<section title="10.4. Cable Management for Shared Non-Government Facilities"><subsection title="Objective"><paragraph
    title="10.4.1."

    tags="Technical"


><![CDATA[<p>Cable management systems are implemented in shared non-government facilities to minimise risks to data and information.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="10.4.2."


><![CDATA[<p>This section provides specific requirements for cabling installed in facilities shared by agencies and non-government organisations. This section is to be applied in addition to common requirements for cabling as outlined in <a title="Cable management fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-13522">Section 10.1 - Cable Management Fundamentals</a> section.</p>]]></paragraph>
</block>
<block title="Applicability of controls within this section"><paragraph
    title="10.4.3."


><![CDATA[<p>The controls within this section are applicable only to communications infrastructure located within facilities in New Zealand. For deployable platforms or facilities outside New Zealand, Emanation Security Threat Assessments (<a title="Emanation Security Threat Assessments" href="http://nzism.gcsb.govt.nz/ism-document#Section-13859">Section 10.7</a>) of this chapter of this manual MUST be consulted.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Use of fibre optic cabling"><paragraph
    title="10.4.4.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>Fibre optic cabling is essential in a shared non-government facility. Fibre optic cabling does not produce and is not influenced by electromagnetic emanations; as such it offers the highest degree of protection from electromagnetic emanation effects especially in a shared non-government facility where an agency’s controls may have a limited effect outside the agency controlled area.</p>]]></paragraph>
<paragraph
    title="10.4.4.R.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>Fibre optic cable is more difficult to tap than copper cabling and anti-tampering monitoring can be employed to detect tampering.</p>]]></paragraph>
<paragraph
    title="10.4.4.R.03."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>Many more fibres can be run per cable diameter than wired cables, reducing cable infrastructure costs.</p>]]></paragraph>
<paragraph
    title="10.4.4.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2335"
><![CDATA[<p>In TOP SECRET areas, agencies MUST use fibre optic cabling.</p>]]></paragraph>
<paragraph
    title="10.4.4.C.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2336"
><![CDATA[<p>Agencies SHOULD use fibre optic cabling.</p>]]></paragraph>
</block>
<block title="Cabling inspection"><paragraph
    title="10.4.5.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>In a shared non-government facility, it is imperative that cabling systems be inspectable for tampering and damage on a regular basis particularly where higher threat levels exist or where threats are unknown.</p>]]></paragraph>
<paragraph
    title="10.4.5.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2340"
><![CDATA[<p>In TOP SECRET areas, cables MUST be fully inspectable for their entire length.</p>]]></paragraph>
<paragraph
    title="10.4.5.C.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2341"
><![CDATA[<p>Cabling SHOULD be inspectable at a minimum of five-metre intervals.</p>]]></paragraph>
</block>
<block title="Cables sharing a common reticulation system"><paragraph
    title="10.4.6.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>In a shared non-government facility, tighter controls are placed on sharing reticulation systems as the threats attributable to tampering and damage are increased.</p>]]></paragraph>
<paragraph
    title="10.4.6.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2344"
><![CDATA[<p>In TOP SECRET areas, approved cable groups can share a common reticulation system but MUST have either a dividing partition or a visible gap between the differing cable groups.</p>]]></paragraph>
<paragraph
    title="10.4.6.C.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2345"
><![CDATA[<p>TOP SECRET cabling MUST run in a non-shared, enclosed reticulation system.</p>]]></paragraph>
<paragraph
    title="10.4.6.C.03."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2346"
><![CDATA[<p>Approved cable groups can share a common reticulation system but SHOULD have either a dividing partition or a visible gap between the differing cable groups.</p>]]></paragraph>
</block>
<block title="Enclosed cable reticulation systems"><paragraph
    title="10.4.7.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>In a shared non-government facility, TOP SECRET cabling is enclosed in a sealed reticulation system to prevent access and control cable management.</p>]]></paragraph>
<paragraph
    title="10.4.7.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2349"
><![CDATA[<p>In TOP SECRET areas, the front covers for conduits and cable trays in floors, ceilings and of associated fittings MUST be clear plastic or be inspectable and have tamper proof seals fitted.</p>]]></paragraph>
<paragraph
    title="10.4.7.C.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2350"
><![CDATA[<p>The front covers of conduits, ducts and cable trays in floors, ceilings and of associated fittings SHOULD be clear plastic or be inspectable and have tamper proof seals fitted.</p>]]></paragraph>
</block>
<block title="Cabling in walls or party walls"><paragraph
    title="10.4.8.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>In a shared non-government facility, cabling run correctly in walls allows for neater installations facilitating separation and inspectability. Controls are more stringent than in a non-shared facility or a shared government facility.</p>]]></paragraph>
<paragraph
    title="10.4.8.R.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>A party wall is a wall shared with an unclassified area where there is no control over access. In a shared non-government facility, cabling is not allowed in a party wall. An inner wall can be used to run cabling where the area is sufficient for inspection of the cabling.</p>]]></paragraph>
<paragraph
    title="10.4.8.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Confidential, Secret, Top Secret"
    compliance="Must Not"
    cid="2354"
><![CDATA[<p>Cabling MUST NOT run in a party wall.</p>]]></paragraph>
</block>
<block title="Sealing reticulation systems"><paragraph
    title="10.4.9.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>In a shared non-government facility, where the threats of access to cable reticulation systems is increased, GCSB endorsed anti-tamper seals are required to provide evidence of any tampering or illicit access.</p>]]></paragraph>
<paragraph
    title="10.4.9.R.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>In a shared non-government facility, all conduit joints and wall penetrations are sealed with a visible smear of glue or sealant to prevent access to cabling.</p>]]></paragraph>
<paragraph
    title="10.4.9.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2358"
><![CDATA[<p>Agencies MUST use GCSB endorsed tamper evident seals to seal all removable covers on reticulation systems, including:</p><ul>
<li>conduit inspection boxes;</li>
<li>outlet and junction boxes; and</li>
<li>T-pieces.</li>
</ul>]]></paragraph>
<paragraph
    title="10.4.9.C.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2359"
><![CDATA[<p>Tamper evident seals MUST be uniquely identifiable and a register kept of their unique number and location.</p>]]></paragraph>
<paragraph
    title="10.4.9.C.03."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret"
    compliance="Must"
    cid="2360"
><![CDATA[<p>Conduit joints MUST be sealed with glue or sealant.</p>]]></paragraph>
<paragraph
    title="10.4.9.C.04."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2361"
><![CDATA[<p>Conduit joints SHOULD be sealed with glue or sealant.</p>]]></paragraph>
</block>
<block title="Wall penetrations"><paragraph
    title="10.4.10.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>A cable wall penetration into a lesser-classified area requires the integrity of the classified area be maintained. All cabling is encased in conduit with no gaps in the wall around the conduit. This prevents any visual access to the secure area.</p>]]></paragraph>
<paragraph
    title="10.4.10.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="2365"
><![CDATA[<p>Wall penetrations that exit into a lower classified area, cabling MUST be encased in conduit with all gaps between the conduit and the wall filled with an appropriate sealing compound.</p>]]></paragraph>
</block>
<block title="Power reticulation"><paragraph
    title="10.4.11.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>In a shared non-government facility, it is important that TOP SECRET systems have control over the power system to prevent denial of service by deliberate or accidental means. The addition of a UPS is required to maintain availability of the TOP SECRET systems.</p>]]></paragraph>
<paragraph
    title="10.4.11.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="2368"
><![CDATA[<p>Secure facilities MUST have a power distribution board located within the secure area and supply UPS power all equipment.</p>]]></paragraph>
</block>
<block title="Power Filters"><paragraph
    title="10.4.12.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>Power filters are used to provide filtered (clean) power and reduce opportunity for technical attacks. Refer to <a title="Power Filters" href="http://nzism.gcsb.govt.nz/ism-document#Block-13568">10.1.32</a> or consult the GCSB for technical advice.</p>]]></paragraph>
<paragraph
    title="10.4.12.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2371"
><![CDATA[<p>Power filters MUST be used to provide filtered (clean) power and reduce opportunity for technical attacks.</p>]]></paragraph>
</block>
<block title="Equipment Cabinet separation"><paragraph
    title="10.4.13.R.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


><![CDATA[<p>A visible gap between equipment cabinets will make any cross-cabling obvious and will simplify inspections for unauthorised or compromising changes.</p>]]></paragraph>
<paragraph
    title="10.4.13.C.01."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="2374"
><![CDATA[<p>Equipment cabinets MUST have a visible gap or non-conductive isolator between cabinets of different classifications.</p>]]></paragraph>
<paragraph
    title="10.4.13.C.02."

    tags="Infrastructure,Technical,Cable Management,Shared Non-Government facilities"


    classification="All Classifications"
    compliance="Should"
    cid="2375"
><![CDATA[<p>There SHOULD be a visible inspectable gap or non-conductive isolator between equipment cabinets of different classifications.</p>]]></paragraph>
</block>
</subsection>
</section>
