<section title="8.1. Facilities"><subsection title="Objective"><paragraph
    title="8.1.1."


><![CDATA[<p>Physical security measures are applied to facilities in order to protect systems and their infrastructure.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="8.1.2."


><![CDATA[<p>This section covers information on the physical security of facilities. Information on physical security controls for servers and network devices, network infrastructure and IT equipment can be found in the following sections of this chapter.</p>]]></paragraph>
</block>
<block title="Physical security requirements for storing classified information"><paragraph
    title="8.1.3."


><![CDATA[<p>Many of the physical controls in this manual are derived from the <a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR Policy framework - Physical security (PHYSEC)</a>&nbsp;within the <a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">Protective Security Requirements (PSR)</a>. In particular from the minimum standard for security containers, secure rooms or lockable commercial cabinets needed for storing classified information.</p>]]></paragraph>
</block>
<block title="Secure and unsecure areas"><paragraph
    title="8.1.4."


><![CDATA[<p>In the context of this manual a secure area may be a single room or a facility that has security measures in place for the processing of classified information, or may encompass an entire building.</p>]]></paragraph>
</block>
<block title="Physical security certification authorities"><paragraph
    title="8.1.5."


><![CDATA[<p>The certification of an agency’s physical security measures is an essential part of the certification and accreditation process. The authority and responsibility are listed in the table below:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Classification</strong></td>
<td><strong>Authority</strong></td>
<td><strong>Responsibility</strong></td>
</tr>
<tr>
<td><strong>SECRET</strong></td>
<td>CSO</td>
<td>Physical</td>
</tr>
<tr>
<td><strong>TOP SECRET</strong></td>
<td>NZSIS</td>
<td>Physical</td>
</tr>
<tr>
<td><strong>TOP SECRET SCIF</strong></td>
<td>GCSB</td>
<td>
<p>Network Infrastructure</p>
<p>Technical Security</p>
<p>Surveillance Counter Measures</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="8.1.6."


><![CDATA[<p>Top Secret (TS) physical certification should be completed before any Technical inspections and certifications occur.</p>]]></paragraph>
</block>
<block title="Facilities located outside of New Zealand"><paragraph
    title="8.1.7."


><![CDATA[<p>Agencies operating sites located outside of New Zealand can contact GCSB to determine any additional requirements which may exist such as technical surveillance and oversight counter-measures and testing.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="8.1.8."


><![CDATA[<p>High-level information relating to physical security is also contained in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27002:2022</strong></p>
<p class="no-uppercase">&nbsp;</p>
</td>
<td>&nbsp;<strong>Information security, cybersecurity and privacy protection — Information security controls</strong></td>
<td style="text-align: center;">
<p>ISO</p>
<p>&nbsp;</p>
</td>
<td>
<p><a title="ISO/IEC 27002:2022" rel="noopener noreferrer" href="https://www.iso.org/standard/75652.html" target="_blank">https://www.iso.org/standard/75652.html</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="8.1.9."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 100%;">
<tbody>
<tr>
<td style="width: 19.8192%;">
<p><strong>Reference</strong></p>
</td>
<td style="width: 45.029%;">
<p><strong>Title</strong></p>
</td>
<td style="width: 35.117%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 19.8192%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 45.029%;">
<p>GOV2, GOV6, GOV7, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1, PHYSEC2, PHYSEC3 and PHYSEC4</p>
</td>
<td style="width: 35.117%;">
<p><a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank"></a><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<p><a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a><a title="PSR Mandatory Requirements - Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/physical-security/physical-security-mandatory-requirements-2/" target="_blank"></a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Facility physical security"><paragraph
    title="8.1.10.R.01."

    tags="Governance,Physical Security,Facilities"


><![CDATA[<p>The application of defence-in-depth to the protection of systems and infrastructure is enhanced through the use of successive layers of physical security.</p>
<p>Typically the layers of security are:</p>
<ul>
<li>site;</li>
<li>building;</li>
<li>room;</li>
<li>racks;</li>
<li>approved containers;</li>
<li>operational hours; and</li>
<li>staffing levels.</li>
</ul>]]></paragraph>
<paragraph
    title="8.1.10.R.02."

    tags="Governance,Physical Security,Facilities"


><![CDATA[<p>All layers are designed to control and limit access to those with the appropriate authorisation for the site, infrastructure and system. Deployable platforms need to meet physical security certification requirements as with any other system. Physical security certification authorities dealing with deployable platforms may have specific requirements that supersede the requirements of this manual and as such security personnel should contact their appropriate physical security certification authority to seek guidance.</p>]]></paragraph>
<paragraph
    title="8.1.10.C.01."

    tags="Governance,Physical Security,Facilities"


    classification="All Classifications"
    compliance="Must"
    cid="1323"
><![CDATA[<p>Agencies MUST ensure that any facility containing a system or its associated infrastructure, including deployable systems, are certified and accredited in accordance with the <a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>.</p>]]></paragraph>
</block>
<block title="Preventing observation by unauthorised people"><paragraph
    title="8.1.11.R.01."

    tags="Governance,Physical Security,Facilities"


><![CDATA[<p>Agency facilities without sufficient perimeter security are often exposed to the potential for observation through windows or open doors. This is sometimes described as the risk of oversight. Ensuring classified information on desks and computer screens is not visible will assist in reducing this security risk.</p>]]></paragraph>
<paragraph
    title="8.1.11.C.01."

    tags="Governance,Physical Security,Facilities"


    classification="All Classifications"
    compliance="Should"
    cid="1326"
><![CDATA[<p>Agencies SHOULD prevent unauthorised people from observing systems, in particular desks, screens and keyboards.</p>]]></paragraph>
<paragraph
    title="8.1.11.C.02."

    tags="Governance,Physical Security,Facilities"


    classification="All Classifications"
    compliance="Should"
    cid="1327"
><![CDATA[<p>Agencies SHOULD position desks, screens and keyboards away from windows and doorways so that they cannot be overseen by unauthorised persons.  If required, blinds or drapes SHOULD be fixed to the inside of windows, and doors kept closed to avoid oversight.</p>]]></paragraph>
</block>
<block title="Bringing non-agency owned devices into secure areas"><paragraph
    title="8.1.12.R.01."

    tags="Governance,Physical Security,Facilities"


><![CDATA[<p>No non-agency owned devices are to be brought into TOP SECRET areas without their prior approval of the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="8.1.12.C.01."

    tags="Governance,Physical Security,Facilities"


    classification="Top Secret"
    compliance="Must Not"
    cid="1330"
><![CDATA[<p>Agencies MUST NOT permit non-agency owned devices to be brought into TOP SECRET areas without prior approval from the Accreditation Authority.</p>]]></paragraph>
</block>
<block title="Technical Inspection and surveillance counter-measure testing"><paragraph
    title="8.1.13.R.01."

    tags="Governance,Physical Security,Facilities"


><![CDATA[<p>Technical surveillance counter-measure testing is conducted as part of the physical security certification to ensure that facilities do not have any unauthorised listening devices or other surveillance devices installed and that physical security measures are compatible with technical controls. This testing and inspection will normally occur AFTER the physical site accreditation has been completed (in accordance with the <a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>). Further testing may also be necessary after uncleared access to the secure facility, such as contractors or visitors.</p>]]></paragraph>
<paragraph
    title="8.1.13.C.01."

    tags="Governance,Physical Security,Facilities"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="1333"
><![CDATA[<p>Agencies MUST ensure that technical surveillance counter-measure tests are conducted as a part of the physical security certification.</p>]]></paragraph>
<paragraph
    title="8.1.13.C.02."

    tags="Governance,Physical Security,Facilities"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="1334"
><![CDATA[<p>Agencies MUST determine if further technical surveillance counter-measure testing is required, particularly if visitors or contractors have entered secure areas.</p>]]></paragraph>
</block>
</subsection>
</section>
