<section title="8.2. Servers And Network Devices"><subsection title="Objective"><paragraph
    title="8.2.1."


><![CDATA[<p>Secured server and communications rooms provide appropriate physical security for servers and network devices.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="8.2.2."


><![CDATA[<p>This section covers the physical security of servers and network devices. Information relating to network infrastructure and IT equipment can be found in other sections of this chapter.</p>]]></paragraph>
</block>
<block title="Secured server and communications rooms"><paragraph
    title="8.2.3."


><![CDATA[<p>In order to reduce physical security requirements for information systems infrastructure, other network devices and servers, agencies may choose to certify and accredit the physical security of the site or IT equipment room to the standard specified in the PSR. This has the effect of providing an additional layer of physical security. See <a title="PSR - Physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR - Physical Security</a></p>]]></paragraph>
<paragraph
    title="8.2.4."


><![CDATA[<p>Agencies choosing NOT to certify and accredit the physical security of the site or IT equipment room, must continue to meet the full storage requirements specified in the PSR.&nbsp; See <a title="PSR - Physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR - Physical Security</a>, <a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">PSR - Information Security</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Securing servers and network devices"><paragraph
    title="8.2.5.R.01."

    tags="Governance,Physical Security,Accreditation"


><![CDATA[<p>Security containers for IT infrastructure, network devices or servers situated in an unsecure area must be compliant with the requirements of the <a title="PSR physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>. Installing IT infrastructure, network devices or servers in a secure facility can lower the storage requirements, provided multiple layers of physical security have been implemented, certified and accredited.</p>]]></paragraph>
<paragraph
    title="8.2.5.R.02."

    tags="Governance,Physical Security"


><![CDATA[<p>The establishment of a secure communications room to house IT infrastructure, network devices, and other related equipment will provide a further physical security layer.</p>]]></paragraph>
<paragraph
    title="8.2.5.C.01."

    tags="Governance,Physical Security"


    classification="All Classifications"
    compliance="Must"
    cid="1349"
><![CDATA[<p>Agencies MUST ensure that servers and network devices are secured within cabinets as outlined in <a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR Policy Framework - Physical security</a> and&nbsp;supporting documentation.</p>]]></paragraph>
</block>
<block title="Securing server rooms, communications rooms and security containers"><paragraph
    title="8.2.6.R.01."

    tags="Governance,Physical Security"


><![CDATA[<p>If personnel decide to leave server rooms, communications rooms or security containers with keys in locks, unlocked or with security functions disabled it negates the purpose of providing security in the first place. Such activities will compromise the security efforts of the agencies and should not be permitted by the agency.</p>]]></paragraph>
<paragraph
    title="8.2.6.C.01."

    tags="Governance,Physical Security"


    classification="All Classifications"
    compliance="Must"
    cid="1353"
><![CDATA[<p>Agencies MUST ensure that keys or equivalent access mechanisms to server rooms, communications rooms and security containers are appropriately controlled.</p>]]></paragraph>
<paragraph
    title="8.2.6.C.02."

    tags="Governance,Physical Security"


    classification="All Classifications"
    compliance="Must Not"
    cid="1354"
><![CDATA[<p>Agencies MUST NOT leave server rooms, communications rooms or security containers in an unsecured state unless the server room is occupied by authorised personnel.</p>]]></paragraph>
</block>
<block title="Administrative measures - Site security plans"><paragraph
    title="8.2.7.R.01."

    tags="Governance,Physical Security,Site Plan"


><![CDATA[<p>Site security plans (SitePlan), the physical security equivalent of the SSP and SOPs for systems, are used to document all aspects of physical security for systems. Formally documenting this information ensures that standards, controls and procedures can easily be reviewed by security personnel.</p>]]></paragraph>
<paragraph
    title="8.2.7.C.01."

    tags="Governance,Physical Security,Site Plan"


    classification="All Classifications"
    compliance="Must"
    cid="1357"
><![CDATA[<p>Agencies MUST develop a Site Security Plan (SitePlan) for each server and communications room. Information to be covered includes, but is not limited to:</p><ul>
<li>a summary of the security risk review for the facility the server or communications room is located in;</li>
<li>roles and responsibilities of facility and security personnel;</li>
<li>the administration, operation and maintenance of the electronic access control system or security alarm system;</li>
<li>key management, the enrolment and removal of system users and issuing of personal identification number codes and passwords;</li>
<li>personnel security clearances, security awareness training and regular briefings;</li>
<li>regular inspection of the generated audit trails and logs;</li>
<li>end of day checks and lockup;</li>
<li>reporting of information security incidents; and</li>
<li>what activities to undertake in response to security alarms.</li>
</ul>]]></paragraph>
</block>
<block title="No-lone-zones"><paragraph
    title="8.2.8.R.01."

    tags="Governance,Physical Security"


><![CDATA[<p>Areas containing particularly sensitive materials or IT equipment can be provided with additional security through the use of a designated no-lone-zone. The aim of this designation is to enforce two-person integrity, where all actions are witnessed by at least one other person.</p>]]></paragraph>
<paragraph
    title="8.2.8.C.01."

    tags="Governance,Physical Security"


    classification="All Classifications"
    compliance="Must"
    cid="1360"
><![CDATA[<p>Agencies operating no-lone-zones MUST suitably signpost the area and have all entry and exit points appropriately secured.</p>]]></paragraph>
</block>
</subsection>
</section>
