<section title="8.4. IT Equipment"><subsection title="Objective"><paragraph
    title="8.4.1."


><![CDATA[<p>IT equipment is secured outside of normal working hours, is non-operational or when work areas are unoccupied.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="8.4.2."


><![CDATA[<p>This section covers information relating to the physical security of IT equipment containing media. This includes but is not limited to workstations, printers, photocopiers, scanners and multi-function devices (MFDs).</p>]]></paragraph>
<paragraph
    title="8.4.3."


><![CDATA[<p>Additional information relating to IT equipment and media can be found in the following chapters and sections of this manual:</p><ul>
<li><a title="Fax machines, Multifunction Devices and Network Printers" href="http://nzism.gcsb.govt.nz/ism-document#Section-13999">Section 11.2 - Fax Machines, Multifunction Devices and Network Printers</a>;</li>
<li><a title="Product security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 - Product Security</a>; and</li>
<li><a title="Decommissioning and Disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 – Decommissioning and Disposal</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Handling IT equipment containing media"><paragraph
    title="8.4.4."


><![CDATA[<p>During non-operational hours agencies need to store media containing classified information that resides within IT equipment in accordance with the requirements of the <a title="PSR Physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>. Agencies can comply with this requirement by undertaking one of the following processes:</p>
<ul>
<li>ensuring IT equipment always reside in an appropriate class of secure room;</li>
<li>storing IT equipment during non-operational hours in an appropriate class of security container or lockable commercial cabinet;</li>
<li>using IT equipment with removable non-volatile media which is stored during non-operational hours in an appropriate class of security container or lockable commercial cabinet as well as securing its volatile media;</li>
<li>using IT equipment without non-volatile media as well as securing its volatile media;</li>
<li>using an encryption product to reduce the physical storage requirements of the non-volatile media as well as securing its volatile media; or</li>
<li>configuring IT equipment to prevent the storage of classified information on the non-volatile media when in use and enforcing scrubbing of temporary data at logoff or shutdown as well as securing its volatile media.</li>
</ul>]]></paragraph>
<paragraph
    title="8.4.5."


><![CDATA[<p>The intent of using cryptography or preventing the storage of classified information on non-volatile media is to enable agencies to treat the media within IT equipment in accordance with the storage requirements of a lower classification, as specified in the <a title="PSR Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>, during non-operational hours. Temporary data should be deleted at log off or shut down and volatile media secured.</p>]]></paragraph>
<paragraph
    title="8.4.6."


><![CDATA[<p>As the process of using cryptography and preventing the storage of classified information on non-volatile media does not constitute the sanitisation and reclassification of the media, the media retains its classification for the purposes of reuse, reclassification, declassification, sanitisation, destruction and disposal requirements as specified in this manual.</p>]]></paragraph>
</block>
<block title="IT equipment using hybrid hard drives or solid state drives"><paragraph
    title="8.4.7."


><![CDATA[<p>The process of preventing the storage of classified information on non-volatile media, and enforcing deletion of temporary data at logoff or shutdown, is NOT approved as a method of lowering the storage requirements, when hybrid hard drives or solid state drives are used.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Accounting for IT equipment"><paragraph
    title="8.4.8.R.01."

    tags="Governance,IT Equipment,Media Management,Physical Security"


><![CDATA[<p>Ensuring that IT equipment containing media is accounted for by using asset registers, equipment registers, operational &amp; configuration records and regular audits will assist in preventing loss or theft, or in the cases of loss or theft, alerting appropriate authorities to its loss or theft.</p>]]></paragraph>
<paragraph
    title="8.4.8.R.02."

    tags="Governance,IT Equipment,Media Management,Physical Security"


><![CDATA[<p>Asset registers may not provide a complete record as financial limits may result in smaller value items not being recorded. In such cases other registers and operational information can be utilised to assist in building a more complete record.</p>]]></paragraph>
<paragraph
    title="8.4.8.C.01."

    tags="Governance,IT Equipment,Media Management,Physical Security"


    classification="All Classifications"
    compliance="Must"
    cid="1400"
><![CDATA[<p>Agencies MUST account for all IT equipment containing media.</p>]]></paragraph>
</block>
<block title="Processing requirements"><paragraph
    title="8.4.9.R.01."

    tags="Governance,IT Equipment,Classifying Media,Media Management,Physical Security,Certification"


><![CDATA[<p>As the media within IT equipment takes on the classification of the information it is processing, the area that it is used within needs to be certified to a level that is appropriate for the classification of that information.</p>]]></paragraph>
<paragraph
    title="8.4.9.C.01."

    tags="Governance,IT Equipment,Media Management,Physical Security,Certification,Facilities"


    classification="All Classifications"
    compliance="Must"
    cid="1407"
><![CDATA[<p>Agencies MUST certify the physical security of facilities containing IT equipment to the highest classification of information being processed, stored or communicated by the equipment within the facilities.</p>]]></paragraph>
</block>
<block title="Storage requirements"><paragraph
    title="8.4.10.R.01."

    tags="Governance,IT Equipment,Media Management,Physical Security,Certification"


><![CDATA[<p>The <a title="PSR Physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a> states that either Class C, B or A secure rooms or Class C, B or A security containers or lockable commercial cabinets can be used to meet physical security requirements for the storage of IT equipment containing media. The class of secure room or security container will depend on the physical security certification of the surrounding area and the classification of the information.</p>]]></paragraph>
<paragraph
    title="8.4.10.C.01."

    tags="Governance,IT Equipment,Media Management,Physical Security,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="1403"
><![CDATA[<p>Agencies MUST ensure that when secure areas are non-operational or when work areas are unoccupied IT equipment with media is secured in accordance with the minimum physical security requirements for storing classified information as specified in the <a title="PSR Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR Policy Framework - Physical security</a> and&nbsp;supporting documents.</p>]]></paragraph>
</block>
<block title="Securing non-volatile media for storage"><paragraph
    title="8.4.11.R.01."

    tags="Governance,Media Handling,Media Management,Physical Security"


><![CDATA[<p>The use of techniques to prevent the storage of classified information on non-volatile media and processes to delete temporary data at logoff or shutdown may sound secure but there is no guarantee that they will always work effectively or will not be bypassed in unexpected circumstances such as a loss of power. As such, agencies need to consider these risks when implementing such a solution.</p>]]></paragraph>
<paragraph
    title="8.4.11.C.01."

    tags="Governance,IT Equipment,Media Handling,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="1409"
><![CDATA[<p>Agencies choosing to prevent the storage of classified information on non-volatile media and enforcing scrubbing of temporary data at logoff or shutdown SHOULD:</p><ul>
<li>assess the security risks associated with such a decision; and</li>
<li>specify the processes and conditions for their application within the system’s SSP.</li>
</ul><p> </p>]]></paragraph>
</block>
<block title="Securing volatile media for storage"><paragraph
    title="8.4.12.R.01."

    tags="Governance,IT Equipment,Media Handling,Physical Security"


><![CDATA[<p>If agencies need to conduct a security risk assessment as part of the procedure for storing IT equipment containing media during non-operation hours, they should consider security risks such as:</p><ul>
<li>an attacker gaining access to the IT equipment immediately after power is removed and accessing the contents of volatile media to recover encryption keys or parts thereof. This is sometimes described as a data remanence attack;</li>
<li>extreme environmental conditions causing data to remain in volatile media for extended periods after the removal of power; and</li>
<li>the physical security of the locations in which the IT equipment will reside.</li>
</ul>]]></paragraph>
<paragraph
    title="8.4.12.C.01."

    tags="Governance,IT Equipment,Media Handling,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="1412"
><![CDATA[<p>Agencies securing volatile media for IT equipment during non-operational hours SHOULD:</p><ul>
<li>disconnect power from the equipment the media resides within;</li>
<li>assess the security risks if not sanitising the media; and</li>
<li>specify any additional processes and controls that will be applied within the system’s SSP.</li>
</ul>]]></paragraph>
</block>
<block title="Encrypting media within IT equipment"><paragraph
    title="8.4.13.R.01."

    tags="Encryption,Governance,IT Equipment,Media Handling,Physical Security"


><![CDATA[<p>Current industry good practice is to encrypt all media within IT equipment. Newer operating systems provide this functionality and older operating systems can be supported with the use of open source or proprietary applications.</p>]]></paragraph>
<paragraph
    title="8.4.13.C.01."

    tags="Approved Cryptographic Algorithms,Encryption,IT Equipment,Technical,Media Handling,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="1415"
><![CDATA[<p>Agencies SHOULD encrypt media within IT equipment with an Approved Cryptographic Algorithm. See <a title="Approved Cryptographic Algorithms" href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">Section 17.2 - Approved Cryptographic Algorithms</a>.</p>]]></paragraph>
</block>
</subsection>
</section>
