<section title="8.3. Network Infrastructure"><subsection title="Objective"><paragraph
    title="8.3.1."


><![CDATA[<p>Network infrastructure is protected by secure facilities and the use of encryption technologies.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="8.3.2."


><![CDATA[<p>This section covers information relating to the physical security of network infrastructure. Information relating to servers, network devices and IT equipment can be found in other sections of this chapter. Additionally, information on using encryption for infrastructure in unsecure areas can be found in <a title="Cryptographic Fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-15746">Section 17.1 - Cryptographic Fundamentals.</a></p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Network infrastructure in secure areas"><paragraph
    title="8.3.3.R.01."

    tags="Network Security,Technical,Physical Security,Network Infrastructure"


><![CDATA[<p>Network infrastructure is considered to process information being communicated across it and as such needs to meet the minimum physical security requirements for processing classified information as specified in the <a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR Policy Framework - Physical security</a>, and supporting document.</p>]]></paragraph>
<paragraph
    title="8.3.3.R.02."

    tags="Encryption,Network Security,Technical,Physical Security,Network Infrastructure"


><![CDATA[<p>The physical security requirements for network infrastructure can be lowered if encryption is being applied to classified information communicated over the infrastructure (i.e. data in transit encryption). Note this does NOT change the classification of the data itself, only the physical protection requirements.</p>]]></paragraph>
<paragraph
    title="8.3.3.R.03."

    tags="Network Security,Technical,Physical Security,Network Infrastructure"


><![CDATA[<p>It is important to note that physical controls do not provide any protection against malicious software or other malicious entities that may be residing on or have access to the system.</p>]]></paragraph>
<paragraph
    title="8.3.3.R.04."

    tags="Network Security,Technical,Physical Security,Network Infrastructure"


><![CDATA[<p>If classified information being communicated over the infrastructure is not encrypted the malicious entry can capture, corrupt or modify the traffic to assist in furthering any attempts to exploit the network and the information being communicated across it.</p>]]></paragraph>
<paragraph
    title="8.3.3.C.01."

    tags="Network Security,Technical,Physical Security,Network Infrastructure"


    classification="All Classifications"
    compliance="Must"
    cid="1373"
><![CDATA[<p>Agencies MUST certify the physical security of facilities containing network infrastructure to the highest classification of information being communicated over the network infrastructure.</p>]]></paragraph>
<paragraph
    title="8.3.3.C.02."

    tags="Cryptography,Network Security,Technical,Physical Security,Network Infrastructure"


    classification="All Classifications"
    compliance="Should"
    cid="1374"
><![CDATA[<p>Agencies communicating classified information over infrastructure in secure areas SHOULD encrypt their information with at least an Approved Cryptographic Protocol. <a title="Approved cryptographic protocols" href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">See Section 17.3 – Approved Cryptographic Protocols</a>.</p>]]></paragraph>
</block>
<block title="Protecting network infrastructure"><paragraph
    title="8.3.4.R.01."

    tags="Network Security,Technical,Physical Security,Network Infrastructure"


><![CDATA[<p>In order to prevent tampering with patch panels, fibre distribution panels and structured wiring, any such enclosures need to be placed within at least lockable commercial cabinets. Furthermore, keys for such cabinets should not be remain in locks as this defeats the purpose of using lockable commercial cabinets in the first place.</p>]]></paragraph>
<paragraph
    title="8.3.4.C.01."

    tags="Network Security,Technical,Physical Security,Network Infrastructure"


    classification="Top Secret"
    compliance="Must"
    cid="1377"
><![CDATA[<p>Agencies MUST locate patch panels, fibre distribution panels and structured wiring enclosures within at least lockable commercial cabinets.</p>]]></paragraph>
<paragraph
    title="8.3.4.C.02."

    tags="Network Security,Technical,Physical Security,Network Infrastructure"


    classification="All Classifications"
    compliance="Should"
    cid="1378"
><![CDATA[<p>Agencies SHOULD locate patch panels, fibre distribution panels and structured wiring enclosures within at least lockable commercial cabinets.</p>]]></paragraph>
</block>
<block title="Network infrastructure in unsecure areas"><paragraph
    title="8.3.5.R.01."

    tags="Encryption,Network Security,Technical,Physical Security,Network Infrastructure"


><![CDATA[<p>As agencies lose control over classified information when it is communicated over unsecure public network infrastructure or over infrastructure in unsecure areas they MUST ensure that it is encrypted to a sufficient level that if it was captured that it would be sufficiently difficult to determine the original information from the encrypted information.</p>]]></paragraph>
<paragraph
    title="8.3.5.R.02."

    tags="Encryption,Network Security,Technical,Physical Security,Network Infrastructure"


><![CDATA[<p>Encryption does not change the class level of the information itself but allows reduced handling requirements to be applied.</p>]]></paragraph>
<paragraph
    title="8.3.5.C.01."

    tags="Encryption,Network Security,Technical,Physical Security,Network Infrastructure"


    classification="All Classifications"
    compliance="Must"
    cid="1382"
><![CDATA[<p>Agencies communicating classified information over public network infrastructure or over infrastructure in unsecure areas MUST use encryption to lower the handling instructions to be equivalent to those for unclassified networks.<br><br></p>]]></paragraph>
</block>
</subsection>
</section>
