<section title="11.2. Radio frequency and infrared devices in secure areas"><subsection title="Objective"><paragraph
    title="11.2.1."


><![CDATA[<p>To maintain the integrity of secure areas, only approved radio frequency (RF) and infrared (IR) devices are brought into secure areas.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="11.2.2."


><![CDATA[<p>This section covers information relating to the use of RF and infrared devices in secure areas. Information on the use of RF devices outside secure areas can be found in <a title="Distributed working" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-17003">Chapter 21 - Distributed working</a>.</p>]]></paragraph>
<paragraph
    title="11.2.3."


><![CDATA[<p>RF devices include any transmitter on any frequency, including mobile phones, cordless phones, Bluetooth, Wi-Fi, RFID and other similar devices.<br>Requirements for Bluetooth devices are described in section 11.1</p>]]></paragraph>
<paragraph
    title="11.2.4."


><![CDATA[<p>IR devices transmit data over variable distances using light waves; examples are infrared cameras; night vision devices; infrared computer ports; and remote controls.</p>]]></paragraph>
<paragraph
    title="11.2.5."


><![CDATA[<p>A secure area, in the context of the NZISM, is defined as any area, room, group of rooms, building or installation that processes, stores or communicates information classified CONFIDENTIAL, SECRET, TOP SECRET or any compartmented or caveated information at these classifications. &nbsp;A secure area may include a Sensitive Compartmented Information Facility (SCIF).</p>
<p>The physical security requirements for such areas are specified in the Protective Security Requirements (PSR) Security Zones.</p>]]></paragraph>
</block>
<block title="Exemptions for the use of RF devices"><paragraph
    title="11.2.6."


><![CDATA[<p>At the discretion of the Accreditation Authority, RF devices can be used in a secure area provided they cannot communicate or compromise classified information.</p>]]></paragraph>
</block>
<block title="Exemptions for the use of Medical devices"><paragraph
    title="11.2.7."


><![CDATA[<p>At the discretion of the Accreditation Authority, medical devices with RF transmitters and/or receivers can be used in secure areas provided they cannot communicate or compromise classified information.</p>]]></paragraph>
</block>
<block title="Exemptions for the use of IR and laser devices"><paragraph
    title="11.2.8."


><![CDATA[<p>At the discretion of the Accreditation Authority, IR and laser devices can be used in a secure area provided they cannot communicate or compromise classified information.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="11.2.9."


><![CDATA[<p>References are available at the following source:</p>
<table class="table-main" style="width: 64.0288%;">
<tbody>
<tr>
<td style="width: 43.152%;"><strong>Reference</strong></td>
<td style="text-align: center; width: 14.4465%;"><strong>Publisher</strong></td>
<td style="width: 42.4015%;"><strong>Title</strong></td>
</tr>
<tr>
<td style="width: 43.152%;">
<p>NIST 800-121, Rev.2, May 2017</p>
<p>(INCLUDES UPDATES AS OF 1-19-2022)<strong><span style="font-size: 10.0pt; line-height: 107%; font-family: &#039;Calibri&#039;,sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; color: #212529; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;"> </span></strong></p>
</td>
<td style="text-align: center; width: 14.4465%;">NIST</td>
<td style="width: 42.4015%;"><span style="font-size: 11.0pt; line-height: 107%; font-family: &#039;Calibri&#039;,sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-ansi-language: EN-NZ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-121r2-upd1.pdf"><span style="mso-ascii-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;">Guide to Bluetooth Security (nist.gov)</span></a></span></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="11.2.10."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR Mandatory Requirements</strong></td>
<td>GOV2, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements&nbsp;</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="RF devices in secure areas"><paragraph
    title="11.2.11.R.01."

    tags="Communications systems,Technical,RF Devices,Secure Area"


><![CDATA[<p>RF devices pose security threat as they are capable of picking up and transmitting classified background conversations. Furthermore, many RF devices can connect to IT equipment and act as unauthorised data storage devices or bridge “air gaps”.</p>]]></paragraph>
<paragraph
    title="11.2.11.C.01"

    tags="Communications systems,Technical,RF Devices,Secure Area"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="2497"
><![CDATA[<p>Agencies MUST prevent RF devices from being brought into secure areas unless authorised by the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="11.2.11.C.02"

    tags="Communications systems,Technical,RF Devices,Secure Area"


    classification="All Classifications"
    compliance="Should"
    cid="2498"
><![CDATA[<p>Agencies SHOULD prevent RF devices from being brought into secure areas unless authorised by the Accreditation Authority.</p>]]></paragraph>
</block>
<block title="RF controls in secure areas"><paragraph
    title="11.2.12.R.01."

    tags="Communications systems,Technical,RF Devices,RFID"


><![CDATA[<p>Minimising the output power of wireless devices and using RF shielding on facilities will assist in limiting the wireless communications to areas under the control of the agency.</p>]]></paragraph>
<paragraph
    title="11.2.12.C.01."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="All Classifications"
    compliance="Should"
    cid="2504"
><![CDATA[<p>Agencies SHOULD limit the effective range of communications outside the agency’s area of control by:</p>
<ul>
<li>minimising the output power level of wireless devices;&nbsp;</li>
<li>RF shielding; and</li>
<li>Physical layout and separation.</li>
</ul>
<p>&nbsp;</p>]]></paragraph>
</block>
<block title="Detecting RF devices in secure areas"><paragraph
    title="11.2.13.R.01."

    tags="Communications systems,Technical,RF Devices,Secure Area"


><![CDATA[<p>As RF devices are prohibited in secure areas, agencies should deploy technical measures to detect and respond to the unauthorised use of such devices.</p>]]></paragraph>
<paragraph
    title="11.2.13.C.01"

    tags="Communications systems,Technical,RF Devices,Secure Area"


    classification="Confidential, Secret, Top Secret"
    compliance="Should"
    cid="2501"
><![CDATA[<p>Agencies SHOULD deploy measures to detect and respond to active RF devices within secure areas.</p>]]></paragraph>
</block>
<block title="Pointing devices"><paragraph
    title="11.2.14.R.01."

    tags="Communications systems,Technical,RF Devices,RFID"


><![CDATA[<p>Wireless RF or IR pointing devices can pose an emanation security risk as well as introduce vulnerabilities to classified IT equipment and/or systems.&nbsp;</p>]]></paragraph>
<paragraph
    title="11.2.14.C.01."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="Top Secret, Secret, Confidential"
    compliance="Must Not"
    cid="2483"
><![CDATA[<p>Wireless RF or IR pointing devices MUST NOT be used in secure areas unless approved by the Accreditation Authority and appropriate RF or IR mitigations are implemented.&nbsp;</p>]]></paragraph>
</block>
<block title="IR devices in secure areas"><paragraph
    title="11.2.15.R.01."

    tags="Communications systems,Technical,RF Devices,RFID"


><![CDATA[<p>When using IR devices with CONFIDENTIAL, SECRET or TOP SECRET systems, IR mitigations including opaque curtains and/or IR window films are acceptable. Line of sight must be managed for direct and reflected transmissions. While infrared transmissions are generally designed for short range (5 to 10 metres) manufacturing and design variations and some environmental conditions can amplify and reflect infrared over much greater distances.</p>]]></paragraph>
<paragraph
    title="11.2.15.R.02."

    tags="Communications systems,Technical,RF Devices,RFID"


><![CDATA[<p>When using infrared keyboards with a TOP SECRET system, windows with curtains that can be opened are NOT acceptable as a method of permanently blocking infrared transmissions. While infrared transmissions are generally designed for short range (5 to 10 metres) manufacturing and design variations and some environmental conditions can amplify and reflect infrared over much greater distances.</p>]]></paragraph>
<paragraph
    title="11.2.15.C.01."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="Secret, Confidential"
    compliance="Must Not"
    cid="2487"
><![CDATA[<p>Agencies using infrared keyboards MUST NOT allow:</p>
<ul>
<li>line of sight and reflected communications travelling into an unsecure area;</li>
<li>multiple infrared keyboards at different classifications in the same area;</li>
<li>other infrared devices to be brought into line of sight of the keyboard or its receiving device/port; and</li>
<li>infrared keyboards to be operated in areas with unprotected windows.</li>
</ul>]]></paragraph>
<paragraph
    title="11.2.15.C.02."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="Top Secret"
    compliance="Must Not"
    cid="2488"
><![CDATA[<p>Agencies using infrared keyboards MUST NOT allow:</p>
<ul>
<li>line of sight and reflected communications travelling into an unsecure area;</li>
<li>multiple infrared keyboards at different classifications in the same area;</li>
<li>other infrared devices within the same area; and</li>
<li>infrared keyboards in areas with windows that have not had a permanent method of blocking infrared transmissions applied to them.</li>
</ul>]]></paragraph>
<paragraph
    title="11.2.15.C.03."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="All Classifications"
    compliance="Should"
    cid="2489"
><![CDATA[<p>Agencies using IR devices SHOULD ensure that the IR receiver/port is positioned to prevent line of sight from the secure area boundary.</p>]]></paragraph>
</block>
</subsection>
</section>
