<section title="10.7. Emanation Security Threat Assessments"><subsection title="Objective"><paragraph
    title="10.7.1."


><![CDATA[<p>In order to minimise compromising emanations or the opportunity for a technical attack, a threat assessment is used to determine appropriate countermeasures.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="10.7.2."


><![CDATA[<p>This section relates to emanation security threat assessment advice and identification of appropriate countermeasures to minimise the loss of classified information through compromising emanations or a technical attack.</p>]]></paragraph>
<paragraph
    title="10.7.3."


><![CDATA[<p>This section is applicable to:</p><ul>
<li>agencies located outside New Zealand;</li>
<li>secure facilities within New Zealand; and</li>
<li>mobile platforms and deployable assets that process classified information.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="10.7.4."


><![CDATA[<p>Information on conducting an emanation security threat assessment and additional information on cabling and separation standards, as well as the potential dangers of operating RF transmitters in proximity to classified systems, is documented in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>NZCSS 400 </strong></p>
</td>
<td>
<p><strong>Installation Engineering</strong></p>
</td>
<td style="text-align: center;">GCSB</td>
<td>
<p>CONFIDENTIAL document available on application to authorised personnel</p>
</td>
</tr>
<tr>
<td>
<p><strong>NZCSI 403B </strong></p>
</td>
<td>
<p><strong>TEMPEST Threat and Countermeasures Assessment</strong></p>
</td>
<td style="text-align: center;">GCSB</td>
<td>
<p>CONFIDENTIAL document available on application to authorised personnel</p>
</td>
</tr>
<tr>
<td>
<p><strong>NZCSI 420</strong></p>
</td>
<td>
<p><strong>Laboratory Tempest Test Standard for Equipment in Controlled Environments</strong></p>
</td>
<td style="text-align: center;">GCSB</td>
<td>
<p>CONFIDENTIAL document available on application to authorised personnel</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="10.7.5."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 100%;">
<tbody>
<tr>
<td style="width: 19.4715%;"><strong>Reference</strong></td>
<td style="width: 18.9499%;"><strong>Title</strong></td>
<td style="width: 61.7177%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 19.4715%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 18.9499%;">INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td style="width: 61.7177%;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Emanation security threat assessments within New Zealand"><paragraph
    title="10.7.6.R.01."

    tags="Emanation Security,Infrastructure,Technical"


><![CDATA[<p>Obtaining the current threat advice from GCSB on potential adversaries and threats and applying the appropriate countermeasures is vital in maintaining the confidentiality of classified systems from an emanation security attack.</p>]]></paragraph>
<paragraph
    title="10.7.6.R.02."

    tags="Emanation Security,Infrastructure,Technical"


><![CDATA[<p>Failing to implement recommended countermeasures against an emanation security attack can lead to compromise. Having a good cable infrastructure and installation methodology will provide a strong backbone that will not need updating if the threat increases. Infrastructure is very expensive and time consuming to retro-fit.</p>]]></paragraph>
<paragraph
    title="10.7.6.C.01."

    tags="Emanation Security,Infrastructure,Technical"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2454"
><![CDATA[<p>Agencies designing and installing systems with RF transmitters within or co-located with their facility MUST:</p><ul>
<li>contact GCSB for guidance on conducting an emanation security threat assessment; and</li>
<li>install cabling and equipment in accordance with this manual plus any specific installation criteria derived from the emanation security threat assessment.</li>
</ul>]]></paragraph>
<paragraph
    title="10.7.6.C.02."

    tags="Emanation Security,Infrastructure,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="2455"
><![CDATA[<p>Agencies designing and installing systems with RF transmitters that co-locate with systems of a classification CONFIDENTIAL and above MUST:</p><ul>
<li>contact GCSB for guidance on conducting an emanation security threat assessment; and</li>
<li>install cabling and equipment in accordance with this manual plus any specific installation criteria derived from the emanation security threat assessment.</li>
</ul><p> </p>]]></paragraph>
</block>
<block title="Emanation security threat assessment outside New Zealand"><paragraph
    title="10.7.7.R.01."

    tags="Emanation Security,Infrastructure,Technical"


><![CDATA[<p>Fixed sites and deployed military platforms are more vulnerable to emanation security attack and require a current threat assessment and countermeasure implementation. Failing to implement recommended countermeasures and standard operating procedures to reduce threats could result in the platform emanating compromising signals which, if intercepted and analysed, could lead to platform compromise with serious consequences.</p>]]></paragraph>
<paragraph
    title="10.7.7.C.01."

    tags="Emanation Security,Infrastructure,Technical"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="2458"
><![CDATA[<p>Agencies deploying systems overseas in temporary, mobile or fixed locations MUST:</p><ul>
<li>contact GCSB for assistance with conducting an emanation security threat assessment; and</li>
<li>install cabling and equipment in accordance with this manual plus any specific installation criteria derived from the emanation security threat assessment.</li>
</ul>]]></paragraph>
<paragraph
    title="10.7.7.C.02."

    tags="Emanation Security,Infrastructure,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2459"
><![CDATA[<p>Agencies deploying systems overseas SHOULD:</p><ul>
<li>contact GCSB for assistance with conducting an emanation security threat advice; and</li>
<li>install cabling and equipment in accordance with this document plus any specific installation criteria derived from the emanation security threat assessment.</li>
</ul>]]></paragraph>
</block>
<block title="Early identification of emanation security issues"><paragraph
    title="10.7.8.R.01."

    tags="Emanation Security,Infrastructure,Technical"


><![CDATA[<p>The identification of emanation security controls that need to be implemented for a system at an early stage in the project lifecycle. This can significantly affect project costs. Costs are invariably greater where changes are necessary once the system had been designed or has been implemented.</p>]]></paragraph>
<paragraph
    title="10.7.8.C.01."

    tags="Emanation Security,Infrastructure,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="2463"
><![CDATA[<p>Agencies SHOULD conduct an emanation security threat assessment as early as possible in project lifecycles.</p>]]></paragraph>
</block>
<block title="IT equipment in SECURE areas"><paragraph
    title="10.7.9.R.01."

    tags="Emanation Security,Infrastructure,Technical,Secure Area"


><![CDATA[<p>All equipment must conform to applicable industry and government standards, including NZCSI 420; Laboratory Tempest Test Standard for Equipment in Controlled Environments. Not all equipment within a secure facility in New Zealand requires testing against TEMPEST standards.</p>]]></paragraph>
<paragraph
    title="10.7.9.C.01."

    tags="Emanation Security,Infrastructure,Technical,Secure Area"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="2465"
><![CDATA[<p>Agencies MUST ensure that IT equipment within secure areas meet industry and government standards relating to electromagnetic interference/electromagnetic compatibility. </p>]]></paragraph>
</block>
</subsection>
</section>
