrastructure using automation, version control, and infrastructure as code techniques where these are available.</p>]]></paragraph>
</block>
</subsection>
</section>
<section title="23.2. Governance, Risk Assessment &amp; Assurance"><subsection title="Objective"><paragraph
    title="23.2.1."


><![CDATA[<p class="NormS23C2">Agency cloud initiatives follow the risk management, assurance, governance, and control requirements in this manual.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="23.2.2."


><![CDATA[<p class="NormS23C2">Good governance is required to ensure appropriate mechanisms and lines of accountability are in place to understand, assess, document, and manage cloud risks. This section describes the requirements for agencies to identify, respond to, and manage risks relevant to public cloud services.</p>]]></paragraph>
<paragraph
    title="23.2.3."


><![CDATA[<p class="NormS23C2">Reference to other chapters and sections in this document is essential.&nbsp; In particular:</p><ul>
<li><a title="Using cloud services" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Section-12164">Section 2.3 – Using cloud services</a></li>
<li><a title="Roles and Responsibilities" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12255">Chapter 3 – Information security governance – roles and responsibilities</a></li>
<li><a title="System certification and accreditation" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 – System certification and accreditation</a></li>
<li><a title="Information security documentation" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information security documentation</a></li>
<li><a title="Independent assurance reports" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Section-12847">Section 5.8 – Independent assurance reports</a></li>
<li><a title="Information security monitoring" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13001">Chapter 6 – Information security monitoring</a></li>
<li><a title="Information security incidents" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information security incidents</a></li>
<li><a title="Personnel security" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 – Personnel security</a></li>
<li><a title="Access control and passwords" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access control and passwords</a></li>
<li><a title="Cryptography" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a></li>
</ul><p>&nbsp;</p>]]></paragraph>
</block>
<block title="Public cloud services"><paragraph
    title="23.2.4."


><![CDATA[<p class="NormS23C2">Cloud computing affects governance, since it either:</p><ul>
<li>introduces a third party into the process (as in the case of public cloud or hosted private cloud); or</li>
<li>potentially alters internal governance structures (as in the case of self-hosted private cloud).</li>
</ul>]]></paragraph>
<paragraph
    title="23.2.5."


><![CDATA[<p class="NormS23C2">The primary issue to remember when governing cloud computing is that an organisation can never outsource responsibility for governance, even when using external providers. This is always true, cloud or not, but is useful to keep in mind when navigating cloud computing’s concept of shared responsibility.</p>]]></paragraph>
<paragraph
    title="23.2.6."


><![CDATA[<p class="NormS23C2">As with any outsourcing arrangement, agencies bear ultimate responsibility for identifying and managing these risks even if they rely on their cloud service provider to implement mitigating controls.</p>]]></paragraph>
<paragraph
    title="23.2.7."


><![CDATA[<p class="NormS23C2">Cloud services that are hosted or managed from outside New Zealand pose jurisdictional, data sovereignty, and privacy risks. Even when the service is hosted in New Zealand and subject to New Zealand law, an overseas provider may also be subject to its home country’s privacy, data access, and lawful intercept legislation, which may conflict with New Zealand law.</p>]]></paragraph>
<paragraph
    title="23.2.8."


><![CDATA[<p class="NormS23C2">Cloud services that support multiple agencies or All-of-Government capabilities also pose governance and risk management challenges that must be addressed by establishing privacy, security, and compliance policies in order to protect the corporate assets and intellectual property of participating organisations’ data.</p>]]></paragraph>
</block>
<block title="Obligations and responsibilities"><paragraph
    title="23.2.9."


><![CDATA[<p class="NormS23C2">Agencies must be aware of their statutory and regulatory obligations to protect Official, Classified and personal information and data.  Any move to using cloud services cannot allow compromise of these statutory obligations.</p>]]></paragraph>
</block>
<block title="Cloud contracts"><paragraph
    title="23.2.10."


><![CDATA[<p class="NormS23C2">Cloud contracts should consider data stewardship, data sovereignty, jurisdiction, storage and access, including any backups.  It remains, however, the responsibility of individual agencies to ensure their legislative and regulatory responsibilities for data stewardship are met.</p>]]></paragraph>
<paragraph
    title="23.2.11."


><![CDATA[<p class="NormS23C2">As with any outsourcing arrangement, use of cloud services carries the risk of the provider going out of business or otherwise being unable to provide contracted services to the consuming agency. This is a commercial risk that technical security controls cannot address, but one agencies need to consider as part of their due diligence.</p>]]></paragraph>
<paragraph
    title="23.2.12."


><![CDATA[<p class="NormS23C2">It is essential that appropriate legal advice is taken before any cloud contracts are finalised.</p>]]></paragraph>
</block>
<block title="Regular assurance checks"><paragraph
    title="23.2.13."


><![CDATA[<p class="NormS23C2">Changes made to a cloud tenancy may have an adverse impact on the security posture of an agency’s cloud service configuration. Usually, in such circumstances (e.g., if the change was initiated by the agency on-site) this may trigger the commencement of the certification and accreditation process. In addition, changes would usually be subject to approval, review, and testing, as part of an agency’s IT change control process. However, this may not be the case in a cloud environment, as platform changes are made by the cloud service provider and may occur with minimal or no notice (see <a href="http://nzism.gcsb.govt.nz/ism-document#Section-12847">section 5.8 – Independent assurance reports</a>).</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="23.2.14."


><![CDATA[<p class="NormS23C2">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Cloud computing security for tenants</td>
<td>Australian Cyber Security Centre (ACSC)</td>
<td><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/cloud-computing-security-tenants" target="_blank">Cloud Computing Security for Tenants | Cyber.gov.au</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>CCMv4.0 auditing guidelines</td>
<td>CSA</td>
<td><a rel="noopener noreferrer" href="https://cloudsecurityalliance.org/artifacts/ccm-v4-0-auditing-guidelines/" target="_blank">CCMv4.0 Auditing Guidelines | CSA (cloudsecurityalliance.org)</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>CSA Security Guidance for Critical Areas of Focus in Cloud Computing</td>
<td>&nbsp;CSA</td>
<td><a rel="noopener noreferrer" href="https://cloudsecurityalliance.org/research/guidance/" target="_blank">CSA Security Guidance for Cloud Computing | CSA (cloudsecurityalliance.org)</a><a href="https://cloudsecurityalliance.org/artifacts/ccm-v4-0-auditing-guidelines/"></a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Cloud computing — information security and privacy considerations</td>
<td>Digital.govt.nz</td>
<td><a rel="noopener noreferrer" href="https://www.digital.govt.nz/dmsdocument/1~cloud-computing-information-security-and-privacy-considerations/html#appendix-b--additional-resources" target="_blank">Cloud computing information security and privacy considerations | NZ Digital government</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>About public cloud services</td>
<td><span>Digital.govt.nz</span></td>
<td><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/about/" target="_blank">About public cloud services | NZ Digital government</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Secure cloud strategy</td>
<td>Australian Government</td>
<td><a rel="noopener noreferrer" href="https://www.dta.gov.au/our-projects/secure-cloud-strategy" target="_blank">Secure Cloud Strategy | Digital Transformation Agency (dta.gov.au)</a></td>
</tr>
<tr>
<td><strong>NIST SP 500-291 (2011)</strong></td>
<td>NIST cloud computing standards roadmap</td>
<td>NIST</td>
<td><a rel="noopener noreferrer" href="https://www.nist.gov/publications/nist-sp-500-291-nist-cloud-computing-standards-roadmap" target="_blank">NIST-SP 500-291, NIST Cloud Computing Standards Roadmap | NIST</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR References"><paragraph
    title="23.2.15."


><![CDATA[<p class="NormS23C2">Relevant PSR requirements can be found at:</p><table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR mandatory requirements</strong></td>
<td>
<p class="NormS5C1">GOV2 - Take a risk-based approach</p>
<p class="NormS5C1">GOV5 - Manage risks when working with others</p>
<p class="NormS5C1">GOV6 - Manage security incidents</p>
<p class="NormS5C1">INFOSEC1 - Understand what you need to protect</p>
<p class="NormS5C1">INFOSEC2 - Design your information security</p>
<p class="NormS5C1">INFOSEC3 - Validate your security measures</p>
INFOSEC4 - Keep your security up to date</td>
<td><a href="https://www.protectivesecurity.govt.nz/governance/mandatory-requirements/">Mandatory requirements | Protective Security Requirements</a></td>
</tr>
<tr>
<td><strong>PSR protocol for information security</strong></td>
<td>Management protocol for information security</td>
<td><a href="https://www.protectivesecurity.govt.nz/information-security/management-protocol-2/">Management protocol for information security | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Understanding levels of assurance for public cloud"><paragraph
    title="23.2.16.R.01."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


><![CDATA[<p class="S23C1-R-6">Although roles and responsibilities for public cloud services may be shared between an agency and the cloud service provider, ultimately an agency owns security risks and is responsible for all ICT services their agency consumes, including public cloud services.</p>]]></paragraph>
<paragraph
    title="23.2.16.R.02."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


><![CDATA[<p class="S23C1-R-6">It is an agency’s responsibility to ensure that cloud service providers have adequate safeguards in place to address security risks specific to their public cloud instance.</p>]]></paragraph>
<paragraph
    title="23.2.16.R.03."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


><![CDATA[<p class="S23C1-R-6">Adoption of public cloud services introduce risks to agency systems that need to be identified, assessed, and formally accepted in order to understand the appropriate use of public cloud services and select effective controls and countermeasures.</p>]]></paragraph>
<paragraph
    title="23.2.16.C.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7386"
><![CDATA[<p>Agencies MUST update their risk assessment process to account for public cloud specific risks, prior to implementation or adoption of public cloud services.</p>]]></paragraph>
<paragraph
    title="23.2.16.C.02."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7387"
><![CDATA[<p>Agencies MUST undertake a cloud specific risk assessment in line with the process outlined by the GCDO for each public cloud service, prior to implementation or adoption of public cloud services.</p>]]></paragraph>
<paragraph
    title="23.2.16.C.03."

    tags="Cloud Computing,Governance,Accreditation,Public cloud security"


    classification="Secret, Top Secret, Confidential"
    compliance="Must Not"
    cid="7388"
><![CDATA[<p>Agencies MUST NOT accredit public cloud services for use with data classified CONFIDENTIAL, SECRET, or TOP SECRET.</p>]]></paragraph>
<paragraph
    title="23.2.16.C.04."

    tags="Cloud Computing,Governance,Accreditation,Public cloud security"


    classification="All Classifications"
    compliance="Must Not"
    cid="7389"
><![CDATA[<p>Agencies MUST NOT accredit public cloud services to host, process, store, or transmit NZEO endorsed information.</p>]]></paragraph>
</block>
<block title="System availability"><paragraph
    title="23.2.17.R.01."

    tags="Cloud Computing,Governance,Public cloud security"


><![CDATA[<p>It is important that connectivity between an organisation and their cloud service providers meets requirements for latency and reliability. In support of this, an organisation and their cloud service providers should discuss any specific network requirements, performance characteristics, or planned responses to availability failures, especially when high-availability requirements exist.</p>]]></paragraph>
<paragraph
    title="23.2.17.R.02."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


><![CDATA[<p class="NormS17C2"><span>An organisation and their cloud service providers should discuss whether dedicated communication links or connections over the internet will be used and whether any secondary communications links will provide sufficient capacity to meet operational requirements should the primary communication link become unavailable. </span></p>]]></paragraph>
<paragraph
    title="23.2.17.R.03."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


><![CDATA[<p class="NormS17C2"><span>Feedback should be provided to cloud service providers when performance does not meet service level agreement targets. To assist with this, anomaly detection can be performed through network telemetry that is integrated into security monitoring tools.</span></p>]]></paragraph>
<paragraph
    title="23.2.17.C.01."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7394"
><![CDATA[<p>Agencies MUST consider risks to the availability of systems and information in their design of cloud systems architectures, supporting controls, and governance processes prior to implementation or adoption of public cloud services.</p>]]></paragraph>
</block>
<block title="Regular assurance checks"><paragraph
    title="23.2.18.R.01."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


><![CDATA[<p>Cloud service providers should conduct independent assurance activities as part of their due diligence and to provide customers with evidence of quality service provision and compliance. It is important that such assurance activities are undertaken by an assessor with the appropriate expertise to validate the existence and performance of security controls.</p>]]></paragraph>
<paragraph
    title="23.2.18.C.01."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Should"
    cid="7397"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies SHOULD obtain regular assurance checks on cloud service providers, ensuring they have been undertaken by a suitably qualified assessor.</span></p>]]></paragraph>
</block>
<block title="Cloud service providers – patching and software maintenance"><paragraph
    title="23.2.19.R.01."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security,Assurance"


><![CDATA[<p class="NormS17C2"><span>Data transmitted, stored, and processed off site presents a risk to an organisation. This includes reliance on a cloud service provider to not only identify software vulnerabilities, but to apply these in a timely manner, as well providing evidence to an agency of this.</span></p>]]></paragraph>
<paragraph
    title="23.2.19.C.01."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7400"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST obtain assurance that cloud service providers undertake appropriate software and operating system patching and maintenance.</span></p>]]></paragraph>
</block>
<block title="Assurance around workload isolation on shared infrastructure"><paragraph
    title="23.2.20.R.01."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


><![CDATA[<p class="Normal-nonumbering">Responsibilities for workload isolation in public cloud are shared between the cloud provider and consumer.  Workload isolation in a public cloud security context ensures compute processes or memory in one virtual machine/container are not visible to another tenant, even when they are running processes on the same physical hardware.</p>]]></paragraph>
<paragraph
    title="23.2.20.R.02."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


><![CDATA[<p class="Normal-nonumbering"><span>To mitigate the risk of unauthorised access between resources in separate tenancies, it is important that adequately architected security controls are built into the design. Examples of adequate security controls include zero touch configuration and separation of administrative control interfaces. </span></p>]]></paragraph>
<paragraph
    title="23.2.20.C.01."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7404"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST obtain assurance that technical protections exist to adequately isolate tenants.</span></p>]]></paragraph>
</block>
<block title="Use of baseline security templates"><paragraph
    title="23.2.21.R.01."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


><![CDATA[<p class="Normal-nonumbering"><span>GCSB endorsed NZISM baseline security templates are intended to assist agencies in understanding the security posture of their cloud environments. They provide a baseline level of security within a cloud environment to significantly reduce agency’s assurance activities and focus then on moving towards continuous security posture assessments. </span></p>]]></paragraph>
<paragraph
    title="23.2.21.C.01."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Should"
    cid="7407"
><![CDATA[<p>Agencies SHOULD make use of the GCSB endorsed baseline security templates where applicable.  </p>]]></paragraph>
</block>
</subsection>
</section>
<section title="23.3. Identity Management and Access Control"><subsection title="Objective"><paragraph
    title="23.3.1."


><![CDATA[<p class="NormS23C3">Identities used for public cloud services are managed, protected, and consistently used to form a secure basis for controlling access to resources.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="23.3.2."


><![CDATA[<p class="NormS23C3">This section is primarily concerned with the management of identities used to access or administer public cloud services.</p>]]></paragraph>
<paragraph
    title="23.3.3."


><![CDATA[<p class="NormS23C3">Identities that interact with cloud platform management portals and application programming interfaces (APIs) to create, view, modify, or delete resources are considered privileged users in the context of public cloud.</p>]]></paragraph>
<paragraph
    title="23.3.4."


><![CDATA[<p class="NormS23C3">Concepts used in this section related to identification management include:</p><ol style="list-style-type: lower-alpha;">
<li>Identity providers</li>
<li>Relying parties</li>
<li>Credentials,  and identity information used in authentication</li>
<li>Policy decision points and policy enforcement points</li>
</ol><p class="NormS23C3">These concepts are described in ISO/IEC IT Security and Privacy framework for identity management (ISO/IEC 24760-1:2019) and framework for access management (ISO/IEC 29146:2016).</p>]]></paragraph>
<paragraph
    title="23.3.5."


><![CDATA[<p class="NormS23C3">Reference to other chapters and sections in this document is essential.&nbsp; In particular:</p><ul>
<li><a title="Using cloud services" href="http://nzism.gcsb.govt.nz/ism-document#Section-12164">Section 2.3 – Using cloud services</a></li>
<li><a title="Access controls and passwords" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access control and passwords</a></li>
<li><a title="System access and passwords" href="http://nzism.gcsb.govt.nz/ism-document#Section-15483">Section 16.2 – System access and passwords</a></li>
<li><a title="Privileged user access" href="http://nzism.gcsb.govt.nz/ism-document#Section-15503">Section 16.3 – Privileged user access</a></li>
<li><a title="Privileged access management" href="http://nzism.gcsb.govt.nz/ism-document#Section-15526">Section 16.4 – Privileged access management</a></li>
<li><a title="Multi-factor authentication" href="http://nzism.gcsb.govt.nz/ism-document#Section-15681">Section 16.7 – Multi-factor authentication</a></li>
</ul>]]></paragraph>
</block>
<block title="Overview"><paragraph
    title="23.3.6."


><![CDATA[<p class="NormS23C3">Public cloud services introduce new areas of risk associated with the management of identity and access, including:</p><ol style="list-style-type: lower-alpha;">
<li>Separation between identity providers and relying parties, with differing standards and capabilities for authentication, assignment of privileges, and access provisioning/deprovisioning.</li>
<li>Ubiquitous access to public cloud services, and in particular cloud administration services, from the internet.</li>
<li>The decoupling of the authentication and authorisation steps as part of access control (i.e., separation of the identity provider and the policy decision point/policy enforcement point).</li>
</ol>]]></paragraph>
<paragraph
    title="23.3.7."


><![CDATA[<p class="NormS23C3">This section highlights controls agencies can use to manage these cloud identity and access management risks and move towards a Zero Trust approach to information security.</p>]]></paragraph>
</block>
<block title="Public cloud identity providers"><paragraph
    title="23.3.8."


><![CDATA[<p class="NormS23C3">There are three models of identity management commonly used with public cloud services:</p><ol>
<li>Cloud accounts based on identities and authentication from other services or systems using identity federation (such as SAML V2.0 or OpenID Connect).</li>
<li>Cloud identities synchronised from an existing identity system.</li>
<li>Cloud identities directly provisioned in local cloud service identity stores, either manually or through automation following a standard specification such as the System for Cross-domain Identity Management (SCIM).</li>
</ol>]]></paragraph>
<paragraph
    title="23.3.9."


><![CDATA[<p class="NormS23C3">Due to the differing standards and capabilities offered by both identity providers and relying parties a combination of identity management models may be required to support the use of public cloud services.</p>]]></paragraph>
<paragraph
    title="23.3.10."


><![CDATA[<p class="NormS23C3">Cloud-based identities may be issued and authenticated by different identity providers, each offering their own levels of assurance and receiving their own levels of trust from the identity consumer.</p>]]></paragraph>
<paragraph
    title="23.3.11."


><![CDATA[<p class="NormS23C3">Identity providers are privileged entities that must prove a chain of trust, for example by strong cryptographic signing of authentication responses, to prevent a malicious actor tampering with authentication traffic as it passes between the provider and the relying party.</p>]]></paragraph>
</block>
<block title="Public cloud access policy enforcement"><paragraph
    title="23.3.12."


><![CDATA[<p class="NormS23C3">Once an entity is authenticated, access control mechanisms determine what authorised actions are able to be performed and what resources can be interacted with.</p>]]></paragraph>
<paragraph
    title="23.3.13."


><![CDATA[<p class="NormS23C3">Many cloud based system follow Zero Trust principles for access control, with access control determined by a combination of the cloud service’s policy decision points and policy enforcement points.</p>]]></paragraph>
<paragraph
    title="23.3.14."


><![CDATA[<p class="NormS23C3">The separation between the authentication and authorisation steps introduces the opportunity for unauthorised access to occur, through:</p><ol style="list-style-type: lower-alpha;">
<li>Misconfigured mapping between attributes asserted by the authentication provider and their use by the authorisation system.</li>
<li>Impersonation of authorised users through mimicking the authentication service assertions to the authorisation system.</li>
<li>Delays between a user being removed from the authentication system and re-authentication occurring.</li>
</ol>]]></paragraph>
<paragraph
    title="23.3.15."


><![CDATA[<p class="NormS23C3">The use of cloud services provides the opportunity to move from purely role-based access control (RBAC) to incorporating more attributes (than just role definitions) as part of attribute-based access control decisions (ABAC).</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="23.3.16."


><![CDATA[<p class="NormS23C3">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;Identification management</td>
<td>&nbsp;GCDO</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/identification-management/" target="_blank">Identification management | NZ Digital government</a></td>
</tr>
<tr>
<td><strong>NIST SP-800-210 (2020)&nbsp;</strong></td>
<td>&nbsp;General access control guidance for cloud systems&nbsp;</td>
<td>&nbsp;NIST</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://www.nist.gov/publications/general-access-control-guidance-cloud-systems" target="_blank">General Access Control Guidance for Cloud Systems | NIST</a></td>
</tr>
<tr>
<td><strong>OpenID Connect&nbsp;</strong></td>
<td>&nbsp;Welcome to OpenID Connect</td>
<td>&nbsp;<span>OpenID</span></td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://openid.net/connect/" target="_blank">OpenID Connect | OpenID</a></td>
</tr>
<tr>
<td><strong>SAML V2.0</strong></td>
<td>&nbsp;SAML Wiki</td>
<td>&nbsp;OASIS Open</td>
<td>&nbsp;FrontPage - SAML Wiki (oasis-open.org)</td>
</tr>
<tr>
<td><strong>RFC 7642&nbsp;</strong></td>
<td>&nbsp;System for Cross-domain Identity Management: Definitions, Overview, Concepts, and Requirements</td>
<td>&nbsp;<span>IETF</span></td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc7642/" target="_blank">RFC 7642 - System for Cross-domain Identity Management: Definitions, Overview, Concepts, and Requirements (ietf.org)</a></td>
</tr>
</tbody>
</table><p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="PSR References"><paragraph
    title="23.3.17."


><![CDATA[<p class="NormS23C3">Relevant PSR requirements can be found at:</p><table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR mandatory requirements</strong></td>
<td>
<p class="NormS5C1">GOV2 - Take a risk-based approach</p>
<p class="NormS5C1">GOV5 - Manage risks when working with others</p>
<p class="NormS5C1">GOV6 - Manage security incidents</p>
<p class="NormS5C1">INFOSEC1 - Understand what you need to protect</p>
<p class="NormS5C1">INFOSEC2 - Design your information security</p>
<p class="NormS5C1">INFOSEC3 - Validate your security measures</p>
INFOSEC4 - Keep your security up to date</td>
<td><a href="https://www.protectivesecurity.govt.nz/governance/mandatory-requirements/">Mandatory requirements | Protective Security Requirements</a></td>
</tr>
<tr>
<td><strong>PSR protocol for information security</strong></td>
<td>Management protocol for information security</td>
<td><a href="https://www.protectivesecurity.govt.nz/information-security/management-protocol-2/">Management protocol for information security | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Privileged account separation"><paragraph
    title="23.3.18.R.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


><![CDATA[<p class="NormS17C2"><span>Separating administrative accounts between environments (for example cloud and on-premise) reduces the risk of a compromise in one laterally spreading to the other.</span></p>]]></paragraph>
<paragraph
    title="23.3.18.C.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7433"
><![CDATA[<p class="Normal-nonumbering"><span>Accounts used to perform privileged actions SHOULD NOT be synchronised between environments.</span></p>]]></paragraph>
</block>
<block title="Username and passwords"><paragraph
    title="23.3.19.R.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


><![CDATA[<p class="NormS17C2">Credentials used to access public cloud services can be reused across cloud service providers, and are at risk of discovery or being easily guessed.&nbsp; Due to these services being directly accessible from the internet, authentication should not rely on a single factor for standard users, and must not for privileged users. Refer to <a title="Privileged access management" href="http://nzism.gcsb.govt.nz/ism-document#Section-15526">section 16.4 Privileged Access Management (PAM)</a>.</p>]]></paragraph>
<paragraph
    title="23.3.19.C.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7436"
><![CDATA[<p class="Normal-nonumbering"><span>Where administration interfaces or portals are accessible from the internet, privileged accounts MUST be configured to use multiple factors of authentication.</span></p>]]></paragraph>
<paragraph
    title="23.3.19.C.02."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7437"
><![CDATA[<p class="Normal-nonumbering"><span>Where cloud service interfaces or portals are accessible from the internet, user accounts SHOULD be configured to use multiple factors of authentication.</span></p>]]></paragraph>
</block>
<block title="Offboarding"><paragraph
    title="23.3.20.R.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


><![CDATA[<p class="NormS17C2">Public cloud services often rely on a Zero Trust approach to security where policy decision and policy enforcement points are used to control access based on authentication and privilege assignments.  Timely removal of user access is essential to ensure unauthorised access to cloud services does not occur from former staff.</p>]]></paragraph>
<paragraph
    title="23.3.20.C.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7440"
><![CDATA[<p class="Normal-nonumbering"><span>Staff offboarding processes MUST be updated to include removing all access to public cloud based services, prior to implementation or adoption of public cloud services.</span></p>]]></paragraph>
</block>
<block title="Authentication"><paragraph
    title="23.3.21.R.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


><![CDATA[<p class="NormS17C2"><span>Identity providers are privileged entities that must prove a chain of trust to prevent a malicious actor tampering with authentication traffic as it passes between the provider and the relying party.</span></p>]]></paragraph>
<paragraph
    title="23.3.21.C.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7443"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST ensure that relying parties continually verify the authenticity of their identity provider’s responses, through for example, cryptographic signing of authentication requests and responses.</span></p>]]></paragraph>
</block>
<block title="Relying parties"><paragraph
    title="23.3.22.R.01."

    tags="Assurance"


><![CDATA[<p>Cloud provider authentication services often provide additional information attributes to relying parties to inform authentication and access control decisions.  These attributes may include information such as the individual’s local time of day, the status of their device (including if it has been successfully used before), or their location.</p>]]></paragraph>
<paragraph
    title="23.3.22.C.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7446"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies SHOULD ensure that relying parties use all available information from the identity provider to inform access control decisions.</span></p>]]></paragraph>
</block>
</subsection>
</section>
<section title="23.4. Data Protection in Public Cloud"><subsection title="Objective"><paragraph
    title="23.4.1."


><![CDATA[<p class="NormS23C4">Data is protected throughout its lifecycle on public cloud platforms.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="23.4.2."


><![CDATA[<p class="NormS23C4">This section provides information on keeping data in a public cloud environment secure from creation to destruction, whether at rest, in-transit, during processing, or when it is no longer required.</p>]]></paragraph>
<paragraph
    title="23.4.3."


><![CDATA[<p class="NormS23C4">Key considerations for keeping agency data secure in public cloud are that data is stored and processed on systems that:</p><ul>
<li>Are not under direct agency control.</li>
<li>Are designed to be potentially accessible from anywhere.</li>
<li>Can be accessed by multiple end-point devices.</li>
<li>May replicate the data to multiple locations.</li>
</ul>]]></paragraph>
<paragraph
    title="23.4.4."


><![CDATA[<p class="NormS23C4">Where these systems are located outside New Zealand, or a New Zealand-based service is provided by an entity subject to another country’s laws, there may be additional jurisdictional risks to privacy and sovereignty to consider.</p>]]></paragraph>
<paragraph
    title="23.4.5."


><![CDATA[<p class="NormS23C4">Reference to other chapters and sections in this document is essential.&nbsp; In particular:</p><ul>
<li><a title="Business continuity and disaster recovery" href="http://nzism.gcsb.govt.nz/ism-document#Section-13074">Section 6.4 – Business continuity and disaster recovery</a></li>
<li><a title="System Decommissioning" href="http://nzism.gcsb.govt.nz/ism-document#Section-14679">Section 13.1– System decommissioning</a></li>
<li><a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a></li>
<li><a title="Network security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16188">Chapter 18 – Network security</a></li>
<li><a title="Data management" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16835">Chapter 20 – Data management</a></li>
<li><a title="Distributed working" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-17003">Chapter 21 – Distributed working</a></li>
<li><a title="Governance, Risk Assessment &amp; Assurance" href="http://nzism.gcsb.govt.nz/ism-document#Section-17478">Chapter 23.2 - Public cloud services - Governance, risk assessment and assurance</a></li>
</ul>]]></paragraph>
</block>
<block title="Data accessibility"><paragraph
    title="23.4.6."


><![CDATA[<p class="NormS23C4">Public cloud services are often promoted for their ability to make organisations’ data assets more accessible, both within the organisation and to partners or customers. This benefit also brings risks such as default accessibility from the internet and requires agencies to carefully manage access to data.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="23.4.7."


><![CDATA[<p class="NormS23C4">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title&nbsp;</strong></td>
<td><strong>Publisher&nbsp;</strong></td>
<td><strong>&nbsp;Source</strong></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>&nbsp;Cloud security technical reference architecture</td>
<td>&nbsp;CISA</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://www.cisa.gov/cloud-security-technical-reference-architecture" target="_blank">Cloud Security Technical Reference Architecture | CISA</a></td>
</tr>
<tr>
<td><strong>&nbsp;ISO 27001:2013</strong></td>
<td>&nbsp;Information technology — Security techniques — Information security management systems — Requirements</td>
<td>&nbsp;ISO</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">ISO - ISO/IEC 27001:2013 - Information technology — Security techniques — Information security management systems — Requirements</a></td>
</tr>
<tr>
<td><strong>&nbsp;NIST SP 800-144 (2011)</strong></td>
<td>&nbsp;Guidelines on security and privacy in public cloud computing&nbsp;</td>
<td>&nbsp;NIST</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://www.nist.gov/publications/guidelines-security-and-privacy-public-cloud-computing" target="_blank">Guidelines on Security and Privacy in Public Cloud Computing | NIST</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR References"><paragraph
    title="23.4.8."


><![CDATA[<p class="NormS23C4">Relevant PSR requirements can be found at:</p><table class="table-grey">
<tbody>
<tr>
<td><strong>Reference </strong></td>
<td><strong>Title </strong></td>
<td><strong>Source </strong></td>
</tr>
<tr>
<td><strong> PSR mandatory requirements</strong></td>
<td> GOV2 - Take a risk-based approach
<p class="NormS5C1">GOV5 - Manage risks when working with others</p>
<p class="NormS5C1">GOV6 - Manage security incidents</p>
<p class="NormS5C1">INFOSEC1 - Understand what you need to protect</p>
<p class="NormS5C1">INFOSEC2 - Design your information security</p>
<p class="NormS5C1">INFOSEC3 - Validate your security measures</p>
INFOSEC4 - Keep your security up to date</td>
<td> <a href="https://www.protectivesecurity.govt.nz/governance/mandatory-requirements/">Mandatory requirements | Protective Security Requirements</a></td>
</tr>
<tr>
<td><strong> PSR protocol for information security</strong></td>
<td> Management protocol for information security</td>
<td> <a href="https://www.protectivesecurity.govt.nz/information-security/management-protocol-2/">Management protocol for information security | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Data protection mechanisms"><paragraph
    title="23.4.9.R.01."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


><![CDATA[<p class="NormS17C2"><span>Agencies remain accountable for the confidentiality, integrity, and availability of their data, even though cloud service providers may define and implement the mechanisms used to protect their data in the cloud environment.</span></p>]]></paragraph>
<paragraph
    title="23.4.9.R.02."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


><![CDATA[<p class="Normal-nonumbering"><span>The mechanisms available for agency control and management of keys in a public cloud environment are often tied to a specific cloud environment and migrating data to a new environment may require decryption and re-encryption.</span></p>]]></paragraph>
<paragraph
    title="23.4.9.C.01."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7461"
><![CDATA[<p class="Normal-nonumbering"><span>For each cloud service, agencies MUST ensure that the mechanisms used to protect data meet agency requirements.</span></p>]]></paragraph>
<paragraph
    title="23.4.9.C.02."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7462"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST update key management plans to account for differences in public cloud before storing organisational data in a public cloud environment.</span></p>]]></paragraph>
<paragraph
    title="23.4.9.C.03."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7463"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST ensure their key management plan includes provision for migrating data from the cloud environment where it was created.</span></p>]]></paragraph>
</block>
<block title="Data accessibility"><paragraph
    title="23.4.10.R.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


><![CDATA[<p>Many public cloud services are designed to make customer data directly accessible through multiple interfaces. These service endpoints may be internet-accessible by default, and will have specific mechanisms that restrict access to authorised parties. Failure to consider these endpoints or to control their default accessibility risks exposure of agency information to unauthorised parties.</p>]]></paragraph>
<paragraph
    title="23.4.10.C.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7466"
><![CDATA[<p>Agencies MUST apply the principle of least privilege and configure service endpoints to restrict access to authorised parties.</p>]]></paragraph>
</block>
<block title="Data location"><paragraph
    title="23.4.11.R.01."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


><![CDATA[<p>The geographic locations where public cloud data is stored may have security or privacy implications for agencies. These locations may be in jurisdictions with differing laws from New Zealand or be subject to particular environmental risks that agencies have not previously had to consider. While these factors do not of themselves prevent placing agency data in such locations, agencies have a responsibility to fully understand where their data is stored or processed and to manage any resulting risks appropriately.</p>]]></paragraph>
<paragraph
    title="23.4.11.C.01."

    tags="Cloud Computing,Data Management,Governance,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7469"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST identify where data used in conjunction with a public cloud service is stored or processed, including any replicas or backups that may be created.</span></p>]]></paragraph>
<paragraph
    title="23.4.11.C.02."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7470"
><![CDATA[<p>Agency risk assessments of public cloud services MUST include any risks arising from data location. Any actions required to mitigate these risks must be identified and documented prior to implementation or adoption of public cloud services.</p>]]></paragraph>
</block>
<block title="Revise disaster recovery plans to include data in public cloud"><paragraph
    title="23.4.12.R.01."

    tags="Cloud Computing,Data Management,Governance,Business Continuity,Public cloud security"


><![CDATA[<p>As specified in Section 6.4, Business continuity and disaster recovery, agencies must plan for recovery from loss of data to ensure they can continue to operate. Public cloud services can provide alternative mechanisms to back up and restore data from those used on premises.  Recovery processes and plans may need to be updated to account for these differences to avoid agencies finding their ability to recover from data loss is compromised.</p>]]></paragraph>
<paragraph
    title="23.4.12.R.02."

    tags="Cloud Computing,Data Management,Governance,Business Continuity,Public cloud security"


><![CDATA[<p>As well as protecting data stored natively in public cloud services, agencies may choose to back up on-premises data to the cloud or vice versa. The same considerations and opportunities for new approaches apply in all these cases.</p>]]></paragraph>
<paragraph
    title="23.4.12.C.01."

    tags="Cloud Computing,Data Management,Governance,Business Continuity,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7474"
><![CDATA[<p>Agencies MUST update their disaster recovery plans prior to storing or replicating data in public cloud services, to ensure these plans address any cloud-specific aspects of backup and recovery.</p>]]></paragraph>
<paragraph
    title="23.4.12.C.02."

    tags="Cloud Computing,Data Management,Governance,Business Continuity,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7475"
><![CDATA[<p>When planning tests of disaster recovery processes in accordance with <a title="Backup strategy" href="http://nzism.gcsb.govt.nz/ism-document#Block-13088">6.4.6&nbsp;Backup strategy</a>, agencies MUST include tests of any cloud-specific data recovery processes.</p>]]></paragraph>
</block>
<block title="Data retrieval and removal"><paragraph
    title="23.4.13.R.01."

    tags="Cloud Computing,Data Management,Governance,Public cloud security"


><![CDATA[<p class="NormS17C2">It is important to consider what would be involved in leaving or changing the provider of a public cloud service.  Planning for ending the use of a cloud service should be done before commissioning and deployment of data into the cloud.  </p>]]></paragraph>
<paragraph
    title="23.4.13.R.02."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


><![CDATA[<p>Terminating cloud service contracts can have undesired consequences and risks for an agency if a managed process is not followed, for example:</p><ul>
<li>All or some agency data being retained on the cloud platform by the provider.</li>
<li>Agency data being removed prior to being retrieved by the agency.</li>
<li>Agency data being replicated to other jurisdictions before or after decommissioning.</li>
</ul>]]></paragraph>
<paragraph
    title="23.4.13.C.01."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7511"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST have a defined exit strategy for each public cloud service they consume, including a process by which their data can be retrieved and erased from the cloud service as part of contract termination.</span></p>]]></paragraph>
<paragraph
    title="23.4.13.C.02."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7512"
><![CDATA[<p>Agencies MUST ensure all data they need to retain is retrieved from the cloud service provider prior to decommissioning.</p>]]></paragraph>
<paragraph
    title="23.4.13.C.03."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7513"
><![CDATA[<p class="NormS17C2"><span>Agencies MUST have assurance that no agency-owned data is retained on the cloud service being decommissioned.</span></p>]]></paragraph>
</block>
</subsection>
</section>
<section title="23.5. Logging and Alerting in Public Cloud"><subsection title="Objective"><paragraph
    title="23.5.1."


><![CDATA[<p class="NormS23C5">Security-related events are recorded from across an agency’s public cloud platforms and are able to be analysed for timely notification of potential threats or incidents.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="23.5.2."


><![CDATA[<p class="NormS23C5">This section describes the requirements for capturing security-related information from public cloud services by examining electronic logs for indications that unauthorised security-related activities have been attempted or performed.</p>]]></paragraph>
<paragraph
    title="23.5.3."


><![CDATA[<p class="NormS23C5">&nbsp;Reference to other chapters and sections in this document is essential.&nbsp; In particular:</p><ul>
<li><a title="Detecting information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Section-13098">Section 7.1 – Detecting information security incidents</a></li>
<li><a title="Event logging and auditing" href="http://nzism.gcsb.govt.nz/ism-document#Section-15629">Section 16.6 – Event logging and auditing</a></li>
</ul>]]></paragraph>
</block>
<block title="Logging"><paragraph
    title="23.5.4."


><![CDATA[<p class="NormS23C5">Appropriate ongoing logging is vital for detecting threat actor activity occurring within agency public cloud environments.</p>]]></paragraph>
<paragraph
    title="23.5.5."


><![CDATA[<p class="NormS23C5">Public cloud introduces particular aspects of logging that agencies must consider, including:</p><ul>
<li>Responsibility for logging and detecting anomalies is shared between the agency and its cloud service provider.</li>
<li>Cloud services may introduce differences in what information is able to be logged, where it can be logged, and in what format the log messages are constructed.  It may not be possible for the consuming agency to customise logging parameters.</li>
<li>Key security components used by cloud services may be sourced from multiple providers (e.g., identity federation or SaaS integration). Effective log monitoring and incident investigation requires these logs to be accessible and be able to be correlated with each other.</li>
<li>Some components of the environment where logs are traditionally collected may not be available in cloud environments (e.g., network traffic or boundary devices), or the information may need to be collected in different ways.</li>
<li>Only a subset of log information may be able to be exported from a cloud environment due to technical or cost implications.</li>
</ul>]]></paragraph>
<paragraph
    title="23.5.6."


><![CDATA[<p class="NormS23C5">Agencies running across multiple clouds or running a hybrid of public cloud and on premise infrastructure must also balance the advantages of platform-specific capabilities against the need for centralised visibility. Centralised visibility does not necessarily require centralised log aggregation, but agencies must be able to track and correlate activity across all the log sources available to them.</p>]]></paragraph>
</block>
<block title="Alerting"><paragraph
    title="23.5.7."


><![CDATA[<p>While logging is vital for detecting threat actor activity occurring across agency public cloud systems, in isolation it does not provide a detection capability and must be paired with appropriate analysis and alerting tools.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="23.5.8."


><![CDATA[<p class="NormS23C5">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>CSA Security Guidance for Critical Areas of Focus in Cloud Computing</td>
<td>CSA</td>
<td><a rel="noopener noreferrer" href="https://cloudsecurityalliance.org/research/guidance/" target="_blank">CSA Security Guidance for Cloud Computing | CSA (cloudsecurityalliance.org)</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR References"><paragraph
    title="23.5.9."


><![CDATA[<p class="NormS23C5">Relevant PSR requirements can be found at:</p><table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR mandatory requirements</strong></td>
<td>
<p class="NormS5C1">GOV2 - Take a risk-based approach</p>
<p class="NormS5C1">GOV5 - Manage risks when working with others</p>
<p class="NormS5C1">GOV6 - Manage security incidents</p>
<p class="NormS5C1">INFOSEC1 - Understand what you need to protect</p>
<p class="NormS5C1">INFOSEC2 - Design your information security</p>
<p class="NormS5C1">INFOSEC3 - Validate your security measures</p>
INFOSEC4 - Keep your security up to date</td>
<td><a href="https://www.protectivesecurity.govt.nz/governance/mandatory-requirements/">Mandatory requirements | Protective Security Requirements</a></td>
</tr>
<tr>
<td><strong>PSR protocol for information security</strong></td>
<td>Management protocol for information security</td>
<td><a href="https://www.protectivesecurity.govt.nz/information-security/management-protocol-2/">Management protocol for information security | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Logging public cloud events"><paragraph
    title="23.5.10.R.01."

    tags="Cloud Computing,Governance,Public cloud security,Event Logging"


><![CDATA[<p class="NormS17C2"><span>Logging capabilities and shared responsibility models for log collection, storage, and retention differ between public cloud providers. The division of responsibility may also vary across different deployment models and the individual services within a cloud platform.</span></p>]]></paragraph>
<paragraph
    title="23.5.10.C.01."

    tags="Cloud Computing,Governance,Public cloud security,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="7494"
><![CDATA[<p>Agencies MUST understand the range of logging capabilities provided by their cloud service providers and determine whether they are sufficient for agency needs.</p>]]></paragraph>
</block>
<block title="Logging requirements"><paragraph
    title="23.5.11.R.01."

    tags="Cloud Computing,Governance,Public cloud security,Event Logging"


><![CDATA[<p class="NormS17C2"><span>It may not be possible, or desirable, to centralise all public cloud log information into a single protected repository. However it is vital that log information is still collected and maintained to meet legislative, regulatory and incident response requirements (see <a title="Logging requirements" href="http://nzism.gcsb.govt.nz/ism-document#Block-15648">16.6.8 - Logging requirements</a>).</span></p>]]></paragraph>
<paragraph
    title="23.5.11.C.01."

    tags="Cloud Computing,Governance,Public cloud security,Assurance,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="7496"
><![CDATA[<p>Agencies MUST ensure that logs associated with public cloud services are collected, protected, and that their integrity can be confirmed in accordance with the agency’s documented logging requirements.</p>]]></paragraph>
</block>
<block title="Detecting information security incidents in public cloud "><paragraph
    title="23.5.12.R.01."

    tags="Cloud Computing,Governance,Public cloud security,Event Logging,Information Security Incidents"


><![CDATA[<p class="NormS17C2"><span>Specialised tools and procedures may be required to detect security incidents that occur within public cloud environments (<a title="Preventing and detecting information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Block-13111">See 7.1.7 - Preventing and detecting information security incidents</a>).</span></p>]]></paragraph>
<paragraph
    title="23.5.12.C.01."

    tags="Cloud Computing,Governance,Public cloud security,Event Logging,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="7498"
><![CDATA[<p>Agencies MUST ensure that cloud service provider logs are incorporated into overall enterprise logging and alerting systems or procedures in a timely manner to detect information security incidents.</p>]]></paragraph>
<paragraph
    title="23.5.12.C.02."

    tags="Cloud Computing,Governance,Public cloud security,Event Logging,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="7499"
><![CDATA[<p>Agencies SHOULD ensure that tools and procedures used to detect potential information security incidents account for the public cloud services being consumed by the agency.</p>]]></paragraph>
</block>
</subsection>
</section>
</chapter>


<chapter title="24. Supporting Information"><section title="24.1. Glossary of Abbreviations"><subsection title="Glossary of Abbreviations"><paragraph
    title="24.1.1."


><![CDATA[<table class="table-main" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td>
<p>Abbreviation</p>
</td>
<td>
<p>Meaning</p>
</td>
</tr>
<tr>
<td>
<p>3DES</p>
</td>
<td>
<p><span>Triple Data Encryption Standard</span></p>
</td>
</tr>
<tr>
<td>
<p>ABAC</p>
</td>
<td>
<p>Attribute Based Access Control</p>
</td>
</tr>
<tr>
<td>
<p>AES</p>
</td>
<td>
<p>Advanced Encryption Standard</p>
</td>
</tr>
<tr>
<td>
<p>AH</p>
</td>
<td>
<p>Authentication Header</p>
</td>
</tr>
<tr>
<td>
<p>AISEP</p>
</td>
<td>
<p>Australasian Information Security Evaluation Program</p>
</td>
</tr>
<tr>
<td>
<p>AoG</p>
</td>
<td>
<p>All-of-Government</p>
</td>
</tr>
<tr>
<td>
<p>AS</p>
</td>
<td>
<p>Australian Standard</p>
</td>
</tr>
<tr>
<td>
<p>ASD</p>
</td>
<td>
<p>Australian Signals Directorate</p>
</td>
</tr>
<tr>
<td>
<p>BYOD</p>
</td>
<td>
<p>Bring Your Own Device</p>
</td>
</tr>
<tr>
<td>
<p>BYOK</p>
</td>
<td>
<p>Bring Your Own Keys</p>
</td>
</tr>
<tr>
<td>
<p>CAVP</p>
</td>
<td>
<p><span>Cryptographic Algorithm Validation Program</span></p>
</td>
</tr>
<tr>
<td>
<p>CBC</p>
</td>
<td>
<p>Cipher Block Chaining</p>
</td>
</tr>
<tr>
<td>
<p>CC</p>
</td>
<td>
<p>Common Criteria</p>
</td>
</tr>
<tr>
<td>
<p>CCI</p>
</td>
<td>
<p>Controlled Cryptographic Item</p>
</td>
</tr>
<tr>
<td>
<p>CCRA</p>
</td>
<td>
<p>Common Criteria Recognition Arrangement</p>
</td>
</tr>
<tr>
<td>
<p>CDS</p>
</td>
<td>
<p>Cross-Domain Solution</p>
</td>
</tr>
<tr>
<td>
<p>CEO</p>
</td>
<td>
<p>Chief Executive Officer</p>
</td>
</tr>
<tr>
<td>
<p>CIO</p>
</td>
<td>
<p>Chief Information Officer</p>
</td>
</tr>
<tr>
<td>
<p>CISO</p>
</td>
<td>
<p>Chief Information Security Officer</p>
</td>
</tr>
<tr>
<td>
<p>COMSEC</p>
</td>
<td>
<p>Communications Security</p>
</td>
</tr>
<tr>
<td>
<p>CSfC</p>
</td>
<td>
<p>Commercial Solutions for Classified</p>
</td>
</tr>
<tr>
<td>
<p>CSO</p>
</td>
<td>
<p>Chief Security Officer</p>
</td>
</tr>
<tr>
<td>
<p>CSP</p>
</td>
<td>
<p>Cloud Service Provider</p>
</td>
</tr>
<tr>
<td>
<p>DdoS</p>
</td>
<td>
<p>Distributed Denial-Of-Service</p>
</td>
</tr>
<tr>
<td>
<p>DH</p>
</td>
<td>
<p>Diffie-Hellman</p>
</td>
</tr>
<tr>
<td>
<p>DIS</p>
</td>
<td>
<p>Draft International Standard</p>
</td>
</tr>
<tr>
<td>
<p>DKIM</p>
</td>
<td>
<p>DomainKeys Identified Mail</p>
</td>
</tr>
<tr>
<td>
<p>DMARC</p>
</td>
<td>Domain-based Message Authentication, Reporting and Conformance</td>
</tr>
<tr>
<td>
<p>DMZ</p>
</td>
<td>Demilitarized zone</td>
</tr>
<tr>
<td>
<p>DoS</p>
</td>
<td>
<p>Denial-Of-Service</p>
</td>
</tr>
<tr>
<td>
<p>DSA</p>
</td>
<td>
<p>Digital Signature Algorithm</p>
</td>
</tr>
<tr>
<td>
<p>EAL</p>
</td>
<td>
<p>Evaluation Assurance Level</p>
</td>
</tr>
<tr>
<td>
<p>EAP-TLS</p>
</td>
<td>
<p>Extensible Authentication Protocol-Transport Layer Security</p>
</td>
</tr>
<tr>
<td>
<p>ECB</p>
</td>
<td>
<p>Electronic Code Book mode</p>
</td>
</tr>
<tr>
<td>
<p>ECDH</p>
</td>
<td>
<p>Elliptic Curve Diffie-Hellman</p>
</td>
</tr>
<tr>
<td>
<p>ECDSA</p>
</td>
<td>
<p>Elliptic Curve Digital Signature Algorithm</p>
</td>
</tr>
<tr>
<td>
<p>EEPROM</p>
</td>
<td>
<p>Electrically Erasable Programmable Read-Only Memory</p>
</td>
</tr>
<tr>
<td>
<p>EPL</p>
</td>
<td>
<p>Evaluated Products List</p>
</td>
</tr>
<tr>
<td>
<p>EPLD</p>
</td>
<td>
<p>Evaluated Products List – Degausser</p>
</td>
</tr>
<tr>
<td>
<p>EPROM</p>
</td>
<td>
<p>Erasable Programmable Read-Only Memory</p>
</td>
</tr>
<tr>
<td>
<p>ESP</p>
</td>
<td>
<p>Encapsulating Security Payload</p>
</td>
</tr>
<tr>
<td>
<p>FIPS</p>
</td>
<td>
<p>Federal Information Processing Standard</p>
</td>
</tr>
<tr>
<td>
<p>FPGA</p>
</td>
<td>
<p>Field Programmable Gate Array</p>
</td>
</tr>
<tr>
<td>
<p>FTL</p>
</td>
<td>
<p>Flash Transition Layer</p>
</td>
</tr>
<tr>
<td>
<p>GCDO</p>
</td>
<td>
<p>NZ Government Chief Digital Officer</p>
</td>
</tr>
<tr>
<td>
<p>GCSB</p>
</td>
<td>
<p>Government Communications Security Bureau</p>
</td>
</tr>
<tr>
<td>
<p>GPU</p>
</td>
<td>
<p>Graphics Processing Unit</p>
</td>
</tr>
<tr>
<td>
<p>HA</p>
</td>
<td>
<p>High Availability</p>
</td>
</tr>
<tr>
<td>
<p>HACE</p>
</td>
<td>
<p>High Assurance Cryptographic Equipment</p>
</td>
</tr>
<tr>
<td>
<p>HB</p>
</td>
<td>
<p>Handbook</p>
</td>
</tr>
<tr>
<td>
<p>HGCE</p>
</td>
<td>
<p>High Grade Cryptographic Equipment. Terminology superseded by HACE.</p>
</td>
</tr>
<tr>
<td>
<p>HGCP</p>
</td>
<td>
<p>High Grade Cryptographic Products. Terminology superseded by HACE.</p>
</td>
</tr>
<tr>
<td>
<p>HMAC</p>
</td>
<td>
<p>Hashed Message Authentication Code</p>
</td>
</tr>
<tr>
<td>
<p>HSM</p>
</td>
<td>
<p>Hardware Security Module</p>
</td>
</tr>
<tr>
<td>
<p>HTTP</p>
</td>
<td>
<p>Hypertext Transfer Protocol</p>
</td>
</tr>
<tr>
<td>
<p>HTTPS</p>
</td>
<td>
<p>Hypertext Transfer Protocol Secure</p>
</td>
</tr>
<tr>
<td>
<p>HYOK</p>
</td>
<td>
<p>Hold Your Own Keys</p>
</td>
</tr>
<tr>
<td>
<p>IaaS</p>
</td>
<td>
<p>Infrastructure-as-a-Service</p>
</td>
</tr>
<tr>
<td>
<p>ICT</p>
</td>
<td>
<p>Information And Communications Technology</p>
</td>
</tr>
<tr>
<td>
<p>IDS</p>
</td>
<td>
<p>Intrusion Detection System</p>
</td>
</tr>
<tr>
<td>
<p>IEC</p>
</td>
<td>
<p>International Electrotechnical Commission</p>
</td>
</tr>
<tr>
<td>
<p>IEEE</p>
</td>
<td>
<p>Institute Of Electrical And Electronics Engineers</p>
</td>
</tr>
<tr>
<td>
<p>IETF</p>
</td>
<td>
<p>International Engineering Task Force</p>
</td>
</tr>
<tr>
<td>
<p>IKE</p>
</td>
<td>
<p>Internet Key Exchange</p>
</td>
</tr>
<tr>
<td>
<p>IM</p>
</td>
<td>
<p>Instant Messaging</p>
</td>
</tr>
<tr>
<td>
<p>IMS</p>
</td>
<td>
<p>IP Multimedia Subsystem</p>
</td>
</tr>
<tr>
<td>
<p>IODEF</p>
</td>
<td>
<p>Incident Object Description Exchange Format</p>
</td>
</tr>
<tr>
<td>
<p>IP</p>
</td>
<td>
<p>Internet Protocol</p>
</td>
</tr>
<tr>
<td>
<p>IPSec</p>
</td>
<td>
<p>Internet Protocol Security</p>
</td>
</tr>
<tr>
<td>
<p>IR</p>
</td>
<td>
<p>Infrared</p>
</td>
</tr>
<tr>
<td>
<p>IRC</p>
</td>
<td>
<p>Internet Relay Chat</p>
</td>
</tr>
<tr>
<td>
<p>IPT</p>
</td>
<td>
<p>Internet Protocol Telephony</p>
</td>
</tr>
<tr>
<td>
<p>IRP</p>
</td>
<td>
<p>Incident Response Plan</p>
</td>
</tr>
<tr>
<td>
<p>ISAKMP</p>
</td>
<td>
<p>Internet Security Association Key Management Protocol</p>
</td>
</tr>
<tr>
<td>
<p>ISO</p>
</td>
<td>
<p>International Organization for Standardization</p>
</td>
</tr>
<tr>
<td>
<p>ITSEC</p>
</td>
<td>
<p>Information Technology Security Evaluation Criteria</p>
</td>
</tr>
<tr>
<td>
<p>ITSM</p>
</td>
<td>
<p>Information Technology Security Manager</p>
</td>
</tr>
<tr>
<td>
<p>IWF</p>
</td>
<td>
<p>Inter-Working Function</p>
</td>
</tr>
<tr>
<td>
<p>KMP</p>
</td>
<td>
<p>Key Management Plan</p>
</td>
</tr>
<tr>
<td>
<p>KMS</p>
</td>
<td>
<p>Key management system</p>
</td>
</tr>
<tr>
<td>
<p>MDM</p>
</td>
<td>
<p>Mobile Device Manager</p>
</td>
</tr>
<tr>
<td>
<p>MFA</p>
</td>
<td>
<p>Multi-Factor Authentication</p>
</td>
</tr>
<tr>
<td>
<p>MFD</p>
</td>
<td>
<p>Multifunction Device</p>
</td>
</tr>
<tr>
<td>
<p>MMS</p>
</td>
<td>
<p>Multimedia Message Service</p>
</td>
</tr>
<tr>
<td>
<p>MSL</p>
</td>
<td>
<p>(New Zealand) Measurement Standards Laboratory</p>
</td>
</tr>
<tr>
<td>
<p>NAND</p>
</td>
<td>
<p>Flash Memory Named After The NAND Logic Gate</p>
</td>
</tr>
<tr>
<td>
<p>NAND</p>
</td>
<td>
<p>NOT AND – A Binary Logic Operation</p>
</td>
</tr>
<tr>
<td>
<p>NDPP</p>
</td>
<td>
<p>Network Device Protection Profile</p>
</td>
</tr>
<tr>
<td>
<p>NIST</p>
</td>
<td>
<p>National Institute Of Standards And Technology</p>
</td>
</tr>
<tr>
<td>
<p>NOR</p>
</td>
<td>
<p>Flash Memory Named After The NOR Logic Gate</p>
</td>
</tr>
<tr>
<td>
<p>NOR</p>
</td>
<td>
<p>NOT OR – A Binary Logic Operation</p>
</td>
</tr>
<tr>
<td>
<p>NTP</p>
</td>
<td>
<p>Network Time Protocol</p>
</td>
</tr>
<tr>
<td>
<p>NZCSI</p>
</td>
<td>
<p>New Zealand Communications Security Instruction</p>
</td>
</tr>
<tr>
<td>
<p>NZCSP</p>
</td>
<td>
<p>New Zealand Communications Security Policy</p>
</td>
</tr>
<tr>
<td>
<p>NZ e-GIF</p>
</td>
<td>
<p>New Zealand E-Government Interoperability Framework</p>
</td>
</tr>
<tr>
<td>
<p>NZEO</p>
</td>
<td>
<p>New Zealand Eyes Only</p>
</td>
</tr>
<tr>
<td>
<p>NZISM</p>
</td>
<td>
<p>New Zealand Information Security Manual</p>
</td>
</tr>
<tr>
<td>
<p>NZS</p>
</td>
<td>
<p>New Zealand Standard</p>
</td>
</tr>
<tr>
<td>
<p>OTP</p>
</td>
<td>
<p>One-Time Password</p>
</td>
</tr>
<tr>
<td>
<p>PaaS</p>
</td>
<td>
<p>Platform-as-a-Service</p>
</td>
</tr>
<tr>
<td>
<p>PAM</p>
</td>
<td>
<p>Privileged Access Management</p>
</td>
</tr>
<tr>
<td>
<p>PBX</p>
</td>
<td>
<p>Private Branch Exchange</p>
</td>
</tr>
<tr>
<td>
<p>PED</p>
</td>
<td>
<p>Portable Electronic Device</p>
</td>
</tr>
<tr>
<td>
<p>PIN</p>
</td>
<td>
<p>Personal Identification Number</p>
</td>
</tr>
<tr>
<td>
<p>PKI</p>
</td>
<td>
<p>Public Key Infrastructure</p>
</td>
</tr>
<tr>
<td>
<p>PP</p>
</td>
<td>
<p>Protection Profile</p>
</td>
</tr>
<tr>
<td>
<p>PSR</p>
</td>
<td>
<p>Protective Security Requirements</p>
</td>
</tr>
<tr>
<td>
<p>PSTN</p>
</td>
<td>
<p>Public Switched Telephone Network</p>
</td>
</tr>
<tr>
<td>
<p>QoS</p>
</td>
<td>
<p>Quality of Service</p>
</td>
</tr>
<tr>
<td>
<p>RAM</p>
</td>
<td>
<p>Random Access Memory</p>
</td>
</tr>
<tr>
<td>
<p>RBAC</p>
</td>
<td>
<p>Role-Based Access Control</p>
</td>
</tr>
<tr>
<td>
<p>RF</p>
</td>
<td>
<p>Radio Frequency</p>
</td>
</tr>
<tr>
<td>
<p>RFC</p>
</td>
<td>
<p>Request For Comments</p>
</td>
</tr>
<tr>
<td>
<p>RSA</p>
</td>
<td>
<p>Rivest-Shamir-Adleman</p>
</td>
</tr>
<tr>
<td>
<p>RTP</p>
</td>
<td>
<p>Real-Time Transport Protocol</p>
</td>
</tr>
<tr>
<td>
<p>SaaS</p>
</td>
<td>
<p>Software-as-a-Service</p>
</td>
</tr>
<tr>
<td>
<p>SBC</p>
</td>
<td>
<p>Session Border Controller</p>
</td>
</tr>
<tr>
<td>
<p>SCEC</p>
</td>
<td>
<p>Security Construction And Equipment Committee</p>
</td>
</tr>
<tr>
<td>
<p>SCI</p>
</td>
<td>
<p>Sensitive Compartmented Information</p>
</td>
</tr>
<tr>
<td>
<p>SCIF</p>
</td>
<td>
<p>Sensitive Compartmented Information Facility</p>
</td>
</tr>
<tr>
<td>
<p>SCIM</p>
</td>
<td>
<p>System for Cross-domain Identity Management</p>
</td>
</tr>
<tr>
<td>
<p>SDN</p>
</td>
<td>
<p>Software Defined Networking</p>
</td>
</tr>
<tr>
<td>
<p>SecPlan</p>
</td>
<td>
<p>System Security Plan</p>
</td>
</tr>
<tr>
<td>
<p>SecPol</p>
</td>
<td>
<p>System Security Policy</p>
</td>
</tr>
<tr>
<td>
<p>SitePlan</p>
</td>
<td>
<p>System Site Plan</p>
</td>
</tr>
<tr>
<td>
<p>SHA</p>
</td>
<td>
<p>Secure Hashing Algorithm</p>
</td>
</tr>
<tr>
<td>
<p>SIM</p>
</td>
<td>
<p>Subscriber Identity Module</p>
</td>
</tr>
<tr>
<td>
<p>SIP</p>
</td>
<td>
<p>Session Initiation Protocol</p>
</td>
</tr>
<tr>
<td>
<p>SLA</p>
</td>
<td>
<p>Service Level Agreement</p>
</td>
</tr>
<tr>
<td>
<p>S/MIME</p>
</td>
<td>
<p>Secure Multipurpose Internet Mail Extension</p>
</td>
</tr>
<tr>
<td>
<p>SMS</p>
</td>
<td>
<p>Short Message Service</p>
</td>
</tr>
<tr>
<td>
<p>SOE</p>
</td>
<td>
<p>Standard Operating Environment</p>
</td>
</tr>
<tr>
<td>
<p>SOP</p>
</td>
<td>
<p>Standard Operating Procedure</p>
</td>
</tr>
<tr>
<td>
<p>SP</p>
</td>
<td>
<p>Special Publication</p>
</td>
</tr>
<tr>
<td>
<p>SPF</p>
</td>
<td>
<p>Sender Policy Framework</p>
</td>
</tr>
<tr>
<td>
<p>SRMP</p>
</td>
<td>
<p>Security Risk Management Plan</p>
</td>
</tr>
<tr>
<td>
<p>SSD</p>
</td>
<td>
<p>Solid State Drive</p>
</td>
</tr>
<tr>
<td>
<p>SSH</p>
</td>
<td>
<p>Secure Shell</p>
</td>
</tr>
<tr>
<td>
<p>SSL</p>
</td>
<td>
<p>Secure Sockets Layer</p>
</td>
</tr>
<tr>
<td>
<p>SSP</p>
</td>
<td>
<p>System Security Plan</p>
</td>
</tr>
<tr>
<td>
<p>TLS</p>
</td>
<td>
<p>Transport Layer Security</p>
</td>
</tr>
<tr>
<td>
<p>TOE</p>
</td>
<td>
<p>Target of Evaluation (in Common Criteria)</p>
</td>
</tr>
<tr>
<td>
<p>TOE</p>
</td>
<td>
<p>Trusted Operating Environment</p>
</td>
</tr>
<tr>
<td>
<p>UC</p>
</td>
<td>
<p>Unified Communication</p>
</td>
</tr>
<tr>
<td>
<p>UTC</p>
</td>
<td>
<p>Co-ordinated Universal Time</p>
</td>
</tr>
<tr>
<td>
<p>VDP</p>
</td>
<td>
<p>Vulnerability Disclosure Policy</p>
</td>
</tr>
<tr>
<td>
<p>VLAN</p>
</td>
<td>
<p>Virtual Local Area Network</p>
</td>
</tr>
<tr>
<td>
<p>VM</p>
</td>
<td>
<p>Virtual Machine</p>
</td>
</tr>
<tr>
<td>
<p>VoIP</p>
</td>
<td>
<p>Voice Over Internet Protocol</p>
</td>
</tr>
<tr>
<td>
<p>VPN</p>
</td>
<td>
<p>Virtual Private Network</p>
</td>
</tr>
<tr>
<td>
<p>WAP</p>
</td>
<td>
<p>Wireless Access Point</p>
</td>
</tr>
<tr>
<td>
<p>WEP</p>
</td>
<td>
<p>Wired Equivalent Privacy</p>
</td>
</tr>
<tr>
<td>
<p>WEEE</p>
</td>
<td>
<p>Waste Electrical and Electronic Equipment</p>
</td>
</tr>
<tr>
<td>
<p>WLAN</p>
</td>
<td>
<p>Wireless Local Area Network</p>
</td>
</tr>
<tr>
<td>
<p>WPA2</p>
</td>
<td>
<p>Wi-Fi Protected Access 2</p>
</td>
</tr>
<tr>
<td>
<p>XAUTH</p>
</td>
<td>
<p>Ike Extended Authentication</p>
</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>&nbsp;</p>]]></paragraph>
 </subsection>
</section>
<section title="24.2. Glossary of Terms"><subsection title="Glossary of Terms"><paragraph
    title="24.2.1."


><![CDATA[<table class="table-main" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td>
<p>Term</p>
</td>
<td>
<p>Meaning</p>
</td>
</tr>
<tr>
<td>
<p>802.11</p>
</td>
<td>
<p>The Institute of Electrical and Electronics Engineers standard defining WLAN communications. Formally titled IEEE 82.11.</p>
</td>
</tr>
<tr>
<td>
<p>Access Gateway</p>
</td>
<td>
<p>An architectural construct that provides the system user access to multiple security domains from a single device, typically a workstation.</p>
</td>
</tr>
<tr>
<td><strong class="field-content">Access control</strong></td>
<td>
<div class="views-field views-field-title">The process of granting or denying requests for access to systems, applications and information. It can also refer to the process of granting or denying requests for access to facilities.</div>
</td>
</tr>
<tr>
<td>
<p>Accountable</p>
</td>
<td>
<p><span>Required or&nbsp;</span>expected to justify actions or decisions; being answerable and responsible for those actions &amp; decisions.</p>
</td>
</tr>
<tr>
<td>
<p>Accountable Material</p>
</td>
<td>
<p>Accountable information, an accountable item or accountable material refers to the accountability controls applied to specified information, equipment or materials. Accountable information, items or materials are usually uniquely identifiable (usually a serial or identification number) and are tracked from acquisition or creation to final disposal. Safe custody is a fundamental and is achieved through:</p>
<ul>
<li>is easily to compute;</li>
<li>will usually output a significantly different value, even for small changes made to the input; and</li>
<li>can detect many types of data corruptions.</li>
<li>allocation to a specific individual (issued or responsibility designated);</li>
<li>allocation or designation of responsibility may also require a specific briefing related to the handling, care and protection of particular types of classified information and COMSEC equipment;</li>
<li>the allocation, issue or designation being recorded;</li>
<li>strict controls over access and movement (special handling requirements);</li>
<li>maintenance of a register (manual or electronic); and</li>
<li>regular audits to ensure accountability conditions continue to be adhered to and any briefings are current.</li>
</ul>
<p>As a general rule, accountable information, items or materials are afforded physical security protection by specifying special handling and accountability conditions. Examples may include cryptographic or COMSEC equipment, other high value equipment, money, computers or information subject to privacy legislation and regulation. Cryptographic or COMSEC equipment and any information classified as CONFIDENTIAL, SECRET or TOP SECRET is accountable by definition.</p>
</td>
</tr>
<tr>
<td>
<p>Accountability</p>
</td>
<td>
<p>Most contemporary definitions include two key elements:</p>
<ul>
<li>the conferring of responsibility and authority; and</li>
<li>the answering for the use of that authority.</li>
</ul>
<p>Accountability exists when the performance of tasks or functions by an individual or organisation, are subject to another’s oversight, direction or request that they provide information or justification for their actions.</p>
<p>Answering for the use of authority means reporting, explaining actions, assuming obligations, and submitting to outside or external judgement. &nbsp;Having responsibility means having the authority to act, the power to control and the freedom to decide.&nbsp; It also means that one must behave rationally, reliably and consistently in exercising judgement.</p>
</td>
</tr>
<tr>
<td>
<p>Accreditation</p>
</td>
<td>
<p>A procedure by which an authoritative body gives formal recognition, approval and acceptance of the associated residual security risk with the operation of a system and issues a formal approval to operate the system.</p>
</td>
</tr>
<tr>
<td>
<p>Accreditation Authority</p>
</td>
<td>
<p>The authoritative body or individual responsible for systems accreditation.</p>
</td>
</tr>
<tr>
<td>
<p>Adaptive Authentication</p>
</td>
<td>
<p>This varies the level or degree of authentication required where unusual login requests occur.&nbsp; For example, out of normal hours, from an unusual geolocation, from an unknown device and so on.&nbsp; When an unusual authentication request is received, Adaptive Authentication may request additional credentials such as a one-time code provided to a known mobile phone number.</p>
</td>
</tr>
<tr>
<td>
<p>Agency</p>
</td>
<td>
<p>New Zealand Government departments, authorities, agencies or other bodies established in relation to public purposes, including departments and authorities staffed under the Public Service Act.</p>
</td>
</tr>
<tr>
<td>
<p>Agency Control</p>
</td>
<td>
<p>This description applies where an Agency has <span style="text-decoration: underline;">direct control</span> of agency information systems and data.&nbsp; It follows that Non-Agency Control occurs where direct control is impaired or does not or cannot exist.</p>
</td>
</tr>
<tr>
<td>
<p>Agency&nbsp;Head</p>
</td>
<td>
<p>The government employee with ultimate responsibility for the secure operation of agency functions, whether performed inhouse or outsourced.</p>
</td>
</tr>
<tr>
<td>
<p>All-of-Government</p>
</td>
<td>
<p>Refers to the entire New Zealand state sector.</p>
</td>
</tr>
<tr>
<td>
<p>Allow list</p>
</td>
<td>
<p><span>A list that confirms items being analysed are acceptable. This is the opposite of a deny or block list.</span></p>
</td>
</tr>
<tr>
<td>
<p>Approved Cryptographic Algorithms</p>
</td>
<td>
<p>Approved cryptographic algorithms have been extensively scrutinised for vulnerabilities by government, industry and academic communities in a practical and theoretical setting.<br> The approved cryptographic algorithms fall into three categories: asymmetric/public key algorithms, hashing algorithms, and symmetric encryption algorithms.&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p>Approved Destruction Facility</p>
</td>
<td>
<p class="Normal-nonumbering">The status of “approved facility” for the destruction of media and equipment, applies to a specific installation/site, and is granted by the Director-General GCSB under the NZISM.</p>
<p>Approval depends upon the Director-General’s satisfaction that the proposed facilities are capable of securely destroying IT equipment, devices and media to the standard required under the NZISM and related policies and that procedural security meets the required standards.</p>
</td>
</tr>
<tr>
<td>
<p>Asset</p>
</td>
<td>
<p>Anything of value to an agency, such as IT equipment and software, information, personnel, documentation, reputation and public confidence.</p>
</td>
</tr>
<tr>
<td>
<p>Attack Surface</p>
</td>
<td>
<p>The IT equipment and software used in a system. The greater the attack surface the greater the chances are of an attacker finding an exploitable vulnerability.</p>
</td>
</tr>
<tr>
<td>
<p>Attribute Based Access Control</p>
</td>
<td>
<p>An access control method where subject requests to perform operations on objects are granted or denied based on assigned attributes of the subject, assigned attributes of the object, environment conditions, and a set of policies that are specified in terms of those attributes and conditions.</p>
</td>
</tr>
<tr>
<td>
<p>Audit</p>
</td>
<td>
<p>A structured process of examination, review, assessment, testing and reporting against defined requirements or objectives. Auditors should be independent of any IT system, business process, agency, function, site, supplier or other subject area being audited.</p>
</td>
</tr>
<tr>
<td>
<p>Australian Information Security Evaluation Program</p>
</td>
<td>
<p>A program under which evaluations are performed by impartial companies against the Common Criteria.&nbsp; The results of these evaluations are then certified by ASD, which is responsible for the overall operation of the program.</p>
</td>
</tr>
<tr>
<td>
<p>Authentication</p>
</td>
<td>
<p>The process of identifying an individual, device or system before granting access to system resources or data.&nbsp; Usually based on a set of credentials such as an identifier (such as a user or device name) and an authenticator (such as a password or some other authentication factor).&nbsp; Authentication is distinct from Authorisation.</p>
</td>
</tr>
<tr>
<td>
<p>Authentication Header</p>
</td>
<td>
<p>Part of the protocol used for authentication within IPSec, it provides authentication, integrity and anti-replay for the entire packet (both the header and data payload).</p>
</td>
</tr>
<tr>
<td>
<p>Authorisation</p>
</td>
<td>
<p><span>Authorisation </span><span>is the process of granting (or revoking) access privileges to an individual, device or system.&nbsp;&nbsp;</span></p>
</td>
</tr>
<tr>
<td>
<p>Baseline</p>
</td>
<td>
<p>Information and controls that are used as a minimum implementation or starting point to provide a consistent minimum standard of systems security and information assurance.</p>
</td>
</tr>
<tr>
<td>
<p>Brute Force Attack</p>
</td>
<td>
<p>A brute force attack is when an automated continuous attack is conducted against a system or file to decrypt or discover passwords and data.&nbsp; Often used as an entry point for privilege escalation.</p>
</td>
</tr>
<tr>
<td>
<p>Bug Bounty</p>
</td>
<td>
<p>A monetary reward to researchers for the discovery and reporting of software and other information system vulnerabilities.</p>
</td>
</tr>
<tr>
<td>
<p>Cascaded Connections</p>
</td>
<td>
<p>Links to other systems that occur when connected systems are themselves connected to other systems. This may result in multiple indirect (cascaded) connections to systems with differing security implementations, data, equipment and other aspects important for the security and assurance of systems.</p>
</td>
</tr>
<tr>
<td>
<p>Caveat</p>
</td>
<td>
<p>A marking that indicates that the information has special requirements in addition to those indicated by the classification and any prescribed endorsement. The term covers codewords, source codewords, releasability indicators and special-handling caveats. See also Endorsements.</p>
</td>
</tr>
<tr>
<td>
<p>Certification</p>
</td>
<td>
<p>The process by which the controls and management of an information system is formally evaluated against any specific risks identified and the requirements of the NZISM. A key output is a formal assurance statement that the system conforms to the requirements of the NZISM.</p>
</td>
</tr>
<tr>
<td>
<p>Certification Authority</p>
</td>
<td>
<p>An official with the authority to assert that a system complies with prescribed controls within a standard.</p>
</td>
</tr>
<tr>
<td>
<p>Certification Report</p>
</td>
<td>
<p>A report generated by a certification body of a Common Criteria scheme that provides a summary of the findings of an evaluation.</p>
</td>
</tr>
<tr>
<td>
<p>Characterisation</p>
</td>
<td>
<p>In the NZISM “characterisation” is a synonym for “unique identifier”.</p>
<p>This is typically applied to an operating system,&nbsp; programme, library or other programmatic element in the form of a checksum which can be calculated from a “known good” component and stored for comparison should there be any concern that components have been damaged or compromised.&nbsp;</p>
<p>Forensic methods may also provide characterisation indicators but are likely to require additional levels of expertise.</p>
<p>See also Checksum and Hash.</p>
</td>
</tr>
<tr>
<td>
<p>Checksum</p>
</td>
<td>
<p>A checksum verifies or <strong>checks</strong> the integrity of data.</p>
<p>A good checksum algorithm:</p>
<ul>
<li>is easily to compute;</li>
<li>will usually output a significantly different value, even for small changes made to the input; and</li>
<li>can detect many types of data corruptions.</li>
</ul>
<p>Checksums are often used to verify the integrity of operating system, programme, library or other programmatic elements, images and firmware updates.&nbsp; Checksums typically range in length from one to 64-bits, depending on the intended usage and algorithm used to determine the checksum.</p>
<p>Checksums are related to hash functions, fingerprints, randomisation functions, and cryptographic hash functions.&nbsp; Note, however, each of those concepts are distinct, have different applications and therefore different design goals.&nbsp; Check digits and parity bits are special uses of checksums.&nbsp; It is important to recognise that, although related, a hash is not a checksum.</p>
<p>See also Hash.</p>
</td>
</tr>
<tr>
<td>
<p>Chief Information Security Officer</p>
</td>
<td>
<p>A senior executive with overall responsibility for the governance and management of information risks within an agency. This may include coordination between security, ICT and business functions to ensure risks are properly identified and managed.</p>
</td>
</tr>
<tr>
<td>
<p>Classified Information</p>
</td>
<td>
<p>Government information that requires protection from unauthorised disclosure.</p>
</td>
</tr>
<tr>
<td>
<p>Classified Systems</p>
</td>
<td>
<p>Systems that process, store or communicate classified information.</p>
</td>
</tr>
<tr>
<td>
<p>Cloud deployment model</p>
</td>
<td>
<p>The term deployment model refers to the type of access and the fundamental nature of the support infrastructure but is not specific as to the type of service consumed.&nbsp; Typically this includes:</p>
<p>•&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; private cloud,</p>
<p>•&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; public cloud,</p>
<p>•&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hybrid cloud, and</p>
<p>•&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; multi-cloud.</p>
</td>
</tr>
<tr>
<td>
<p>Cloud service model</p>
</td>
<td>
<p>The term cloud service model refers to the type of service used.&nbsp; These cloud service offerings are provided and maintained by the cloud service provider. Typical service offerings include:</p>
<p>•&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Infrastructure-as-a-Service,</p>
<p>•&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Software-as-a-Service, and</p>
<p>•&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Platform-as-a-Service.</p>
</td>
</tr>
<tr>
<td>
<p>Cloud service provider</p>
</td>
<td>
<p>An external company that provides a platform, infrastructure, applications, and/or storage services for its clients.</p>
</td>
</tr>
<tr>
<td>
<p>Codewords</p>
</td>
<td>
<p>A short (usually a single word) descriptions of a project, operation or activity, typically assigned used for reasons of reliability, clarity, brevity, or secrecy. Each code word is assembled in accordance with the specific rules of the code and assigned a unique meaning. Synonymous with <em>Codename</em>.</p>
</td>
</tr>
<tr>
<td>
<p>Coercivity</p>
</td>
<td>
<p>A measure of the resistance of a magnetic material to changes in magnetisation, equivalent to the field intensity necessary to demagnetise any magnetised material. The amount of coercive force required to reduce any residual magnetic induction to zero. Normally used in describing the characteristics of degaussing magnetic media (see Degausser).</p>
</td>
</tr>
<tr>
<td>
<p>Common Criteria</p>
</td>
<td>
<p>A formal, internationally-recognised scheme, defined in the ISO 15408 standard. This standard describes process to specify, design, develop, test, evaluate and certify as secure IT systems, where ‘secure’ is explicitly and formally defined.</p>
</td>
</tr>
<tr>
<td>
<p>Common Criteria Recognition Arrangement</p>
</td>
<td>
<p>An international agreement which facilitates the mutual recognition of Common Criteria evaluations by certificate producing schemes, including the Australian and New Zealand certification scheme.</p>
</td>
</tr>
<tr>
<td>
<p>Communications Security</p>
</td>
<td>
<p>Controls applied taken to deny unauthorised access to information derived from information and communication systems and to ensure the authenticity of related communications and data.</p>
</td>
</tr>
<tr>
<td>
<p>Conduit</p>
</td>
<td>
<p>A tube, duct or pipe used to protect cables.</p>
</td>
</tr>
<tr>
<td>
<p>Connection Forwarding</p>
</td>
<td>
<p>The use of network address translation to allow a port on a network node inside a local area network to be accessed from outside the network.&nbsp; Alternatively, using a Secure Shell server to forward a Transmission Control Protocol connection to an arbitrary port on the local host.</p>
</td>
</tr>
<tr>
<td>
<p>ConOp</p>
</td>
<td>
<p>Concept of Operations, a document describing the characteristics of an information systems and its intended use. It is used to communicate the intent and system characteristics to all stakeholders</p>
</td>
</tr>
<tr>
<td>
<p>Consumer Guide</p>
</td>
<td>
<p>Product specific advice concerning evaluated products can consist of findings from mutually recognised information security evaluations. This may include the Common Criteria, findings from GCSB internal evaluations, any recommendations for use and references to relevant policy and other standards.</p>
</td>
</tr>
<tr>
<td>
<p>Content Filtering</p>
</td>
<td>
<p>The process of monitoring communications, including email and web pages, analysing them for any suspicious or unwanted content, and preventing the delivery of suspicious or unwanted content.</p>
</td>
</tr>
<tr>
<td>
<p>Contract</p>
</td>
<td>
<p>Contract means an agreement between two or more persons or entities, which is intended to be enforceable at law and includes a contract made by deed or in writing,</p>
</td>
</tr>
<tr>
<td>
<p>Cross-Domain Solution</p>
</td>
<td>
<p>A Cross-Domain Solution (CDS) is a controlled interface that enables secure manual and/or automatic access and/or information transfer between different security domains while protecting the confidentiality, integrity and availability of each domain.</p>
<p>There are several types of CDS including access, multi-level and transfer gateways.</p>
</td>
</tr>
<tr>
<td>
<p>Cryptographic Hash</p>
</td>
<td>
<p>An algorithm (the hash function) which takes as input a string of any length (the message), and generates a fixed length string (the message digest or fingerprint) as output.&nbsp; The algorithm is designed to make it computationally infeasible to find any input which maps to a given digest, or to find two different messages that map to the same digest.</p>
</td>
</tr>
<tr>
<td>
<p>Cryptography</p>
</td>
<td>
<p>Cryptography is&nbsp;the study of secure communications techniques that allow <span style="text-decoration: underline;">only</span> the sender and intended recipient of a message to view&nbsp;its contents.</p>
</td>
</tr>
<tr>
<td>
<p>Cryptoperiod</p>
</td>
<td>
<p>The useful life of the cryptographic key.</p>
</td>
</tr>
<tr>
<td>
<p>Cryptographic Protocol</p>
</td>
<td>
<p>Specified cryptographic algorithms, parameters (such as key length) and processes for managing, establishing and using encrypted communications.</p>
</td>
</tr>
<tr>
<td>
<p>Cryptographic System</p>
</td>
<td>
<p>A related set of hardware or software used for cryptographic communication, processing or storage, and the administrative framework in which it operates.</p>
</td>
</tr>
<tr>
<td>
<p>Cryptographic System Material</p>
</td>
<td>
<p>Material that includes, cryptographic key, equipment, devices, documents, firmware or software that contains or describes cryptographic logic.</p>
</td>
</tr>
<tr>
<td>
<p>Data At Rest</p>
</td>
<td>
<p>Information residing on media storage facility or a system that is not in use.</p>
</td>
</tr>
<tr>
<td>
<p>Data Diode</p>
</td>
<td>
<p><span>A device that allows data to flow in only one direction.</span></p>
</td>
</tr>
<tr>
<td>
<p>Data In Transit</p>
</td>
<td>
<p>Information that is being conveyed across a communication medium.</p>
</td>
</tr>
<tr>
<td>
<p>Data In Use</p>
</td>
<td>
<p>Information that has been decrypted for processing by a system.</p>
</td>
</tr>
<tr>
<td>
<p>Data Remanence</p>
</td>
<td>
<p>Residual information remaining on a device or storage media after clearing or sanitising the device or media.&nbsp; Sometimes described as data persistence.</p>
</td>
</tr>
<tr>
<td>
<p>Data Spill</p>
</td>
<td>
<p>An information security incident that occurs when information is transferred between two security domains by an unauthorised means.&nbsp; This can include from a classified network to a less classified network or between two areas with different need-to-know requirements.</p>
</td>
</tr>
<tr>
<td>
<p>Declassification</p>
</td>
<td>
<p>A process whereby information is reduced to an unclassified state. Subsequently an administrative decision can be made to formally authorise its release into the public domain.</p>
</td>
</tr>
<tr>
<td>
<p>Degausser</p>
</td>
<td>
<p>An electrical device or permanent magnet assembly which generates a coercive magnetic force to destroy magnetic storage patterns in order to sanitise magnetic media.</p>
</td>
</tr>
<tr>
<td>
<p>Delegate</p>
</td>
<td>
<p>A person or group of personnel who may authorise noncompliance with requirements in this manual on the specific authority of the agency head.</p>
</td>
</tr>
<tr>
<td>
<p>Demilitarised Zone</p>
</td>
<td>
<p>A small network with one or more servers that is kept separate from an agency’s core network, either on the outside of the agency’s firewall, or as a separate network protected by the agency’s firewall.&nbsp; Demilitarised zones usually provide public domain information to less trusted networks, such as the Internet.</p>
</td>
</tr>
<tr>
<td>
<p>Deny list</p>
</td>
<td>
<p><span>A set of items to be excluded, blocked or prevented from execution. A deny list can also be known as a Block List. It is the opposite of an allow list which confirms that items are acceptable.</span></p>
</td>
</tr>
<tr>
<td>
<p>Department</p>
</td>
<td>
<p>Term used to describe Public Service Departments and Non-Public Service Departments within the state sector.</p>
<p>Refer State Services Commission list of Central Government Agencies – <a href="https://www.publicservice.govt.nz/system/central-government-organisations/">Central government organisations - Te Kawa Mataaho Public Service Commission</a></p>
</td>
</tr>
<tr>
<td>
<p>Device Access Control Software</p>
</td>
<td>
<p>Software that can be installed to restrict access to communications ports such as USB, Serial HDMI and Ethernet Ports. Device access control software can either block all access to a communications port or allow access using an allow listing approach based on device types, manufacturer’s identification, or even unique device identifiers.</p>
</td>
</tr>
<tr>
<td>
<p>DevOps</p>
</td>
<td>
<p>DevOps is a set of practices that combines software development (Dev) and IT operations (Ops). It aims to shorten the systems development life cycle and provide continuous delivery with high software quality.&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p>Diffie-Hellman Groups</p>
</td>
<td>
<p>A method used for specifying the modulus size used in the hashed message authentication code algorithms.&nbsp; Each DH group represents a specific modulus size.&nbsp; For example, group 2 represents a modulus size of 1024 bits.</p>
</td>
</tr>
<tr>
<td>
<p>Direct Control</p>
</td>
<td>
<p>In relation to the NZISM, <span style="text-decoration: underline;">Direct Control </span>is the immediate and continuous physical and logical control, responsibility for, and operation of agency information systems and data. See also Indirect Control.</p>
</td>
</tr>
<tr>
<td><strong>Domain-based Message Authentication, Reporting, and Conformance</strong></td>
<td>
<p>Domain-based Message Authentication, Reporting, and Conformance is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</p>
</td>
</tr>
<tr>
<td><strong>DomainKeys Identified Mail</strong></td>
<td>
<p>DomainKeys Identified Mail defines a mechanism by which email messages can be cryptographically signed, permitting a signing domain to claim responsibility for the introduction of a message into the mail stream.&nbsp; Message recipients can verify the signature by querying the signer's domain directly to retrieve the appropriate public key, and thereby confirm that the message was attested to by a party in possession of the private key for the signing domain.</p>
</td>
</tr>
<tr>
<td>
<p>Dual-Stack Device</p>
</td>
<td>
<p>A product that implements both IP version 4 and 6 protocol stacks.</p>
</td>
</tr>
<tr>
<td>
<p>Emanation Security</p>
</td>
<td>
<p>The counter-measures, techniques and processes employed to reduce classified emanations from a facility and its systems to an acceptable level. Emanations can be in the form of RF energy, sound waves or optical signals.</p>
</td>
</tr>
<tr>
<td>
<p>Emergency Access</p>
</td>
<td>
<p>The process of a system user accessing a system that they do not hold appropriate security clearances for due to an immediate and critical emergency requirement.</p>
</td>
</tr>
<tr>
<td>
<p>Emergency Situation</p>
</td>
<td>
<p>A situation requiring the evacuation of a site.&nbsp; Examples include fires and bomb threats.</p>
</td>
</tr>
<tr>
<td>
<p>Encapsulating Security Payload</p>
</td>
<td>
<p>A protocol used for encryption and authentication within IPSec.</p>
</td>
</tr>
<tr>
<td>
<p>Encryption</p>
</td>
<td>
<p>The transformation of data from plaintext (recognisable/readable data) to ciphertext (encrypted and not readable) using a cryptographic key.</p>
<p>Data is encrypted using an encryption key to produce ciphertext and decrypted to plaintext using a decryption key.&nbsp; These keys may be the same (symmetric encryption) or two different keys (asymmetric encryption).</p>
<p>Encryption alone does not prevent interference or unauthorised access but denies the intelligible content to unauthorised individuals, organisations or other would-be interceptors.</p>
</td>
</tr>
<tr>
<td>
<p>Endorsement</p>
</td>
<td>
<p>Certain information may bear an endorsement marking in addition to a security classification. Endorsement markings are not security classifications in their own right and must not appear without a security classification. Endorsement markings are warnings that the information has special requirements in addition to those indicated by the security classification and should only be used when there is a clear need for special care.</p>
<p>Endorsement markings may indicate:</p>
<ul>
<li>the specific nature of information;</li>
<li>temporary sensitivities;</li>
<li>limitations on availability; or</li>
<li>how recipients should handle or disclose information.</li>
</ul>
</td>
</tr>
<tr>
<td>
<p>Escort</p>
</td>
<td>
<p>An individual who supervises visitors to secure areas to ensure uncleared visitors are not exposed to classified information, conversations equipment and other classified materials. Such visitors may include maintenance staff, IT contractors and building inspectors.</p>
</td>
</tr>
<tr>
<td>
<p>Evaluation Assurance Level</p>
</td>
<td>
<p>A numeric representation of the security functionality of a product gained from undertaking a Common Criteria evaluation. Each EAL comprises a number of assurance components, covering aspects of a product’s design, development and operation. The range covers EAL0 (lowest) to EAL7 (highest).</p>
</td>
</tr>
<tr>
<td>
<p>Exception</p>
</td>
<td>
<p>The formal acknowledgement that a requirement of the NZISM cannot be met and that a dispensation from the particular compliance requirement is granted by the Accreditation Authority.&nbsp; This exception is valid for the term of the Accreditation Certificate or some lesser time as determined by the Accreditation Authority.</p>
</td>
</tr>
<tr>
<td>
<p>Exceptions and Waivers</p>
</td>
<td>
<p>An exception is NOT the same as a waiver.&nbsp; An exception means that the requirement need not be followed.&nbsp; A waiver means that some alternative controls or conditions are implemented.</p>
</td>
</tr>
<tr>
<td>
<p>Facility</p>
</td>
<td>
<p>An area that facilitates government business.&nbsp; For example, a facility can be a building, a floor of a building or a designated area on the floor of a building.</p>
</td>
</tr>
<tr>
<td>
<p>Filter</p>
</td>
<td>
<p>A device that manages or restricts the flow of data in accordance with a security policy.</p>
</td>
</tr>
<tr>
<td>
<p>Finder</p>
</td>
<td>
<p>An individual or organisation that reports a vulnerability under an agency's VDP.</p>
</td>
</tr>
<tr>
<td>
<p>Firewall</p>
</td>
<td>
<p>A network protection device that filters incoming and outgoing network data, based on a series of rules.</p>
</td>
</tr>
<tr>
<td>
<p>Firmware</p>
</td>
<td>
<p>Software embedded in a hardware device.</p>
</td>
</tr>
<tr>
<td>
<p>Flash Memory Media</p>
</td>
<td>
<p>A specific type of EEPROM.</p>
</td>
</tr>
<tr>
<td>
<p>Fly Lead</p>
</td>
<td>
<p>A cable that connects IT equipment to the fixed infrastructure of the facility. For example, the cable that connects a workstation to a network wall socket.</p>
</td>
</tr>
<tr>
<td>
<p>Foreign National</p>
</td>
<td>
<p>A person who is not a New Zealand citizen.</p>
</td>
</tr>
<tr>
<td>
<p>Foreign System</p>
</td>
<td>
<p>A system that is not owned and operated by the New Zealand Government.</p>
</td>
</tr>
<tr>
<td>
<p>Functional Segregation</p>
</td>
<td>
<p>Segregation based on the device function or intended function.</p>
</td>
</tr>
<tr>
<td>
<p>Gateway</p>
</td>
<td>
<p>Connections between two or more systems from different security domains to allow access to or transfer of information according to defined security policies. Some gateways can be automated through a combination of physical or software mechanisms. Gateways are typically grouped into three categories: access gateways, multilevel gateways and transfer gateways.</p>
</td>
</tr>
<tr>
<td>
<p>General User</p>
</td>
<td>
<p>A system user who can, with their normal privileges, make only limited changes to a system and generally cannot bypass system security.</p>
</td>
</tr>
<tr>
<td>
<p>Government Chief Information Officer</p>
</td>
<td>
<p>Government Chief Information Officer (GCIO) is a role undertaken by the Chief Executive of the Department of Internal Affairs in order to provide leadership on ICT matters within the NZ Government.</p>
</td>
</tr>
<tr>
<td>
<p>Hardware</p>
</td>
<td>
<p>A generic term for any physical component of information and communication technology, including peripheral equipment and media used to process information.</p>
</td>
</tr>
<tr>
<td>
<p>Hardware Security Module</p>
</td>
<td>
<p>Hardware Security Modules (HSMs) are a device, card or appliance usually installed inside of a PC or server to provide cryptographic functions. HSM’s are usually physically and electronically hardened to reduce the possibility of tampering or other interference.</p>
</td>
</tr>
<tr>
<td>
<p>Hash</p>
</td>
<td>
<p>A hash is the result of a one-way, cryptographic function that converts a data string of any length into a unique fixed-length bit string.&nbsp; Typically applied to passwords and messages to protect against loss and/or add resistance to attacks.</p>
<p>Hashing algorithms or functions are often are designed as a one-way cryptographic transformation so that it's impossible to reverse the hash process and reconstitute the original string.</p>
<p>The values returned by a hash function are variously described as hash values, hash codes, digests, or simply hashes.</p>
<p>One common use of a hash is a data structure called a hash table, widely used in computer software for indexing and rapid retrieval of database elements.</p>
<p>Note that a hash is not the same as data encryption although it does utilise cryptographic functions.</p>
<p>See also Checksum.</p>
</td>
</tr>
<tr>
<td>
<p>Hash Value</p>
</td>
<td>
<p>See Hash.&nbsp; Also known as "message digest".</p>
</td>
</tr>
<tr>
<td>
<p>Hashed Message Authentication Code Algorithms</p>
</td>
<td>
<p>In cryptography, a keyed-hash message authentication code (HMAC) is a specific type of message authentication code (MAC) using a cryptographic hash function and a cryptographic key.</p>
</td>
</tr>
<tr>
<td>
<p>High Assurance</p>
</td>
<td>
<p>High Assurance is a generic term encompassing Common Criteria Evaluation Assurance Levels (EAL) 5, 6 and 7. Alternatively refers to the independent (unrelated) ASD High Assurance Evaluation Scheme.</p>
</td>
</tr>
<tr>
<td>
<p>High Assurance Cryptography</p>
</td>
<td>
<p>The U.S. ranks cryptographic products and algorithms through a certification programme and categorising the products and algorithms into product types. Product types are defined in the US National Information Assurance Glossary (CNSSI No. 4009) which defines Type 1 and 2 products, and Type 3 and 4 algorithms. Type 1 products are used to protect systems requiring the most stringent protection mechanisms.</p>
</td>
</tr>
<tr>
<td>
<p>High Assurance Cryptographic Equipment (HACE)</p>
</td>
<td>
<p>The equivalent to United States Type 1 cryptographic products &amp; equipment. Previously described as High Grade Cryptographic Products &amp; Equipment, the term HACE includes classified CCI, and other GCSB-Specific devices.</p>
</td>
</tr>
<tr>
<td>
<p>Hybrid Hard Drives</p>
</td>
<td>
<p>Non-volatile magnetic media that use a cache to increase read and write speeds and reduce boot time.&nbsp; The cache is normally flash memory media or battery backed RAM.</p>
</td>
</tr>
<tr>
<td>
<p>Incident Response Plan</p>
</td>
<td>
<p>A plan for responding to information security incidents as defined by the individual agency.</p>
</td>
</tr>
<tr>
<td>
<p>Identity and Access Management</p>
</td>
<td>
<p class="Normal-nonumbering">Identity and Access Management (IAM) is a framework of business processes, policies and technologies that enable and support the management of electronic or digital identities, authorisation, privileges and access to organisational resources.</p>
<p class="Normal-nonumbering">Identity management deals with attributes related to a user (including people, machines, devices and systems).&nbsp;Access Management applies organisation processes, policies and security to enable and manage access.&nbsp;The two aspects are highly interdependent and are most effectively managed conjointly.&nbsp;An IAM framework is a key element in Privileged Access Management (PAM) and Zero Trust architectures.</p>
</td>
</tr>
<tr>
<td>
<p>Image persistence / Image retention</p>
</td>
<td>
<p>LCD/LED/OLED and plasma technologies can be susceptible to persistence or retention of an image or “ghost” image on the screen.&nbsp; This can also led to screen burn-in, as can occur in traditional CRT monitors.</p>
</td>
</tr>
<tr>
<td>
<p>Indirect Agency Control</p>
</td>
<td>
<p>In relation to the NZISM, Indirect agency control is when information, services or operations are not under the direct control of the agency. This may be through outsourcing of, ICT management or services, use of third party facilities such as data centre co-locations, or consumption of cloud services. See also Direct Control.</p>
</td>
</tr>
<tr>
<td>
<p>Information</p>
</td>
<td>
<p>Any communication or representation of knowledge such as facts, data, and opinions in any medium or form, electronic as well as physical. Information includes any text, numerical, graphic, cartographic, narrative, or any audio or visual representation.</p>
</td>
</tr>
<tr>
<td>
<p>Information Asset</p>
</td>
<td>
<p>Information asset is any information or related equipment has value to an organisation. This includes equipment, facilities, patents, intellectual property, software and hardware. Information Assets also include services, information, and people, and characteristics such as reputation, brand, image, skills, capability and knowledge</p>
</td>
</tr>
<tr>
<td>
<p>Information and Communications Technology (ICT)</p>
</td>
<td>
<p>Information and Communications Technology (ICT) includes:</p>
<ul>
<li>Information management;</li>
<li>Technology infrastructure; and</li>
<li>Technology-enabled business processes and services</li>
</ul>
</td>
</tr>
<tr>
<td>
<p>Information Security</p>
</td>
<td>
<p>Measures relating to the confidentiality, availability and integrity of information that is processed, stored and communicated by electronic or any other means.</p>
</td>
</tr>
<tr>
<td>
<p>Information Security Incident</p>
</td>
<td>
<p>An occurrence or activity that may threaten the confidentiality, integrity or availability of a system or the information stored, processed or communicated by it or by any other process or system and processes.</p>
</td>
</tr>
<tr>
<td>
<p>Information Security Policy</p>
</td>
<td>
<p>A high-level document that describes how an agency protects its information. The CSP is normally developed to cover all systems and can exist as a single document or as a set of related documents.</p>
</td>
</tr>
<tr>
<td>
<p>Information Technology Security Manager</p>
</td>
<td>
<p>ITSMs are executives within an agency that act as a conduit between the strategic directions provided by the CISO and the technical efforts of systems administrators.&nbsp; The main responsibility of ITSMs is the administrative controls relating to information security within the agency.</p>
</td>
</tr>
<tr>
<td>
<p>Infrared Device</p>
</td>
<td>
<p>A device such as a mouse, keyboard, pointing device, laptop and smart phone that have an infrared communications capability.</p>
</td>
</tr>
<tr>
<td><strong>Infrastructure-as-a-Service</strong></td>
<td>
<p>Infrastructure-as-a-Service is where the cloud service provider offers access to a variety of capabilities and technologies on demand. Service is provided either over the public Internet or through dedicated connections.</p>
</td>
</tr>
<tr>
<td>
<p>Internet Key Exchange Extended Authentication</p>
</td>
<td>
<p>Used to provide an additional level of authentication by allowing IPSec gateways to request additional authentication information from remote users. As a result, users are forced to respond with credentials before being allowed access to the connection.</p>
</td>
</tr>
<tr>
<td>
<p>Intrusion Detection System</p>
</td>
<td>
<p>An automated system used to identify an infringement of security policy from an internal or external source.</p>
</td>
</tr>
<tr>
<td>
<p>Intrusion Prevention System</p>
</td>
<td>
<p>A security device, resident on a specific host, which monitors system activities for malicious or unwanted behaviour and can react in real-time to block or prevent those activities.</p>
</td>
</tr>
<tr>
<td><strong>Inverse split tunnelling</strong></td>
<td>
<p>A particular configuration of split tunnelling where only specifically authorised and trusted systems are able to be simultaneously communicated with via the external network connection.</p>
</td>
</tr>
<tr>
<td>
<p>IP Security</p>
</td>
<td>
<p>A suite of protocols for secure IP communications through authentication or encryption of IP packets including protocols for cryptographic key establishment.</p>
</td>
</tr>
<tr>
<td>
<p>IP Telephony</p>
</td>
<td>
<p>The management and transport of voice communications over IP networks. Also described as Voice Over IP (VOIP).</p>
</td>
</tr>
<tr>
<td>
<p>IP Version 6</p>
</td>
<td>
<p>A protocol used for communicating over a packet switched network.&nbsp; Version 6 is the successor to version 4 which is widely used on the Internet.&nbsp; The main change introduced in version 6 is a greater address space available for identifying network devices, workstations and servers.</p>
</td>
</tr>
<tr>
<td>
<p>ISAKMP Aggressive Mode</p>
</td>
<td>
<p>An IPSec protocol that uses a reduced Exchange to establish an IPSec connection. Connection negotiation is quicker but potentially less secure.</p>
</td>
</tr>
<tr>
<td>
<p>ISAKMP Main Mode</p>
</td>
<td>
<p>An IPSec protocol that offers improved security using additional negotiation to establish an IPSec connection.</p>
</td>
</tr>
<tr>
<td>
<p>ISAKMP Quick Mode</p>
</td>
<td>
<p>An IPSec protocol that is used for refreshing security association information. Similar to aggressive mode</p>
</td>
</tr>
<tr>
<td>
<p>Isolation</p>
</td>
<td>
<p>Includes disconnection from other systems and any external connections. In some cases system isolation may not be possible for architectural or operational reasons. Isolation may also include the quarantine of suspected or known malware and unwanted content.</p>
</td>
</tr>
<tr>
<td>
<p>IT Equipment</p>
</td>
<td>
<p>Any equipment to support the acquisition, processing and storage of information. This may include servers, routers, switches, switch panels, UPSs, PCs, laptops printers, MFDs etc.</p>
</td>
</tr>
<tr>
<td>
<p>Key Management</p>
</td>
<td>
<p>The management of cryptographic keys and associated hardware and software. It includes their generation, registration, distribution, installation, usage, protection, storage, access, recovery and destruction.</p>
</td>
</tr>
<tr>
<td>
<p>Key Management Plan</p>
</td>
<td>
<p>Describes how cryptographic services are securely deployed within an agency. It documents critical key management controls to protect keys and associated material during their life cycle, along with other controls to provide confidentiality, integrity and availability of keys.</p>
</td>
</tr>
<tr>
<td>
<p>Key Stretching</p>
</td>
<td>
<p>A defence against brute force and similar system attacks by increasing the time required to complete hashing and making an attack more time-consuming.</p>
</td>
</tr>
<tr>
<td>
<p>Limited Higher Access</p>
</td>
<td>
<p>The process of granting a system user access to a system that they do not hold appropriate security clearances for, for a limited period of time.</p>
</td>
</tr>
<tr>
<td>
<p>Lockable Commercial Cabinet</p>
</td>
<td>
<p>A cabinet that is commercially available, of robust construction and is fitted with a commercial lock.</p>
</td>
</tr>
<tr>
<td>
<p>Logging Facility</p>
</td>
<td>
<p>A facility that includes the software component which records system events and associated details, the transmission (if necessary) of these records (logs) and how they are stored and secured.</p>
</td>
</tr>
<tr>
<td>
<p>Malicious Code</p>
</td>
<td>
<p>Any software that attempts to subvert the confidentiality, integrity or availability of a system. Types of malicious code include logic bombs, trapdoors, Trojans, viruses and worms. More usually as Malware</p>
</td>
</tr>
<tr>
<td>
<p>Malicious Code Infection</p>
</td>
<td>
<p>An information security incident that occurs when malicious code is used to infect a system. Examples of malicious code infection viruses, worms and Trojans.</p>
</td>
</tr>
<tr>
<td>
<p>Malware</p>
</td>
<td>
<p><span style="text-decoration: underline;">Mal</span>icious Soft<span style="text-decoration: underline;">ware</span> or Malicious Code.</p>
</td>
</tr>
<tr>
<td>
<p>Management Traffic</p>
</td>
<td>
<p>Communications generated by system administrators and processes over a network in order to manage and control a device.</p>
</td>
</tr>
<tr>
<td>
<p>Mandatory Controls</p>
</td>
<td>
<p>Controls within this manual with either a ‘MUST’ or a ‘MUST NOT’ compliance requirement.</p>
</td>
</tr>
<tr>
<td>
<p>Media</p>
</td>
<td>
<p>A generic term for any type of hardware or material that is capable of storing or retaining data.&nbsp; The following examples, while not a definitive list, includes any type of “floppy disk”, tapes, all types of optical disks, HDD, SSD, USB, RAM, Flash, ROM, EPROM, printer cartridges, printer drums and so on.&nbsp;&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p>Media Destruction</p>
</td>
<td>
<p>The process of physically damaging the media with the objective of making the data stored on it inaccessible.&nbsp; To destroy media effectively, only the actual material in which the data is stored needs to be destroyed.</p>
</td>
</tr>
<tr>
<td>
<p>Media Disposal</p>
</td>
<td>
<p>The process of relinquishing control of media, or disposing of when no longer required, in a secure manner that ensures that no data can be recovered from the media</p>
</td>
</tr>
<tr>
<td>
<p>Media Sanitisation</p>
</td>
<td>
<p>The process of securely erasing or overwriting data stored on media.</p>
</td>
</tr>
<tr>
<td>
<p>Multi-Factor Authentication</p>
</td>
<td>
<p>Multi-Factor Authentication (MFA) is a security system that verifies a user’s identity by requiring multiple credentials, which may be of the same factor or type.&nbsp; Initial authentication normally requires a username and password.&nbsp; MFA requires other—additional—credentials, for example as a code from the user’s smartphone, the answer to a security question, a fingerprint, or facial recognition.</p>
</td>
</tr>
<tr>
<td>
<p>Multifunction Devices</p>
</td>
<td>
<p>The class of devices that combines printing, scanning, copying, faxing or voice messaging functionality within the one piece of equipment. These are often designed to connect to computer and communications networks simultaneously.</p>
</td>
</tr>
<tr>
<td>
<p>Multilevel Gateway</p>
</td>
<td>
<p>A gateway that enables access, based on authorisation, to data at many classification and releasability levels where each data unit is individually marked according to its domain.</p>
</td>
</tr>
<tr>
<td>
<p>Need-To-Know</p>
</td>
<td>
<p>The principle of telling a person only the information that they require to fulfil their role.</p>
</td>
</tr>
<tr>
<td>
<p>Network Access Control</p>
</td>
<td>
<p>Policies and processes used to control access to a network and actions on a network, including authentication checks and authorisation controls.</p>
</td>
</tr>
<tr>
<td>
<p>Network Device</p>
</td>
<td>
<p>Any device designed to facilitate the communication of information destined for multiple system users.&nbsp; For example: cryptographic devices, firewalls, routers, switches and hubs.</p>
</td>
</tr>
<tr>
<td>
<p>Network Infrastructure</p>
</td>
<td>
<p>The infrastructure used to carry information between workstations and servers or other network devices.&nbsp; For example: cabling, junction boxes, patch panels, fibre distribution panels and structured wiring enclosures.</p>
</td>
</tr>
<tr>
<td>
<p>Network Protection Device</p>
</td>
<td>
<p>A category of network device used specifically to protect a network. For example, a firewall, session border controller etc.</p>
</td>
</tr>
<tr>
<td>
<p>NZ Eyes Only</p>
</td>
<td>
<p>A caveat indicating that the information is not to be passed to or accessed by foreign nationals.</p>
</td>
</tr>
<tr>
<td>
<p>NZ Government Information Security Manual</p>
</td>
<td>
<p>National security policy that aims to provide a common approach to ensure that the implementation of information security reduces both agency specific, and whole of government, information security risks to an acceptable level.</p>
</td>
</tr>
<tr>
<td>
<p>NZ Government Protective Security Manual&nbsp;</p>
</td>
<td>
<p>The PSM was superseded by the Protective Security Requirements (PSR) in December 2014.</p>
</td>
</tr>
<tr>
<td>
<p>No-Lone-Zone</p>
</td>
<td>
<p>An area in which personnel are not permitted to be left alone such that all actions are witnessed by at least one other person.</p>
</td>
</tr>
<tr>
<td>
<p>Non-Agency Control</p>
</td>
<td>
<p>This description applies where an Agency does NOT have <span style="text-decoration: underline;">direct control</span> of elements of agency information systems and data.&nbsp; This may occur, for example, where data centre operations are outsourced.</p>
</td>
</tr>
<tr>
<td>
<p>Non-Volatile Media</p>
</td>
<td>
<p>A type of media which retains its information when power is removed.</p>
</td>
</tr>
<tr>
<td>
<p>Off-Hook Audio Protection</p>
</td>
<td>
<p>A method of mitigating the possibility of an active, but temporarily unattended handset inadvertently allowing discussions being undertaken in the vicinity of the handset to be heard by the remote party. This could be achieved through the use of a hold feature, mute feature, push-to-talk handset or equivalent. May not be effective on smart phones / cell phones.</p>
</td>
</tr>
<tr>
<td>
<p>Official Information</p>
</td>
<td>
<p>Any information held by a government department or agency. See the Official Information Act 1982 (as amended).</p>
</td>
</tr>
<tr>
<td>
<p>OpenPGP</p>
</td>
<td>
<p>An open-source implementation of Pretty Good Privacy (PGP), a widely available cryptographic toolkit.</p>
</td>
</tr>
<tr>
<td>
<p>Oversight</p>
</td>
<td>
<p>The term is used in this document in the following ways:</p>
<ol>
<li>In the context of governance where the term is used to describe the responsibility and requirement to manage, govern, inspect or direct activities to ensure particular outcomes, e.g. the oversight of supply contracts.</li>
<li>In the physical security context to describe the ability to observe activity (surveillance) and/or read materials which should be protected and shared only under strict guidelines.&nbsp; It enables the systematic observation of places and people by visual, audio, electronic, photographic or other means.&nbsp; Typically this is caused by poor placing of computer screens and desks and proximity to windows, doors, corridors or other means of physical access and overview or oversight.&nbsp; Other physical factors may contribute.</li>
</ol>
</td>
</tr>
<tr>
<td>
<p>Patch Cable</p>
</td>
<td>
<p>A metallic (usually copper) or fibre optic cable used for routing signals between two components in an enclosed container or rack or between adjacent containers or racks.</p>
</td>
</tr>
<tr>
<td>
<p>Patch Panel</p>
</td>
<td>
<p>A group of sockets or connectors that allow manual configuration changes, generally by means of connecting cables to the appropriate connector.&nbsp; Cables could be metallic (copper) or fibre optic.</p>
</td>
</tr>
<tr>
<td>
<p>Perfect Forward Security</p>
</td>
<td>
<p>Additional security for security associations in that if one security association is compromised subsequent security associations will not be compromised.</p>
</td>
</tr>
<tr>
<td>
<p>Peripheral Switch</p>
</td>
<td>
<p>A device used to share a set of peripherals between a number of computers.</p>
</td>
</tr>
<tr>
<td>
<p>Platform-as-a-Service</p>
</td>
<td>
<p>Platform-as-a-Service provides application developers access to all necessary hardware, software, and infrastructure to allow applications to be built, run, and managed. The PaaS infrastructure is typically managed by the cloud service provider</p>
</td>
</tr>
<tr>
<td>
<p>Post-quantum cryptography</p>
</td>
<td>
<p>Post-quantum cryptography (sometimes described as quantum-resistant) refers to cryptographic algorithms that are considered to be secure against a cryptanalytic attack by a quantum computer.</p>
</td>
</tr>
<tr>
<td>
<p>Principles of Separation and Segregation</p>
</td>
<td>
<p>Systems architecture and design incorporating separation and segregation in order to establish trust zones, define security domains and enforce boundaries.</p>
</td>
</tr>
<tr>
<td>
<p>Privacy Marking</p>
</td>
<td>
<p>Privacy markings are used to indicate that official information has a special handling requirement or a distribution that is restricted to a particular audience.</p>
</td>
</tr>
<tr>
<td>
<p>Private Network</p>
<p>&nbsp;</p>
</td>
<td>
<p>A private network is a network and infrastructure owned, managed and controlled by a single entity for its exclusive use.</p>
<p>This term includes networks used by private organisations, nongovernment organisations, state owned enterprises, or government department, agencies and ministries.</p>
<p>If any part of the transmission path utilises <strong>any</strong> element of a public network, such as telecommunications or data services from a service provider that utilise any component of local, regional or national infrastructure, then the network is defined as a public network</p>
</td>
</tr>
<tr>
<td>
<p>Privileged Access Management (PAM)</p>
</td>
<td>
<p>Privileged Access Management (PAM) – sometimes also described as Privileged Account Management, refers to a set of processes and tools for granting, controlling, monitoring, and auditing privileged access.&nbsp;&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p>Privileged Account</p>
</td>
<td>
<p>A Privileged Account is a user account with high levels of access to systems, devices and data.&nbsp; Privileged accounts may, for example, be able to install or remove software, upgrade operating systems, or modify system or application configurations.&nbsp; They may also have access to data that is not normally accessible to standard users.</p>
</td>
</tr>
<tr>
<td>
<p>Privileged User</p>
</td>
<td>
<p>A system user who can alter or circumvent system security protections.&nbsp; This can also apply to system users who could have only limited privileges, such as software developers, who can still bypass security precautions.&nbsp; A privileged user can have the capability to modify system configurations, account privileges, audit logs, data files or applications.</p>
</td>
</tr>
<tr>
<td>
<p>Protective Marking</p>
</td>
<td>
<p>A marking that is applied to unclassified or classified information to indicate the security measures and handling requirements that are to be applied to the information to ensure that it is appropriately protected.</p>
</td>
</tr>
<tr>
<td>
<p>Protective Security Requirements&nbsp;</p>
</td>
<td>
<p>The Protective Security Requirements (PSR) outlines the Government’s expectations for managing personnel, physical and information security.</p>
</td>
</tr>
<tr>
<td>
<p>Protective Security Requirements Framework&nbsp;</p>
</td>
<td>
<p>The Protective Security Requirements Framework (PSRF) is a four-tier hierarchical approach to protective security. Strategic Security Directive (tier one); Core policies, strategic security objectives and the mandatory requirements (tier two); Protocols, standards and good practice requirements (tier three); Agency-specific policies and procedures (tier four).</p>
</td>
</tr>
<tr>
<td>
<p>Public Domain Information</p>
</td>
<td>
<p>Official information authorised for unlimited public access or circulation, such as agency publications and websites.</p>
</td>
</tr>
<tr>
<td>
<p>Public Key Infrastructure</p>
</td>
<td>
<p>The framework and services that provide for the generation, production, distribution, control, accounting and destruction of public key certificates.&nbsp; Components include the personnel, policies, processes, server platforms, software, and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, recover and revoke public key certificates. SOURCE:&nbsp; CNSSI-4009</p>
</td>
</tr>
<tr>
<td>
<p>Public Network</p>
<p>&nbsp;</p>
</td>
<td>
<p>A public network contains components that are outside the control of the user organisation.&nbsp; These components may include telecommunications or data services from a service provider that utilise any component of local, regional or national infrastructure.</p>
</td>
</tr>
<tr>
<td>
<p>Public Switched Telephone Network</p>
</td>
<td>
<p>An historic term describing a public network where voice is communicated using analogue communications. Today almost all communication networks are substantially or entirely digital networks.</p>
</td>
</tr>
<tr>
<td>
<p>Push-To-Talk</p>
</td>
<td>
<p>Handsets that have a button which must be pressed by the user before audio can be communicated, thus improving off-hook audio protection.</p>
</td>
</tr>
<tr>
<td>
<p>Quality Of Service</p>
</td>
<td>
<p>A process to prioritise network traffic based on availability requirements.</p>
</td>
</tr>
<tr>
<td>
<p>Radio Frequency Device</p>
</td>
<td>
<p>Devices including mobile phones, wireless enabled personal devices and laptops.</p>
</td>
</tr>
<tr>
<td>
<p>Reaccreditation</p>
</td>
<td>
<p>A procedure by which an authoritative body gives formal recognition, approval and acceptance of the associated residual security risk with the continued operation of a system.</p>
</td>
</tr>
<tr>
<td>
<p>Reclassification</p>
</td>
<td>
<p>A change to the security measures afforded to information based on a reassessment of the potential impact of its unauthorised disclosure.&nbsp; The lowering of the security measures for media containing classified information often requires sanitisation or destruction processes to be undertaken prior to a formal decision to lower the security measures protecting the information.</p>
</td>
</tr>
<tr>
<td>
<p>Remote Access</p>
</td>
<td>
<p>Access to a system from a location not within the physical control of the system owner.</p>
</td>
</tr>
<tr>
<td>
<p>Removable Media</p>
</td>
<td>
<p>Storage media that can be easily removed from a system and is designed for removal.</p>
</td>
</tr>
<tr>
<td>
<p>Residual Risk</p>
</td>
<td>
<p>The risk remaining after management takes action to reduce the impact and likelihood of an adverse event, including control activities in responding to a risk (Institute of Internal Auditors).&nbsp; Also sometimes referred to as “net risk” or “controlled risk”.</p>
</td>
</tr>
<tr>
<td>
<p>Rogue Wireless Access Point</p>
</td>
<td>
<p>An unauthorised Wireless Access Point operating outside of the control of an agency.</p>
</td>
</tr>
<tr>
<td><strong>Role-Based Access Control</strong></td>
<td>
<p>The Role-Based Access Control model employs pre-defined roles that carry a specific set of privileges associated with them and to which subjects are assigned.</p>
</td>
</tr>
<tr>
<td>
<p>Salt</p>
</td>
<td>
<p>Salts are a random data string added to the start or the end of a hash to strengthen its resistance to attack.&nbsp; Typically used in the generation of a password hash or checksums.</p>
</td>
</tr>
<tr>
<td>
<p>Seconded Foreign National</p>
</td>
<td>
<p>A representative of a foreign government on exchange or long-term posting to an agency.</p>
</td>
</tr>
<tr>
<td>
<p>Secure Area</p>
</td>
<td>
<p>An area that has been certified to physical security requirements as either a Secure Area; a Partially Secure Area; or an Intruder Resistant Area to allow for the processing of classified information. Refer to the PSR for more detail on Physical Security.</p>
</td>
</tr>
<tr>
<td>
<p>Secure Multipurpose Internet Mail Extension</p>
</td>
<td>
<p>A protocol which allows the encryption and signing of Multipurpose Internet Mail Extension-encoded email messages.</p>
</td>
</tr>
<tr>
<td>
<p>Secure Shell</p>
</td>
<td>
<p>A network protocol that can be used to securely log into a remote server or workstation, executing commands on a remote system and securely transfer file(s).</p>
</td>
</tr>
<tr>
<td>
<p>Security Association</p>
</td>
<td>
<p>A collection of connection-specific parameters containing information about a one-way connection within IPSec that is required for each protocol used.</p>
</td>
</tr>
<tr>
<td>
<p>Security Association Lifetimes</p>
</td>
<td>
<p>The duration for which security association information is valid.</p>
</td>
</tr>
<tr>
<td>
<p>Security Domains</p>
</td>
<td>
<p>A system or collection of systems operating under a security policy that defines the classification and releasability of the information processed within the domain. It can be defined by a classification, a community of interest or releasability within a certain classification. This term is NOT synonymous with <em>Trust Zone</em>.</p>
</td>
</tr>
<tr>
<td><strong>Security Domain (Cloud)</strong></td>
<td>
<p>A security domain in public cloud can be categorised as a group of trust zones operating under a common set of security requirements and policies.</p>
</td>
</tr>
<tr>
<td>
<p>Security Domain Owner</p>
</td>
<td>
<p>The individual responsible for the secure configuration of the security domain throughout its life-cycle, including all connections to/from the domain.</p>
</td>
</tr>
<tr>
<td>
<p>Security Risk Management Plan</p>
</td>
<td>
<p>A plan that identifies the risks and appropriate risk treatments including controls needed to meet agency policy.</p>
</td>
</tr>
<tr>
<td>
<p>Security Target</p>
</td>
<td>
<p>An artefact of Common Criteria evaluations.&nbsp; It contains the information security requirements of an identified target of evaluation and specifies the functional and assurance security measures offered by that target of evaluation to meet the stated requirements.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Segmentation</strong></p>
</td>
<td>
<p>Segmentation is a logical grouping of the separate components of a network or system for design, control, installation, security and management purposes.&nbsp; This may occur where similarities of function, control and management exist or will be of advantage.</p>
</td>
</tr>
<tr>
<td>
<p>Segregation</p>
</td>
<td>
<p>Segregation includes the development, enforcement and monitoring of rules in order to control access to systems and information and to manage or restrict the communication between network components, devices, hosts and service.&nbsp; Segregation is essential in all networks but particularly in entirely virtual networks, such as cloud-hosted networks.</p>
</td>
</tr>
<tr>
<td>
<p>Separation</p>
</td>
<td>
<p>Separation includes partitioning and physically dividing systems and networks into smaller components.&nbsp; Separation should be applied as a design and control principle to networks where agencies have physical control over devices and components, such as in-office Wi-Fi systems, MFD’s, desktops, laptops and other system or user devices.</p>
</td>
</tr>
<tr>
<td>
<p>Separation, segmentation and segregation</p>
</td>
<td>
<p>Separation, segmentation and segregation are architectural, design and management strategies to limit the effect and impact of network intrusions and system attacks and exploits.&nbsp; They will improve the ability to detect, and also improve the speed and effectiveness of any response to such events.</p>
</td>
</tr>
<tr>
<td>
<p>Server</p>
</td>
<td>
<p>A computer used to run programs that provide services to multiple users. For example, a file server, email server or database server.</p>
</td>
</tr>
<tr>
<td>
<p>Session Border Controller (SBC)</p>
</td>
<td>
<p>A device (physical or virtual) used in IP networks to control and manage the signalling and media streams of real-time UC and VoIP connections.&nbsp; It includes establishing, controlling, and terminating calls, interactive media communications or other VoIP connections.&nbsp; SBCs enable VoIP traffic to navigate gateways and firewalls and ensure interoperability between different SIP implementations.&nbsp; Careful selection of SBCs will provide such functionality as prevention of toll fraud, resistance to denial of service attacks and resistance to eavesdropping.&nbsp;</p>
</td>
</tr>
<tr>
<td><strong>Shared Responsibility Model</strong></td>
<td>
<p>The responsibility for the selection, implementation, management and maintenance of controls in public cloud services is shared between provider and consumer. Where the responsibilities lie depends on the provider, and the service and deployment models.</p>
</td>
</tr>
<tr>
<td>
<p>Softphone</p>
</td>
<td>
<p>A software application that allows a workstation to act as a VoIP phone, using either a built-in or an externally connected microphone and speaker.</p>
</td>
</tr>
<tr>
<td>
<p>Software Component</p>
</td>
<td>
<p>An element of a system, including but not limited to, a database, operating system, network or Web application.</p>
</td>
</tr>
<tr>
<td>
<p>Solid State Drives</p>
</td>
<td>
<p>Non-volatile media that uses flash memory media to retain its information when power is removed.</p>
</td>
</tr>
<tr>
<td><strong>Split Tunnelling</strong></td>
<td>
<p>The process of allowing a remote user or device to establish a non-remote connection with a system and simultaneously communicate via some other connection to a resource in an external network. This method of network access enables a user to access remote devices, and simultaneously, access uncontrolled networks.</p>
</td>
</tr>
<tr>
<td>
<p>SSH-Agent</p>
</td>
<td>
<p>A programme storing private keys used for public key authentication thus enabling an automated or script-based Secure Shell session.</p>
</td>
</tr>
<tr>
<td>
<p>Standard Operating Environment</p>
</td>
<td>
<p>A standardised build of an operating system and associated software that is deployed on multiple devices. An SOE can be applied to servers, workstations, laptops and mobile devices.</p>
</td>
</tr>
<tr>
<td>
<p>Standard Operating Procedures</p>
</td>
<td>
<p>Procedures for the operation of system and complying with security requirements.</p>
</td>
</tr>
<tr>
<td>
<p>System</p>
</td>
<td>
<p>A related set of IT equipment and software used for the processing, storage or communication of information and the governance framework in which it operates.</p>
</td>
</tr>
<tr>
<td><strong>System Classification</strong></td>
<td>
<p><span>The highest classification of information for which the system is approved to store or process.</span></p>
</td>
</tr>
<tr>
<td><strong>System for Cross-domain Identity Management</strong></td>
<td>
<p>The SCIM protocol is an application-level protocol for provisioning and managing identity data specified through SCIM schemas. A SCIM server provides a set of resources, the allowable contents of which are defined by a set of schema URIs and a resource type. SCIM's schema is not a document-centric one.&nbsp; Instead, SCIM's support of schema is attribute based, where each attribute may have different type, mutability, cardinality, or returnability.</p>
</td>
</tr>
<tr>
<td>
<p>System Owner</p>
</td>
<td>
<p>The person responsible for the information resource.</p>
</td>
</tr>
<tr>
<td>
<p>System Security Plan</p>
</td>
<td>
<p>A formal document that provides an overview of the security requirements for an information system and describes the security controls in place or planned for meeting those requirements.</p>
</td>
</tr>
<tr>
<td>
<p>System User</p>
</td>
<td>
<p>A general user or a privileged user of a system.</p>
</td>
</tr>
<tr>
<td>
<p>Target Of Evaluation</p>
</td>
<td>
<p>The functions of a product subject to evaluation under the Common Criteria.</p>
</td>
</tr>
<tr>
<td>
<p>Technical Surveillance Counter-Measures</p>
</td>
<td>
<p>The process of surveying facilitates to detect the presence of technical surveillance devices and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility.</p>
</td>
</tr>
<tr>
<td>
<p>Telephone</p>
</td>
<td>
<p>A device that converts between sound waves and electronic signals that can be communicated over a distance.</p>
</td>
</tr>
<tr>
<td>
<p>Telephone System</p>
</td>
<td>
<p>A system designed primarily for the transmission of voice traffic.</p>
</td>
</tr>
<tr>
<td>
<p>TEMPEST</p>
</td>
<td>
<p>A short name referring to investigations and studies of compromising emanations.</p>
</td>
</tr>
<tr>
<td>
<p>TEMPEST Rated IT Equipment</p>
</td>
<td>
<p>IT equipment that has been specifically designed to minimise TEMPEST emanations.</p>
</td>
</tr>
<tr>
<td>
<p>The Principle of Least Privilege</p>
</td>
<td>
<p>The minimisation of access rights and permissions for users, accounts, applications, systems, devices and computing processes to the absolute minimum necessary in order to perform routine, authorised activities and maintain the safe and secure operation of agency or organisational systems.</p>
</td>
</tr>
<tr>
<td>
<p>TOP SECRET Area</p>
</td>
<td>
<p>Any area certified to operate at TOP SECRET, containing TOP SECRET servers, workstations or associated network infrastructure.</p>
</td>
</tr>
<tr>
<td>
<p>Traffic Flow Filter</p>
</td>
<td>
<p>A device that has been configured to automatically filter and control the form of network data.</p>
</td>
</tr>
<tr>
<td>
<p>Transfer Gateway</p>
</td>
<td>
<p>Facilitates the secure transfer of information, in one or multiple directions (i.e. low to high or high to low), between different security domains.</p>
</td>
</tr>
<tr>
<td>
<p>Transport Mode</p>
</td>
<td>
<p>An IPSec mode that provides a secure connection between two endpoints by encapsulating an IP payload.</p>
</td>
</tr>
<tr>
<td>
<p>Trust Boundary</p>
</td>
<td>
<p>The interface between two or more Trust Zones.</p>
</td>
</tr>
<tr>
<td>
<p>Trust Zone</p>
</td>
<td>
<p>A logical construct encompassing an area with a high degree of trust between the data, users, providers and the systems. It may include a number of capabilities such as secure boot, codesigning, trusted execution and Digital Rights Management (DRM). This term is NOT synonymous with <em>Security Domain</em>.</p>
</td>
</tr>
<tr>
<td>
<p>Trust Zone (Cloud)</p>
</td>
<td>
<p>In the public cloud environment, trust zones represent combinations of public cloud services (made up of user, system and data object combinations) that are authorised to interact with each other and are protected by a common set of security capabilities.</p>
</td>
</tr>
<tr>
<td>
<p>Trusted Source</p>
</td>
<td>
<p>A person or system formally identified as being capable of reliably producing information meeting defined parameters, such as a maximum data classification and reliably reviewing information produced by others to confirm compliance with defined parameters.</p>
</td>
</tr>
<tr>
<td>
<p>Tunnel Mode</p>
</td>
<td>
<p>An IPSec mode that provides a secure connection between two endpoints by encapsulating an entire IP packet. The entire packet is encrypted and authenticated.</p>
</td>
</tr>
<tr>
<td>
<p>UNCLASSIFIED Information</p>
</td>
<td>
<p>Information that is assessed as not requiring a classification.</p>
</td>
</tr>
<tr>
<td>
<p>UNCLASSIFIED Systems</p>
</td>
<td>
<p>Systems that process, store or communicate information produced by the New Zealand Government that does not require a classification.</p>
</td>
</tr>
<tr>
<td>
<p>Unified Communications&nbsp;</p>
</td>
<td>The integration of real-time and near real time communication and interaction services in an organisation or agency. Unified Communications (UC) may integrate several communication systems including unified messaging, collaboration, and interaction systems; real-time and near real-time communications; and transactional applications.</td>
</tr>
<tr>
<td>
<p>Unsecure Area</p>
</td>
<td>
<p>An area that has not been certified to meet physical security requirements to allow for the processing of classified information.</p>
</td>
</tr>
<tr>
<td>
<p>Virtual Private Network</p>
</td>
<td>
<p>The tunnelling of a network’s traffic through another network, separating the VPN traffic from the underlying network.&nbsp; A VPN can encrypt traffic if necessary.</p>
</td>
</tr>
<tr>
<td>
<p>Virtual Private Network Split Tunnelling</p>
</td>
<td>
<p>Functionality that allows personnel to access both a public network and a VPN connection at the same time, such as an agency system and the Internet.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Virtualisation</strong></p>
</td>
<td>The software simulation of the components of an information system and may include the simulation of hardware, operating systems, applications, infrastructure and storage.</td>
</tr>
<tr>
<td>
<p>Volatile Media</p>
</td>
<td>
<p>A type of media, such as RAM, which gradually loses its information when power is removed.</p>
</td>
</tr>
<tr>
<td>
<p>Waiver</p>
</td>
<td>
<p>The formal acknowledgement that a particular compliance requirement of the NZISM cannot currently be met and that a waiver is granted by the Accreditation Authority on the basis that full compliance with the NZISM is achieved or compensating controls are implemented within a time specified by the Accreditation Authority.&nbsp; Waivers are valid in the short term only and full accreditation cannot be granted until all conditions of the waiver have been met.</p>
</td>
</tr>
<tr>
<td>
<p>Waivers and Exceptions</p>
</td>
<td>
<p>A waiver means that some alternative controls or conditions are implemented. An exception means that the requirement need not be followed. An exception is NOT the same as a waiver.&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p>Wear Levelling</p>
</td>
<td>
<p>A technique used in flash memory that is used to prolong the life of the media.&nbsp; Data can be written to and erased from an address on flash memory a finite number of times.&nbsp; The wear levelling algorithm helps to distribute writes evenly across each memory block, thereby decreasing the wear on the media and increasing its lifetime.&nbsp; The algorithm ensures that updated or new data is written to the first available free block with the least number of writes.&nbsp; This creates free blocks that previously contained data.</p>
</td>
</tr>
<tr>
<td>
<p>WEEE</p>
</td>
<td>
<p class="Head2-S13">Electrical and electronic equipment contains a complex mix of materials, components and substances, many which can be poisonous, carcinogenic or toxic in particulate or dust form. This is known as Waste from Electrical and electronic equipment (WEEE).</p>
<p>Destruction and disposal of WEEE needs to be managed carefully to avoid the potential of serious health risk or environmental hazard.&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p>Wi-Fi Protected Access</p>
</td>
<td>
<p>Protocols designed to replace WEP. They refer to components of the 802.11i security standard.</p>
</td>
</tr>
<tr>
<td>
<p>Wired Equivalent Privacy</p>
</td>
<td>
<p>Wired Equivalent Privacy (WEP), a deprecated 802.11 security standard.</p>
</td>
</tr>
<tr>
<td>
<p>Wireless Access Point</p>
</td>
<td>
<p>Typically also the device which connects the wireless local area network to the wired local area network. Also known as AP</p>
</td>
</tr>
<tr>
<td>
<p>Wireless Communications</p>
</td>
<td>
<p>The transmission of data over a communications path using electromagnetic waves rather than a wired medium.</p>
</td>
</tr>
<tr>
<td>
<p>Wireless Local Area Network</p>
</td>
<td>
<p>A network based upon the 802.11 set of standards.&nbsp; Such networks are often referred to as wireless networks.</p>
</td>
</tr>
<tr>
<td>
<p>Workstation</p>
</td>
<td>
<p>A stand-alone or networked single-user computer.</p>
</td>
</tr>
<tr>
<td>
<p>X11 Forwarding</p>
</td>
<td>
<p>X11, also known as the X Window System, is a basic method of video display used in a variety of operating systems.&nbsp; X11 forwarding allows the video display from one network node to be shown on another node.</p>
</td>
</tr>
<tr>
<td>
<p>Zero Trust</p>
</td>
<td>
<p>Zero Trust is a security concept based around the idea that systems and users should not be given access to any information without verification, even when they are connected to internal networks.&nbsp;&nbsp;</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
</section>
</chapter>


</xml>
