<section title="11.6. Radio Frequency Identification Devices"><subsection title="Objective"><paragraph
    title="11.6.1."


><![CDATA[<p>To ensure Radio Frequency Identification (RFID) devices are used safely and securely in order to protect privacy, prevent unauthorised access and to prevent the compromise of secure spaces.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope "><paragraph
    title="11.6.2."


><![CDATA[<p>This section provides information relating to the risks, security and secure use of RFID devices. Card access control systems incorporating RFID or smart cards are discussed in more detail in <a title="Card access control systems" href="http://nzism.gcsb.govt.nz/ism-document#Section-14321">Section 11.7 - Card Access Control Systems</a>.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="11.6.3."


><![CDATA[<p>This section contains a short description of the history, formats, operating frequencies, risks, controls and countermeasures related to the use of RFID.</p>]]></paragraph>
<paragraph
    title="11.6.4."


><![CDATA[<p>In practical use since the 1970’s, RFID is now widely used for product identification, stock control, as anti-theft in manufacturing and retail organisations, payment cards (smart ATM and paywave cards) and access control systems. They are useful tools in improving logistics, profoundly changing cost structures for business, and improving levels of safety and authenticity in a wide range of applications such as access control, passports, payment cards, vehicle immobilisers, toll roads, pharmaceuticals tracking, management of high value items and weapons control. RFID tags are now produced in a wide variety of types and sizes, from the size of a grain of rice or printed on paper to much larger devices incorporating a battery or other power supply.</p>]]></paragraph>
<paragraph
    title="11.6.5."


><![CDATA[<p>Unlike bar coding systems, RFID devices can communicate without requiring line of sight and over distances ranging from a few centimetres to kilometres. They can be equipped with sensors to collect data on temperature changes, sudden shocks, humidity or other factors affecting product safety and quality.</p>]]></paragraph>
<paragraph
    title="11.6.6."


><![CDATA[<p>RFID devices typically use radio signals to transmit identifying information such as product or serial numbers, manufacture date, origin and batch number. This identifying information is invariably in the form of an Electronic Product Code (EPC) following the standards and conventions published by GS1. GS1 is a global group that also develops standards for other identifiers such as barcodes. The GS1 standards and conventions are now incorporated into ISO standards, see references table&nbsp;at <a href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-14247">11.6.57</a>.</p>]]></paragraph>
</block>
<block title="Basic Formats"><paragraph
    title="11.6.7."


><![CDATA[<p>The basic format of an Electronic Product Code (EPC) is illustrated below:</p>
<p><img class="leftAlone" title="" src="assets/NZISM/ElectronicProductCodeType1.png" alt="Diagram of Electronic Product Code Type 1: 96-bit" width="600" height="335"></p>]]></paragraph>
<paragraph
    title="11.6.8."


><![CDATA[<p>RFID devices are often referred to as “tags”. Passive tags are unpowered and harvest power from the RFID reader. Active tags incorporate a power supply, usually a battery. Tags are produced in Classes 0 to 5 and are now generally produced to Generation 2 specifications. The EPCGen2 standard for Class 1 tags focuses on reliability and efficiency but supports only very basic security. Features of the Gen 2 specification include:</p><ul>
<li><strong>a 96 bit EPC number</strong> with read/write capability and can be designated used for other data ;</li>
<li><strong>a 32/64 bit tag identifier</strong> (TID) – identifies the manufacturer of the tag, also with read/write capabilities; </li>
<li><strong>32 bit kill password</strong> to permanently disable the tag; </li>
<li><strong>32 bit access password</strong> to lock the read/write characteristics of the tag and also set the tag for disabling ;</li>
<li><strong>User memory</strong> – dependant on the manufacturer and can be as little as 0 bits to 2048 bits. Larger user memory is in development.</li>
</ul>]]></paragraph>
<paragraph
    title="11.6.9."


><![CDATA[<p>The distance from which a tag can be read is termed the read range. A read range will depend on a number of factors, including the radio frequency used for reader/tag/reader communication, the size and orientation of the antennae, the power output of the reader, and whether the tags have a battery or other power supply. Battery-powered tags typically have a read range of 100 meters (approximately 300 feet) although this can extend to kilometres under favourable conditions. It is possible that powered RFID tags, typically used on cargo containers, railway wagons, vehicles and other large assets, could be read from a satellite if there is little background “noise” and the broadcast signal is sufficiently powerful.</p>]]></paragraph>
<paragraph
    title="11.6.10."


><![CDATA[<p>RFID tags are divided into classes 0 to 5:</p><table class="table-main">
<tbody>
<tr>
<td>Class</td>
<td>Description</td>
</tr>
<tr>
<td><strong>0</strong></td>
<td>Read only, passive tags</td>
</tr>
<tr>
<td><strong>1</strong></td>
<td>Write once passive tags.  128-bit memory.</td>
</tr>
<tr>
<td><strong>2</strong></td>
<td>Read/Write with up to 65Kb read/write memory and authenticated access control.  Can monitor temperature, pressure, vibration.</td>
</tr>
<tr>
<td><strong>3</strong></td>
<td>Semi-Passive. Own power source but cannot initiate communication.  Remains passive until activated by a reader.  Up to 65 Kb read/write memory and integrated sensor circuitry.</td>
</tr>
<tr>
<td><strong>4</strong></td>
<td>Active tags (own power source) with integrated transmitter.  Can communicate with readers and other tags operating in the same RF band.  Rewritable memory and ad hoc networking capability.  Read range &gt;100 metres (approx. 300’).</td>
</tr>
<tr>
<td><strong>5</strong></td>
<td>Reader tags, can power class 1 to 3 tags and communicate with all classes.  Includes all the capabilities of class 4 tags.</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Operating Frequencies"><paragraph
    title="11.6.11."


><![CDATA[<p>RFID operates in several parts of the Radio Spectrum. Not all frequencies are authorised for use in all countries and will depend on the radio spectrum allocation authority in each country. It is important to note, however, that some RFID tags designed to operate at frequencies not used in the importing country may be attached to imported goods. This can represent a risk from scanning at frequencies not authorised or normally monitored in the importing country.</p>]]></paragraph>
<paragraph
    title="11.6.12."


><![CDATA[<p>Depending on the design and intended application, RFID tag can operate at different frequencies. It is important to note that longer range RFID tags operate at frequencies close to or within allocated Wi-Fi frequencies. Allocated frequencies are:</p><table class="table-main">
<tbody>
<tr>
<td style="color: black;"><strong>Band</strong></td>
<td style="color: black;"><strong>Frequency</strong></td>
<td style="color: black;">
<p><strong>Typical Range</strong></p>
</td>
</tr>
<tr>
<td><strong>LF</strong></td>
<td>125-134.2 kHz and 140-148.5 kHz </td>
<td>
<p>Up to 1/2 metre</p>
</td>
</tr>
<tr>
<td><strong>HF</strong></td>
<td>
<p>13.553 - 13.567 MHz and 26.957 - 27.283 MHz</p>
</td>
<td>
<p>Up to 1 metre</p>
</td>
</tr>
<tr>
<td><strong>UHF</strong></td>
<td>
<p>433 MHz, 858 - 930 MHz, 2.400 - 2.483 GHz, 2.446 - 2.454GHz</p>
</td>
<td>
<p>1 to 10 metres</p>
</td>
</tr>
<tr>
<td><strong>SHF</strong></td>
<td>
<p>5.725 - 5.875 GHz</p>
</td>
<td>
<p>&gt; 100 metres</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="11.6.13."


><![CDATA[<p>As RFID devices are deployed in more sophisticated applications such as matching hospital patients with laboratory test results or tracking systems for dangerous materials, concerns have been raised about protecting such systems against eavesdropping, unauthorised uses and privacy breaches.</p>]]></paragraph>
</block>
<block title="Smart Cards"><paragraph
    title="11.6.14."


><![CDATA[<p>Smart cards typically comprise an embedded integrated circuit incorporating a microchip with internal memory, a read-only CSN (Card Serial Number) or a UID (User Identification). The card connects to a reader with direct physical contact or a contactless radio frequency (RFID) interface. With an embedded microchip, smart cards can store large amounts of data, carry out on-card functions (such as encryption and authentication) and interact intelligently with a smart card reader. Smart card technology can be found in a variety of form factors, including plastic cards, key fobs, watches, subscriber identification modules used in mobile phones, and USB-based tokens. Smart cards are widely used in payment card (debit and credit cards and electronic wallets) and access control systems.</p>]]></paragraph>
<paragraph
    title="11.6.15."


><![CDATA[<p>The <a title="ISO/IEC 14443" rel="noopener noreferrer" href="https://www.iso.org/search.html?q=14443" target="_blank">ISO/IEC 14443</a>&nbsp;standard for contactless smart card communications defines two types of contactless cards ("A" and "B") and allows for communications at distances up to 10 cm operating at 13.56 MHz. The alternative <a title="ISO/IEC 15693" rel="noopener noreferrer" href="https://www.iso.org/search.html?q=15693" target="_blank">ISO/IEC 15693</a> standard allows communications at distances up to 50 cm. The <a title="ISO/IEC 7816" rel="noopener noreferrer" href="https://www.iso.org/search.html?q=7816" target="_blank">ISO/IEC 7816</a> standard (in 15 parts) defines the physical, electrical interface and operating characteristics of these cards.</p>]]></paragraph>
<paragraph
    title="11.6.16."


><![CDATA[<p>In common with other RFID devices, smart cards incorporate an antenna embedded in the body of the card (or key fob, watch or token). When the card is brought within range of the reader, the chip in the card is powered on. Once powered on, an RF communication protocol is initiated and communication established between the card and the reader for data transfer.</p>]]></paragraph>
<paragraph
    title="11.6.17."


><![CDATA[<p>Smart cards typically incorporate protective mechanisms including authentication, secure data storage, encryption, tamper-resistance and secure communication. Support for biometric authentication may also be incorporated.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Threats and Vulnerabilities"><paragraph
    title="11.6.18"


><![CDATA[<p>Some important characteristics of RFID, inherent in the design and properties of the technology are:</p><ul>
<li>RFID tags are powered by the field emitted by an RFID reader, so whenever a tag is placed in a reader field it is activated and available. In general terms, class 0 and class 1 tags cannot be powered off, only permanently deactivated;</li>
<li>RFID tags automatically respond to reader interactions without explicit control of the tag owner, so RFID tags can be operated without their owner’s consent;</li>
<li>It is trivial to establish a communication with an RFID tag and there is no visual confirmation of a tag/reader interaction (i.e., no physical connection or manual operation is required), so it is possible to interact with an RFID tag without being detected.</li>
</ul>]]></paragraph>
<paragraph
    title="11.6.19"


><![CDATA[<p>Specific threats and vulnerabilities in the use of RFID technologies include:</p><ul>
<li><strong>Legitimate data-mining</strong>: This risk predates the use of RFID technology, but the volume of data provided by RFID tags, loyalty cards, Near Field Communication (NFC) for bank cards and for electronic wallets increases the risk. Some data collection methods keep to ethical use of data-mining techniques to discover the characteristics and habits of an individual or an organisation. This can pose a business intelligence risk. At times, however, this may challenge the bounds of privacy and data ownership. For example, customer loyalty card data used to discover medical information about an individual or RFID tags to track shipments or deliveries to an organisation by a competitor.&nbsp;</li>
<li><strong>Eavesdropping and Data theft</strong>: This risk is similar to the data-mining risk but employs unethical and possibly illegal methods of data collection or obtaining data for nefarious or malicious purposes. RFID tags are designed to broadcast information and data theft by easily concealable RFID scanners is technically trivial. Data theft can pose a risk to business processes.</li>
<li><strong>Skimming</strong>: Occurs when an unauthorised reader gains access to data stored on a token. This type of attack is particularly dangerous where contactless access or payment cards are used.</li>
<li><strong>Relay Attacks</strong>: Relay attacks use eavesdropping to intercept legitimate tag/reader transmissions and relay these to a device at some distance from the legitimate tag. The device can then behave as the genuine tag. Again this type of attack is particularly dangerous where contactless access or payment cards are used.</li>
<li><strong>Insert Attacks</strong>: Insert attacks insert system commands where normal data is expected and relies on a lack of data validation. It is possible that a tag can have legitimate data replaced by a malicious command.</li>
<li><strong>Tag Cloning</strong>: Clones replicate the functionality of legitimate tags and can be used to access controlled areas, abuse private data, or make an unauthorised electronic transaction. Tag authentication using a challenge-response protocol is a defence against cloning as the information that attackers can obtain through the air interface (such as by eavesdropping) is insufficient to provide a legitimate response. The design of the tag can also incorporate measures at the circuit manufacturing stage to protect tags from duplication by reverse engineering.</li>
<li><strong>Data corruption</strong>: Most RFID tags are rewritable by design. This feature may be locked (turning the tag into a write-once, read-many device) or left active, depending on application and security sensitivity. For example, in libraries, the RFID tags are frequently left unlocked for the convenience of librarians in reusing the tags on different books or to track check-ins and check-outs. If tags are not protected, it creates an opportunity for malicious users to overwrite data, typically in the theft of high-value goods by marking them as low-value items or in the case of weapons monitoring, changing the weapon identification.</li>
<li><strong>Shipment or People tracking</strong>: While RFID tags are designed to assist in stock control and supply chain management, unauthorised tracking of shipments or of people is undesirable and may even be dangerous. It is possible to follow individuals carrying tags using several techniques, including placing fake readers at building access points, deploying unauthorised readers near legitimate readers and creating relay points along expected routes.</li>
<li><strong>Tag Blocking</strong>: This is a form of denial of service by introducing a blocker tag which is designed to simulate all possible tags in an allocated range. This causes readers to continually perform multiple reads on non-existent and non-responsive tags. Blocker tags are sometimes used where privacy or confidentiality are required.</li>
<li><strong>Denial of Service (DOS)</strong>: Also known as flooding attacks where a signal is flooded with more data than it is designed to handle. Similar in many respects to RF Jamming.</li>
</ul>]]></paragraph>
 <block title="Attack Vectors"><paragraph
    title="11.6.20."


><![CDATA[<p>Attack vectors for RFID devices include:</p><ul>
<li>interception of legitimate transmissions;</li>
<li>interception of authorised reader data by an unauthorised device;</li>
<li>unauthorised access to tags and readers;</li>
<li>rogue/cloned tags;</li>
<li>rogue and unauthorised RFID readers; </li>
<li>side-channel attacks (timing measurements, electromagnetic radiations etc.); </li>
<li>attacks on back-end systems;</li>
<li>jamming of legitimate signals.</li>
</ul>]]></paragraph>
<paragraph
    title="11.6.21."


><![CDATA[<p>Because RFID devices incorporate antennas, there is a possibility of radiation hazards from high –powered devices, particularly active tags and readers. It is important to note however that these cases are rare, occur in high powered devices only and that the vast majority of RFID devices do not pose radiation hazards. Related hazards include electromagnetic radiation hazards to personnel (HERP), fuel (HERF) and ordnance (HERO).</p>]]></paragraph>
<paragraph
    title="11.6.22."


><![CDATA[<p>Threats and Vulnerabilities of RFID systems are summarised in the table below:</p><table class="table-main">
<tbody>
<tr>
<td>
<p>Threat/Vulnerability</p>
</td>
<td>Tag</td>
<td>RF</td>
<td>Reader</td>
<td>Network</td>
<td>
<p>Back-End</p>
</td>
<td>
<p>People</p>
</td>
</tr>
<tr>
<td><strong>Eavesdropping</strong></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Relay Attack</strong></p>
</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Unauthorised Tag Reading (skimming)</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>People Tracking</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
</tr>
<tr>
<td>
<p><strong>Shipment Tracking</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Tag Cloning</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Replay Attack</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Insert Attack</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Tag Content Modification</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Malware</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>RFID System Failure</strong></p>
</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
</tr>
<tr>
<td><strong>Tag Destruction</strong></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>Tag Blocking</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td><strong>Denial of Service (DoS)</strong></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td>
<p><strong>RF Jamming</strong></p>
</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
</tr>
<tr>
<td><strong>Back-End Attacks</strong></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
</tr>
<tr>
<td><strong>Radiation Hazard&nbsp;</strong></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;</td>
<td style="text-align: center;">&nbsp;<img class="leftAlone" title="" src="assets/NZISM/marker.png" alt="Bullet marker" width="20" height="20"></td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="11.6.23."


><![CDATA[<p>It is important to note that attacks are often used in combination creating blended attacks. Blended attacks may be a combination of attack types, use of multiple attack vectors, the targeting of individual sub-systems or combinations of all three elements.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Good Practices and Countermeasures"><paragraph
    title="11.6.24"


><![CDATA[<p>Good practice for ensuring the security and privacy of RFID systems includes:</p><ul>
<li>a risk assessment to determine the nature and extent of risk and threat in the proposed use of RFID;</li>
<li>strong security architecture to protect RFID databases and communication systems;</li>
<li>authentication of approved users of RFID systems;</li>
<li>encryption of radio signals when feasible;</li>
<li>temporarily or permanently disabling tags when not required;</li>
<li>shielding RFID tags and tag reading areas to prevent unauthorised access or modification;</li>
<li>incident management, audit procedures, logging and time stamping to help detect and manage security breaches; and</li>
<li>tag disposal and recycling procedures that permanently disable or destroy sensitive data.</li>
</ul>]]></paragraph>
 <block title="Authentication"><paragraph
    title="11.6.25."


><![CDATA[<p>By design and usage, RFID technologies are item, product or shipment identification <strong>but</strong> not authentication technologies. Authentication of a reader or tag requires a common secret (key) shared when establishing communication, and before data is exchanged. Currently, only RFID tags with microprocessors have sufficient computation resources to use authentication techniques. These can be found in such applications as e-passports, or payment or ticketing applications (public transport, for example).</p>]]></paragraph>
<paragraph
    title="11.6.26."


><![CDATA[<p>With a challenge/response authentication mechanism the reader issues an enquiry to the tag which results in a response. The secret tag information is computed information from internal cryptographic algorithms by both the tag and reader and the results are sent. Correct responses are required for a successful information exchange. The system is essentially the same as encrypting data over a standard radio link.</p>]]></paragraph>
<paragraph
    title="11.6.27."


><![CDATA[<p>The ISO/JTC1/SC31 committee is in the process of establishing new standards to support the use of simple RFID authentication and encryption protocols.</p>]]></paragraph>
</block>
<block title="Keyed-Hash Message Authentication Code (HMAC)"><paragraph
    title="11.6.28."


><![CDATA[<p>HMAC is a protocol where both an RFID reader and RFID tag share a common secret key that can be used in combination with a hash algorithm to provide one-way or mutual authentication between tag and reader. When HMAC is applied to messages, it also assures the integrity of data in the messages.</p>]]></paragraph>
<paragraph
    title="11.6.29."


><![CDATA[<p>HMAC is not specified in any RFID standard, but the capability is generally available in vendor products. HMAC is often used where the risk of eavesdropping is high and passwords alone are considered to offer an inadequate authentication mechanism. This will be determined by the risk assessment. HMAC is also used where applications require evidence of a tag’s authenticity.</p>]]></paragraph>
</block>
<block title="Digital Signatures"><paragraph
    title="11.6.30."


><![CDATA[<p>Digital signatures are compatible with existing RFID tag standards. In authenticated RFID systems, tags can receive, store, and transmit digital signatures with existing read and write commands because the complexity is managed by readers or back-end systems. However, the use of digital signatures to support authentication of readers to tags would require tags to support relatively complex cryptographic functions, beyond the capacity of common tag designs.</p>]]></paragraph>
<paragraph
    title="11.6.31."

    tags="Evaluated Products"


><![CDATA[<p>In addition, digital signatures that are not generated by the tag itself are subject to replay attacks. An adversary could query a tag to obtain its evidence of authenticity (i.e., the digital signature created by a previous reader) and then replicate that data on a cloned tag. Consequently, password or symmetric key authentication systems likely will support tag access control, as opposed to tag authenticity verification, for the immediate future.</p>]]></paragraph>
</block>
<block title="Encryption"><paragraph
    title="11.6.32."


><![CDATA[<p>Data stored in the memory of an RFID tag is intended to be freely shared with the various tag users (manufacturers, stock controllers, shipping agents, etc.). Only an RFID reader is required to access the data which raises the question of data security. Memory and computational power of an RFID tag is limited, but data elements can be password-protected or reserved for nominated usage. Several levels of authorisation (read-only, read and write, delete, etc.) can be determined. It is also advisable to encrypt the data entered onto the tag, the encryption/decryption taking place at the RFID reader or back-end system.</p>]]></paragraph>
</block>
<block title="Cover-Coding"><paragraph
    title="11.6.33."


><![CDATA[<p>Cover-coding is a method of hiding information from eavesdroppers. In the EPCglobal Class-1 Generation-2 standard, cover-coding is used to obscure passwords and information written to a tag using the write command. Some proprietary technologies also support similar features. Cover-coding is an example of minimalist cryptography because it operates within the challenging power and memory constraints of passive RFID tags.</p>]]></paragraph>
<paragraph
    title="11.6.34."


><![CDATA[<p>Cover-coding is a useful mitigation where eavesdropping is a risk, but adversaries are expected to be at a greater distance from the tags than readers. Cover-coding helps prevent the execution of unauthorised commands that could disable a tag or modify the tag’s data. Cover-coding mitigates business process, business intelligence, and privacy risks.</p>]]></paragraph>
</block>
<block title="Rolling Code"><paragraph
    title="11.6.35."


><![CDATA[<p>A rolling code approach is a scheme where the identifier given by the RFID tag changes after each read action. It requires the RFID reader and RFID tag to use identical algorithms. If multiple readers are used, they must be linked so that tracking of code changes can be monitored. This scheme reduces the usefulness of any responses that may be observed unless the pattern of change can be detected or deduced.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Other Defensive Measures"><paragraph
    title="11.6.36"


><![CDATA[<p><span>Other defensive measures, sometimes described as palliative techniques, include shielding, blocker tags, tag “kill” commands, tamper resistance and temporary deactivation. It is important to note these techniques do not use encryption.</span></p>]]></paragraph>
 <block title="Shielding"><paragraph
    title="11.6.37."


><![CDATA[<p>RF shielding is designed to limit the propagation of RF signals outside of the shielded area. Shielding helps to prevent unauthorised reading, access to or modification of the RFID tag data or interfering with RFID readers. Shielding can be applied to small, individual items, such as passports and credit cards or to large elements such as shipping containers.</p>]]></paragraph>
<paragraph
    title="11.6.38."


><![CDATA[<p>Shielding is also important where interference is present or detected. This may be caused by environmental conditions, such as operating in a port area, or by deliberate attempts to access readers or tags.</p>]]></paragraph>
<paragraph
    title="11.6.39."


><![CDATA[<p>Engineering assessments will determine the requirement for shielding from adverse environmental conditions and the risk assessment will determine the likelihood and threat from unauthorised and deliberate attempts to access readers, tags and data.</p>]]></paragraph>
<paragraph
    title="11.6.40."


><![CDATA[<p>RFID blocking wallets and<strong> RFID card sleeves</strong> are available to block RFID frequencies. These are typically used for credit and other payment, access and transit cards and e-passports, as a countermeasure for skimming attacks or unauthorised tracking.</p>]]></paragraph>
</block>
<block title="Blocker Tags"><paragraph
    title="11.6.41."


><![CDATA[<p>A special tag, called a “blocker” tag, blocks an RFID reader by simultaneously answering with 0 and 1 to every reader’s request during the identification protocol. The reader is then incapable of distinguishing individual tags. The blocker tag may block a reader universally or within ranges.</p>]]></paragraph>
<paragraph
    title="11.6.42."


><![CDATA[<p>This furnishes privacy by shielding consumers from the unwanted scanning of RFID tags that they may carry or wear. It also protects against unauthorised readers and eavesdroppers. The blocker tag is an alternative to more simple solutions such as the kill command, shielding and active jamming. It is important to note that active jamming may be illegal (<a href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-14239">see 11.6.53</a>).</p>]]></paragraph>
<paragraph
    title="11.6.43."


><![CDATA[<p>Blocker tags can also implement one or more privacy policies and multiple blocker tags may cover multiple zones.  The blocker tag has a very low-cost of implementation and standard tags need no modification and little support for password-protected bit flipping.  A threat is that blocker tags can be used to mount DoS attacks in which a malicious blocker tag universally blocks readers.</p>]]></paragraph>
</block>
<block title="Tag “Kill” Command "><paragraph
    title="11.6.44."


><![CDATA[<p>The “kill” command is a password-protected command specified in the EPC Gen-1 and EPC Gen-2 standards intended to make a tag non-operational. A typical application is anti-theft where the kill command is activated at a point-of-sale terminal, after goods have been paid for. Kill commands can be password protected.</p>]]></paragraph>
<paragraph
    title="11.6.45."


><![CDATA[<p>Kill commands function by fusing a ROM component or antenna connection by applying a large amount of power to the tag at the point of sale reader/terminal. It is important to note that the antenna deactivation method does not completely kill the tag but rather disable its RF interface. Once in the disabled state, the tag still retains data and can still function.</p>]]></paragraph>
<paragraph
    title="11.6.46."


><![CDATA[<p>The kill feature can represent a threat to an RFID system if the password is compromised. This risk is particularly apparent where the same password is used for multiple tags. If a weak (e.g., short or easily guessed) password is assigned to the kill command, tags can be disabled at will. Also important is the longer a tag uses the same password, the more likely it is that the password will be compromised.</p>]]></paragraph>
<paragraph
    title="11.6.47."


><![CDATA[<p>Data stored on the tag is still present in the tag’s memory after it is disabled (although it can no longer be accessed wirelessly), and, therefore, still may be accessible with physical access to the tag.</p>]]></paragraph>
</block>
<block title="Tamper Resistance"><paragraph
    title="11.6.48."


><![CDATA[<p>Some RFID tags are designed with tamper resistant or tamper-evident features to help prevent unauthorised alteration of removal of tags from the objects to which they are attached. A simple type of tamper resistance is the use of a frangible, or easily broken, antenna. If this tag is removed, the connection with the antenna is severed, rendering the tag inoperable. Other, more complex types of RFID systems monitor the integrity of objects associated with the tags to ensure that the objects have not been compromised, altered, or subjected to extreme conditions.</p>]]></paragraph>
<paragraph
    title="11.6.49."


><![CDATA[<p>Simple forms of tamper resistance may leave data intact and subject to the same threats described above. In addition it is possible to circumvent tamper resistance mechanisms by repairing a frangible antenna. It is important to note that tamper-resistance and tamper-evidence technologies do not prevent the theft or destruction of the tag or its associated items.</p>]]></paragraph>
</block>
<block title="Temporary Deactivation"><paragraph
    title="11.6.50."


><![CDATA[<p>Some tags allow the RF interface to be temporarily deactivated.  Methods vary amongst manufacturers with some methods requiring physical intervention.  Typically tags would be activated inside a designated area and deactivated when shipped, preventing eavesdropping or other unauthorised transactions during shipment.  When the tags arrive at their destination, they can be reactivated, for example for inventory management.  Conversely, tags can be used for tracking during shipment and may be deactivated on delivery.</p>]]></paragraph>
</block>
</subsection>
<subsection title="RFID Risks and Controls Summary"><paragraph
    title="11.6.51."


><![CDATA[<p>A summary of RFID Risks and Controls is presented in the Table below:</p><table class="table-main">
<tbody>
<tr>
<td>
<p>Risk Control</p>
</td>
<td>
<p>Business Process</p>
</td>
<td>
<p>Business Intelligence</p>
</td>
<td>
<p>Privacy</p>
</td>
<td>
<p>Electro-Magnetic Radiation</p>
</td>
<td>
<p>Back-End System Attack</p>
</td>
</tr>
<tr>
<td>
<p>Tag Access Controls</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
</tr>
<tr>
<td>
<p>Password Authentication</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
</tr>
<tr>
<td>
<p>HMAC</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
</tr>
<tr>
<td>
<p>Digital Signature</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
</tr>
<tr>
<td>
<p>Cover-Coding</p>
</td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
</tr>
<tr>
<td>
<p>Encryption – Data in Transit</p>
</td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
</tr>
<tr>
<td>
<p>Encryption – Data at Rest</p>
</td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
</tr>
<tr>
<td>
<p>Encryption – Data on Tag</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
</tr>
<tr>
<td>Shielding</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
</tr>
<tr>
<td>
<p>Blocker Tags</p>
</td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
</tr>
<tr>
<td>
<p>Tag Kill Feature</p>
</td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
</tr>
<tr>
<td>
<p>Tamper Resistance</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
</tr>
<tr>
<td>
<p>Temporary Deactivation</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
<td style="text-align: center;"> </td>
</tr>
<tr>
<td>
<p>RF Engineering and Frequency Selection</p>
</td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"><img class="leftAlone" title="" src="assets/NZISM/marker2.png" alt="Bullet marker" width="17" height="17"></td>
<td style="text-align: center;"> </td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Relevant Legislation"><paragraph
    title="11.6.52"


><![CDATA[<p><span>In New Zealand, operation of radio and other equipment in the RF spectrum is controlled Radiocommunications Act 1989, Reprint as at 5 December 2013 and administered by the Ministry of Business Innovation and Employment.</span></p>]]></paragraph>
 <block title="RF Jammers"><paragraph
    title="11.6.53."


><![CDATA[<p>It is illegal to import, manufacture, sell or use a radio jammer in New Zealand except with a licence issued by the Radio Spectrum Management unit of the Ministry of Business, Innovation and Employment. The use and management of RF jammers is governed by the Radiocommunications Regulations (Prohibited Equipment – Radio Jammer Equipment) Notice 2011 under the Regulation 32(1)(i) [a notice in the Gazette] of the Radiocommunications Regulations 2001.</p>]]></paragraph>
</block>
<block title="Secure Spaces"><paragraph
    title="11.6.54."


><![CDATA[<p>The use of RFID technology in secure areas must be carefully considered, recognising that an RFID tag or system incorporates antennae and transmitting capabilities which may compromise the security of such areas. Passive tags (classes 0 and 1) pose little risk in themselves as they require a reader to activate and have little on-board capability. Read/write tags (class 2) pose a higher risk as they have the capability to store data. Other tags (classes 3 to 5) can pose a significant risk to secure spaces.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="11.6.55."


><![CDATA[<p>The relevant PSR Mandatory Requirements are:</p>
<table class="table-grey" style="width: 101.042%; height: 265.097px;">
<tbody>
<tr style="height: 59.1944px;">
<td style="width: 18.3333%; height: 59.1944px;"><strong>References</strong></td>
<td style="width: 19.1%; height: 59.1944px;"><strong>Title</strong></td>
<td style="width: 60.9129%; height: 59.1944px;"><strong>Source</strong></td>
</tr>
<tr style="height: 205.903px;">
<td style="width: 18.3333%; height: 205.903px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 19.1%; height: 205.903px;">GOV2, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td style="width: 60.9129%; height: 205.903px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="References - Guidance"><paragraph
    title="11.6.56."


><![CDATA[<p class="NormS10C2">Further references on Guidance can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>SP 800-98</strong></p>
</td>
<td>
<p><strong>Guidelines for Securing Radio Frequency Identification (RFID) Systems</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;"><a title="SP 800-98" rel="noopener noreferrer" href="https://www.nist.gov/publications/guidelines-securing-radio-frequency-identification-rfid-systems" target="_blank">https://www.nist.gov/publications/guidelines-securing-radio-frequency-identification-rfid-systems</a></td>
</tr>
<tr>
<td>
<p><strong><strong>FIPS PUB 198-1</strong></strong></p>
</td>
<td>
<p><strong>The Keyed-Hash Message Authentication Code (HMAC), July 2008</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;"><a title="FIPS Publication 198-1" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.198-1.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.198-1.pdf [PDF, 126 KB]</a></td>
</tr>
<tr>
<td>
<p><strong><strong>FIPS PUB 180-4</strong></strong></p>
</td>
<td>
<p><strong>Secure Hash Standard (SHS)</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;"><a title="FIPS Publication 180-4" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf [PDF, 814 KB]</a></td>
</tr>
<tr>
<td>
<p class="page-header"><strong>EPC/RFID</strong></p>
</td>
<td>
<p><strong>Implementation Guide for the use of GS1 EPCglobal Standards in the Consumer Electronics Supply Chain</strong></p>
</td>
<td style="text-align: center;">
<p>GS1/EPCglobal</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.gs1.org/standards/epc-rfid" target="_blank">https://www.gs1.org/standards/epc-rfid</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Smart Border Alliance RFID Feasibility Study Final Report Attachment D – RFID Technology Overview</strong></p>
</td>
<td style="text-align: center;">
<p>US Department of Homeland Security</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.dhs.gov/xlibrary/assets/foia/US-VISIT_RFIDattachD.pdf" target="_blank">https://www.dhs.gov/xlibrary/assets/foia/US-VISIT_RFIDattachD.pdf [PDF, 1.49 MB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Smart Border Alliance RFID Feasibility Study Final Report Attachment E – RFID Security And Privacy White Paper</strong></p>
</td>
<td style="text-align: center;">
<p>US Department of Homeland Security</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.dhs.gov/xlibrary/assets/foia/US-VISIT_RFIDattachE.pdf" target="_blank">https://www.dhs.gov/xlibrary/assets/foia/US-VISIT_RFIDattachE.pdf [PDF, 1.8 MB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Test Operations Procedure (TOP) 03-2-616A Electromagnetic Radiation Hazards Testing For Non-Ionizing Radio Frequency Transmitting Equipment</strong></p>
</td>
<td style="text-align: center;">
<p>US Defense Technical Information Center (DTIC),</p>
</td>
<td style="width: 33%;">&nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Electromagnetic Environmental Effects Requirements for Systems – MIL-STD-46C</strong></p>
</td>
<td style="text-align: center;">
<p>US Department of Defense Interface Standard</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="http://everyspec.com/MIL-STD/MIL-STD-0300-0499/MIL-STD-464C_28312/" target="_blank">http://everyspec.com/MIL-STD/MIL-STD-0300-0499/MIL-STD-464C_28312/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>OECD Policy Guidance – A Focus on Information Security and Privacy Applications, Impacts and Country Initiatives.</strong></p>
</td>
<td style="text-align: center;">
<p>OECD Directorate for Science, Technology and Industry</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="http://www.oecd.org/sti/ieconomy/40892347.pdf" target="_blank">http://www.oecd.org/sti/ieconomy/40892347.pdf [PDF, 1.78 MB]</a></td>
</tr>
<tr>
<td>&nbsp;<strong>TR-03126-5</strong></td>
<td>
<p><strong>Technical Guidelines for the Secure Use of RFID (TG RFID) Subdocument 5: Application area “Electronic Employee ID Card” Version 1.0</strong></p>
</td>
<td style="text-align: center;">
<p>BSI – The German Federal Office for Information Security</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG03126/TG_03126_5_Application_area_Electronic_Employee_ID_Card.pdf?__blob=publicationFile" target="_blank">https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG03126/TG_03126_5_Application_area_Electronic_Employee_ID_Card.pdf?__blob=publicationFile</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="References - Standards"><paragraph
    title="11.6.57."


><![CDATA[<p class="NormS10C2">Further references on standards can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>EPC Tag Data Standard Version 1.9, Ratified, Nov-2014</strong></p>
</td>
<td style="text-align: center;">GS1/EPCglobal</td>
<td><a rel="noopener noreferrer" href="http://www.gs1.org/epcrfid-epcis-id-keys/epc-rfid-tds/1-9" target="_blank">http://www.gs1.org/epcrfid-epcis-id-keys/epc-rfid-tds/1-9</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID Specification for RFID Air Interface Protocol for Communications at 860 MHz – 960 MHz Version 2.0.1</strong></p>
</td>
<td style="text-align: center;">GS1/EPCglobal</td>
<td><a rel="noopener noreferrer" href="https://www.icao.int/publications/pages/publication.aspx?docnum=9303" target="_blank">https://www.icao.int/publications/pages/publication.aspx?docnum=9303</a></td>
</tr>
<tr>
<td><strong>ICAO Doc 9303&nbsp;</strong></td>
<td>
<p><strong>Machine Readable Travel Documents Parts 1-12</strong></p>
</td>
<td style="text-align: center;">International Civil Aviation Organization (ICAO)</td>
<td><a title="Machine Readable Travel Documents Part 3: Specifications Common to all MRTDs" rel="noopener noreferrer" href="https://www.icao.int/publications/Documents/9303_p3_cons_en.pdf" target="_blank">https://www.icao.int/publications/Documents/9303_p3_cons_en.pdf [PDF, 2.24 MB]</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-1:2011</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 1: Cards with contacts -- Physical characteristics</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 1: Cards with contacts — Physical characteristics" rel="noopener noreferrer" href="https://www.iso.org/standard/54089.html" target="_blank">https://www.iso.org/standard/54089.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-2:2007&nbsp;</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 2: Cards with contacts -- Dimensions and location of the contacts</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 2: Cards with contacts — Dimensions and location of the contacts" rel="noopener noreferrer" href="https://www.iso.org/standard/45989.html" target="_blank">https://www.iso.org/standard/45989.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-3:2006</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 3: Cards with contacts -- Electrical interface and transmission protocols</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols" rel="noopener noreferrer" href="https://www.iso.org/standard/38770.html" target="_blank">https://www.iso.org/standard/38770.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-4:2020</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 4: Organization, security and commands for interchange</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 4: Organization, security and commands for interchange" rel="noopener noreferrer" href="https://www.iso.org/standard/77180.html" target="_blank">https://www.iso.org/standard/77180.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-5:2004&nbsp;</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 5: Registration of application providers</strong></p>
</td>
<td style="text-align: center;">ISO&nbsp;</td>
<td><a title="Identification cards — Integrated circuit cards — Part 5: Registration of application providers" rel="noopener noreferrer" href="https://www.iso.org/standard/34259.html" target="_blank">https://www.iso.org/standard/34259.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-6:2016</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 6: Interindustry data elements for interchange</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange" rel="noopener noreferrer" href="https://www.iso.org/standard/64598.html" target="_blank">https://www.iso.org/standard/64598.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-7:1999</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit(s) cards with contacts -- Part 7: Interindustry commands for Structured Card Query Language (SCQL)</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit(s) cards with contacts — Part 7: Interindustry commands for Structured Card Query Language (SCQL)" rel="noopener noreferrer" href="https://www.iso.org/standard/28869.html" target="_blank">https://www.iso.org/standard/28869.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-8:2004&nbsp;</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 8: Commands for security operations</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 8: Commands for security operations" rel="noopener noreferrer" href="https://www.iso.org/standard/37989.html" target="_blank">https://www.iso.org/standard/37989.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-9:2017&nbsp;</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 9: Commands for card management</strong></p>
</td>
<td style="text-align: center;">ISO&nbsp;</td>
<td><a title="Identification cards — Integrated circuit cards — Part 9: Commands for card management" rel="noopener noreferrer" href="https://www.iso.org/standard/67802.html" target="_blank">https://www.iso.org/standard/67802.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-10:1999</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit(s) cards with contacts -- Part 10: Electronic signals and answer to reset for synchronous cards</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit(s) cards with contacts — Part 10: Electronic signals and answer to reset for synchronous cards" rel="noopener noreferrer" href="https://www.iso.org/standard/30558.html" target="_blank">https://www.iso.org/standard/30558.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-11:2017&nbsp;</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 11: Personal verification through biometric methods</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 11: Personal verification through biometric methods" rel="noopener noreferrer" href="https://www.iso.org/standard/67799.html" target="_blank">https://www.iso.org/standard/67799.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-12:2005&nbsp;</strong></td>
<td>
<p><strong>Identification cards - Integrated circuit cards -- Part 12: Cards with contacts -- USB electrical interface and operating procedures</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards - Integrated circuit cards — Part 12: Cards with contacts — USB electrical interface and operating procedures" rel="noopener noreferrer" href="https://www.iso.org/standard/40604.html" target="_blank">https://www.iso.org/standard/40604.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-13:2007&nbsp;</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 13: Commands for application management in a multi-application environment</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 13: Commands for application management in a multi-application environment" rel="noopener noreferrer" href="https://www.iso.org/standard/40605.html" target="_blank">https://www.iso.org/standard/40605.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-15:2016&nbsp;</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 15: Cryptographic information application</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Integrated circuit cards — Part 15: Cryptographic information application" rel="noopener noreferrer" href="https://www.iso.org/standard/65250.html" target="_blank">https://www.iso.org/standard/65250.html</a></td>
</tr>
<tr>
<td><strong>ISO 14443-1:2008&nbsp;</strong></td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 1: Physical characteristics</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 1: Physical characteristics" rel="noopener noreferrer" href="https://www.iso.org/standard/39693.html" target="_blank">https://www.iso.org/standard/39693.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 14443-2:2010</strong></td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 2: Radio frequency power and signal interface</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 2: Radio frequency power and signal interface" rel="noopener noreferrer" href="https://www.iso.org/standard/50941.html" target="_blank">https://www.iso.org/standard/50941.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 14443-3:2011&nbsp;</strong></td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 3: Initialization and anticollision</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 3: Initialization and anticollision" rel="noopener noreferrer" href="https://www.iso.org/standard/50942.html" target="_blank">https://www.iso.org/standard/50942.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 14443-4:2008&nbsp;</strong></td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 4: Transmission protocol</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 4: Transmission protocol" rel="noopener noreferrer" href="https://www.iso.org/standard/50648.html" target="_blank">https://www.iso.org/standard/50648.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 15961-1:2013&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Radio frequency identification (RFID) for item management: Data protocol -- Part 1: Application interface</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">https://www.iso.org/home.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 15963:2009&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information technology – Radio frequency identification for item management – Unique identification for RF tags</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">https://www.iso.org/home.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 18000-1:2008&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Radio frequency identification for item management -- Part 1: Reference architecture and definition of parameters to be standardized</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">https://www.iso.org/home.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 18000-2:2009&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Radio frequency identification for item management -- Part 2: Parameters for air interface communications below 135 kHz</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">https://www.iso.org/home.html</a><br><a rel="noopener noreferrer" href="http://www.iso.org" target="_blank"></a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Legislation and Regulation"><paragraph
    title="11.6.58."


><![CDATA[<p class="NormS10C2">Further references on Legislation and Regulation can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>References&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Radiocommunications Act 1989</strong></p>
</td>
<td>
<p>Parliamentary Counsel Office</p>
</td>
<td><a title="Legislation NZ" rel="noopener noreferrer" href="https://legislation.govt.nz" target="_blank">https://legislation.govt.nz</a></td>
</tr>
<tr>
<td>
<p><strong><strong>SR 2001/240</strong></strong></p>
</td>
<td>
<p><strong>Radiocommunications Regulations 2001, Reprint as at 1 February 2015</strong></p>
</td>
<td>
<p>Parliamentary Counsel Office</p>
</td>
<td><a title="Legislation NZ " rel="noopener noreferrer" href="https://legislation.govt.nz" target="_blank">https://legislation.govt.nz</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Radiocommunications Regulations (Prohibited Equipment - Radio Jammer Equipment) Notice 2011</strong></p>
</td>
<td>
<p>New Zealand Gazette Office, Government Information Services, Department of Internal Affairs</p>
</td>
<td><a rel="noopener noreferrer" href="https://gazette.govt.nz/notice/id/2011-go4051" target="_blank">https://gazette.govt.nz/notice/id/2011-go4051</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Radio Spectrum Management</strong></p>
</td>
<td>
<p>Ministry of Business, Innovation and Employment</p>
</td>
<td><a title="Radio spectrum management" rel="noopener noreferrer" href="https://rsm.govt.nz/" target="_blank">https://rsm.govt.nz/</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Risk Assessment"><paragraph
    title="11.6.59.R.01."

    tags="Communications systems,Governance,RF Devices,RFID,Risk Assessment"


><![CDATA[<p>As with many technologies, adoption of RFID has the potential to introduce a wide range of risks in addition to the risks that already exist for agency systems. This may include privacy risks, depending on the use, information held and implementation of the RFID system. A risk assessment is an essential tool in determining and assessing the range and extent of risk and threat in the use of RFID devices.</p>]]></paragraph>
<paragraph
    title="11.6.59.R.02."

    tags="Communications systems,Governance,RF Devices,RFID,Risk Assessment"


><![CDATA[<p>Risks to RFID system vary according to the technology used, system engineering, the systems architecture, application, context and deployment scenario. A holistic approach to risk at each stage of the system life cycle and each for system component is essential if a robust security strategy is to be developed.</p>]]></paragraph>
<paragraph
    title="11.6.59.R.03."

    tags="Communications systems,Governance,RF Devices,RFID,Risk Assessment"


><![CDATA[<p>The identification of classes of tags is fundamental to managing the risks of RFID devices in secure spaces. Classes 0 and 1 pose little risk. Other classes of tag (2 to 5), however, have limited data storage capability and active tags include transmitter functionality which introduces higher levels of risk. RFID readers are, by definition, transmitters and are not permitted in secure spaces.</p>]]></paragraph>
<paragraph
    title="11.6.59.C.01."

    tags="Communications systems,Governance,RF Devices,RFID,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="2956"
><![CDATA[<p>Agencies MUST conduct and document a risk assessment <em>before</em> implementing or adopting an RFID solution.</p>]]></paragraph>
<paragraph
    title="11.6.59.C.02."

    tags="Communications systems,Governance,RF Devices,RFID,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="2957"
><![CDATA[<p>This risk assessment MUST be the basis of a security architecture design.</p>]]></paragraph>
</block>
<block title="Security Architecture"><paragraph
    title="11.6.60.R.01."

    tags="Communications systems,Governance,RF Devices,RFID"


><![CDATA[<p>The foundation of strong security architecture in RFID follows three important principles:</p><ul>
<li><strong>Controlled access to the data</strong> – only authorised entities (people, systems, devices) can read and write information to and from the RFID tags (EPC number, tag identifier, kill password, access password and user memory) and RFID databases;</li>
<li><strong>Control over access to the system</strong> – only authorised entities can configure or add devices to the system, and all devices on the system are authentic and trustworthy;</li>
<li><strong>Confidence and trust</strong> – back-end systems are designed and implemented in accordance with the current version of the NZISM.</li>
</ul>]]></paragraph>
<paragraph
    title="11.6.60.R.02."

    tags="Communications systems,Technical,RF Devices,RFID"


><![CDATA[<p>Sensitive data should be held in a secure RFID Enterprise Subsystem and retrieved using the tag’s unique identifier with only an identifier stored on the tag itself. The Enterprise RFID subsystem should be established as a separate domain where data can be more adequately protected. This structure makes it more difficult for adversaries to obtain information from the tag through scanning or eavesdropping. Data encryption and access control is often more cost-effectively performed in the enterprise subsystem than in the RF subsystem.</p>]]></paragraph>
<paragraph
    title="11.6.60.R.03."

    tags="Communications systems,Technical,RF Devices,RFID"


><![CDATA[<p>Some RFID systems may cover several organisations, for example in supply chains. In such cases, multiple organisations may require access to databases that contain tag identifiers and passwords. The security architecture should incorporate strong security controls including the authentication of external entities, incident management, audit logging and other essential security controls.</p>]]></paragraph>
<paragraph
    title="11.6.60.C.01."

    tags="Communications systems,Governance,RF Devices,RFID"


    classification="All Classifications"
    compliance="Must"
    cid="2962"
><![CDATA[<p>Agencies MUST develop a strong security architecture to protect RFID databases and RFID systems.</p>]]></paragraph>
<paragraph
    title="11.6.60.C.02."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="All Classifications"
    compliance="Must"
    cid="2963"
><![CDATA[<p>Agencies MUST minimise the information stored on RFID tags and in the RFID subsystem.</p>]]></paragraph>
<paragraph
    title="11.6.60.C.03."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="All Classifications"
    compliance="Should"
    cid="2964"
><![CDATA[<p>Agencies SHOULD disable any rewrite functions on RFID devices.</p>]]></paragraph>
<paragraph
    title="11.6.60.C.04."

    tags="Communications systems,Technical,RF Devices,RFID"


    classification="All Classifications"
    compliance="Should"
    cid="2965"
><![CDATA[<p>Agencies SHOULD apply the access control requirements of the NZISM (<a title="Communcations systems and devices" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13958">Chapter 11 - Communications Systems and Devices</a>) to RFID systems.</p>]]></paragraph>
</block>
<block title="Policy"><paragraph
    title="11.6.61.R.01."

    tags="Communications systems,Governance,RF Devices,RFID"


><![CDATA[<p>An RFID Usage Policy is an essential component of an agency’s privacy policy, addressing topics such as how personal information is stored and shared. The RFID usage policy should also address privacy issues associated with the tag identifier formats and the potential disclosure of information based solely on the tag identifier format selected. Agencies MAY be required to ensure that devices that collect and store data comply with relevant regulation and guidance, such as the Privacy Act. Refer also to&nbsp;<a title="Data management" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16835">Chapter&nbsp;20 – Data Management</a>.</p>]]></paragraph>
<paragraph
    title="11.6.61.R.02."

    tags="Communications systems,Governance,Information Security Documentation,RF Devices,RFID"


><![CDATA[<p>Any RFID implementation should also be incorporated into the agency’s security policies. Refer also to<a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682"> Chapter 5 – Information Security Documentation</a>.</p>]]></paragraph>
<paragraph
    title="11.6.61.C.01."

    tags="Communications systems,Governance,RF Devices,RFID"


    classification="All Classifications"
    compliance="Should"
    cid="2969"
><![CDATA[<p>Agencies SHOULD develop, implement and maintain an RFID Usage Policy.</p>]]></paragraph>
<paragraph
    title="11.6.61.C.02."

    tags="Communications systems,Governance,Information Security Documentation,RF Devices,RFID"


    classification="All Classifications"
    compliance="Should"
    cid="2970"
><![CDATA[<p>Agencies SHOULD incorporate RFID into the agency’s security policies and information security documentation.</p>]]></paragraph>
</block>
<block title="Inspections "><paragraph
    title="11.6.62.R.01."

    tags="Communications systems,Technical,RF Devices"


><![CDATA[<p>Many system component manufacturers use RFID tags to track shipments. RFID tags may be embedded in the packaging, printed on the reverse of labels, attached to or embedded in the device itself. The ability to identify and track devices may pose a security concern for secure areas or equipment deployed in high security applications.</p>]]></paragraph>
<paragraph
    title="11.6.62.C.01."

    tags="Communications systems,Technical,RF Devices"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="2973"
><![CDATA[<p>Agencies MUST conduct visual and technical inspections of packaging and devices to determine if RFID devices have been attached and either permanently disable or remove such devices.</p>]]></paragraph>
<paragraph
    title="11.6.62.C.02."

    tags="Communications systems,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2974"
><![CDATA[<p>Agencies SHOULD conduct visual inspections of packaging and devices to determine if RFID devices have been attached and if these RFID devices pose a security concern.</p>]]></paragraph>
<paragraph
    title="11.6.62.C.03."

    tags="Communications systems,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2975"
><![CDATA[<p>Agencies SHOULD conduct visual inspections of packaging and devices to determine if RFID devices or labelling have been tampered with and whether this is a security concern.</p>]]></paragraph>
</block>
<block title="Shielding"><paragraph
    title="11.6.63.R.01."

    tags="Communications systems,Technical,RF Devices"


><![CDATA[<p>RF shielding is designed to limit the propagation of RF signals outside of the shielded area. Shielding helps to prevent unauthorised reading, access to or modification of the RFID tag data or interfering with RFID readers. Shielding can be applied to small, individual items, such as passports and credit cards or to large elements such as shipping containers. The requirement for shielding is determined by the risk assessment and an engineering assessment.</p>]]></paragraph>
<paragraph
    title="11.6.63.C.01."

    tags="Communications systems,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2978"
><![CDATA[<p>Agencies SHOULD consider undertaking an RF engineering assessment where security concerns exist or where the RFID systems are to be used in areas with high levels of RF activity.</p>]]></paragraph>
<paragraph
    title="11.6.63.C.02."

    tags="Communications systems,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2979"
><![CDATA[<p>Shielding SHOULD be considered where eavesdropping or RF radiation is a concern, as determined by the risk assessment.</p>]]></paragraph>
</block>
<block title="Positioning of Tags and Readers "><paragraph
    title="11.6.64.R.01."

    tags="Communications systems,Technical,RF Devices"


><![CDATA[<p>In order to minimise unnecessary electromagnetic radiation tags and readers should be carefully positioned. Care should be taken in use of RFID readers in proximity to:</p><ul>
<li>Fuel, ordnance, and other hazardous materials, </li>
<li>Humans and sensitive products (e.g., blood, medicine) that may be harmed by sustained exposure to RF radiation, </li>
<li>Metal and reflective objects that can modify and amplify signals in unintended and potentially harmful ways, and </li>
<li>Legitimate radio and Wi-Fi systems to avoid interference.</li>
</ul>]]></paragraph>
<paragraph
    title="11.6.64.R.02."

    tags="Communications systems,Technical,RF Devices"


><![CDATA[<p>Tag location cannot always be controlled, such as when tags are used to track mobile items or goods in transit. Other difficulties occur with persistent radio interference. In these situations, relocation of readers and tags may provide a solution. Consideration should be given to alternative but cost-effective RF protection measures, such as grounded wire fencing. The engineering assessment undertaken to determine the shielding requirements will assist in determining such measures.</p>]]></paragraph>
<paragraph
    title="11.6.64.C.01."

    tags="Communications systems,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2983"
><![CDATA[<p>Agencies SHOULD consider placement of tags and location of readers to avoid unnecessary electromagnetic radiation.</p>]]></paragraph>
</block>
<block title="Encoding and Encryption"><paragraph
    title="11.6.65.R.01."

    tags="Communications systems,Encryption,Technical,RF Devices"


><![CDATA[<p>If an adversary reads an identifier that is encoded with a published format, such as in the EPC standard, an adversary may be able to obtain useful information such as the manufacturer or issuer of the item, as well as the type of item. Because RFID tags hold limited information and identifier formats are published in standards, it may be important to use identifier formats that do not reveal any information about tagged items or the agency using the RFID system. This will be determined in the risk assessment. Encoding schemes to limit information revealed from unauthorised scanning may include serially or randomly assigning identifiers.</p>]]></paragraph>
<paragraph
    title="11.6.65.R.02."

    tags="Communications systems,Encryption,Technical,RF Devices"


><![CDATA[<p>Adversaries can often obtain valuable information from the identifier alone. For example, knowledge of the EPC manager ID and object class bits may reveal the make and model of tagged objects in a container. If individual items or boxes of items are tagged, the quantities may also be discernible. An adversary might target containers based on their contents.</p>]]></paragraph>
<paragraph
    title="11.6.65.R.03."

    tags="Communications systems,Cryptography,Technical,RF Devices"


><![CDATA[<p>The smallest tags generally used for consumer items, such as clothing, do not have enough computing power to support data encryption. At best these tags can cater for PIN-style or password-based protection. Data can, however, be encrypted before it is stored on a tag. In these designs, encryption is undertaken by the RFID subsystem or the RFID reader. This is an effective means of protecting the data on a tag. Refer also to <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a>.</p>]]></paragraph>
<paragraph
    title="11.6.65.R.04."

    tags="Communications systems,Encryption,Technical,RF Devices"


><![CDATA[<p>The current Gen 2 standard provides for an on-chip 16-bit Pseudo-Random Number Generator (RNG) and a 16-bit Cyclic Redundancy Code (CRC-16) to protect tag/reader channels. Neither of these encryption methods is strong because of the short bit length in the RNG and because CRCs are not suitable for protection against malicious alteration of data.</p>]]></paragraph>
<paragraph
    title="11.6.65.C.01."

    tags="Communications systems,Encryption,Technical,RF Devices"


    classification="All Classifications"
    compliance="Must"
    cid="2989"
><![CDATA[<p>Agencies MUST follow the requirements of the NZISM in the selection and implementation of cryptographic protocols and algorithms, and in key management, detailed in <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 - Cryptography</a>.</p>]]></paragraph>
<paragraph
    title="11.6.65.C.02."

    tags="Communications systems,Encryption,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2990"
><![CDATA[<p>Agencies SHOULD encrypt data before it is written to RFID tags.</p>]]></paragraph>
<paragraph
    title="11.6.65.C.03."

    tags="Communications systems,Encryption,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2991"
><![CDATA[<p>Agencies SHOULD assign RFID identifiers using formats that limit information about tagged items or about the agency operating the RFID system.</p>]]></paragraph>
</block>
<block title="Authentication"><paragraph
    title="11.6.66.R.01."

    tags="Communications systems,Technical,RF Devices"


><![CDATA[<p>Both an RFID reader and RFID tag share a common secret key that can be used in combination with a hash algorithm to provide one-way or mutual authentication between tag and reader. This is known as a<strong> Keyed-Hash Message Authentication Code (HMAC)</strong>. When HMAC is applied to messages, it also assures the integrity of data in the messages. HMAC is not specified in any RFID standard, but the capability is generally available in vendor products. HMAC is often used where the risk of eavesdropping is high and passwords alone are considered to offer an inadequate authentication mechanism. This will be determined by the risk assessment. HMAC is also used where applications require evidence of a tag’s authenticity.</p>]]></paragraph>
<paragraph
    title="11.6.66.C.01."

    tags="Communications systems,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="2994"
><![CDATA[<p>Agencies SHOULD consider the use of HMAC when tag authenticity is required.</p>]]></paragraph>
</block>
<block title="Password Management"><paragraph
    title="11.6.67.R.01."

    tags="Communications systems,Technical,RF Devices,Passwords"


><![CDATA[<p>RFID tags generally require passwords before execution of commands such as reading and writing of tag data, memory access control, and the tag kill feature. Passwords are an important control in maintaining the security and integrity of the RFID system. Refer also to <a title="Access control and passwords" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access Control and passwords</a>.</p>]]></paragraph>
<paragraph
    title="11.6.67.R.02."

    tags="Communications systems,Technical,RF Devices,Passwords"


><![CDATA[<p>Tags should not share passwords, although this may not be practical in all cases. In applications such as supply chains, multiple organisations may require access to databases that contain tag identifiers and passwords. In such cases external entities must be authenticated and incident management, audit logging and other security controls are essential. While in traditional IT systems, passwords are often changed on a periodic basis, in RFID systems, such changes may be impractical, especially if the tags are not always accessible to the agency assigning the passwords.</p>]]></paragraph>
<paragraph
    title="11.6.67.C.01."

    tags="Communications systems,Technical,RF Devices,Passwords"


    classification="All Classifications"
    compliance="Must"
    cid="2998"
><![CDATA[<p>Agencies MUST assign passwords for critical RFID functions.</p>]]></paragraph>
<paragraph
    title="11.6.67.C.02."

    tags="Communications systems,Technical,RF Devices,Passwords"


    classification="All Classifications"
    compliance="Should"
    cid="2999"
><![CDATA[<p>Agencies SHOULD follow the guidance for passwords management in the NZISM (<a title="Access control and passwords" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access control and passwords</a>).</p>]]></paragraph>
</block>
<block title="Temporary Deactivation of Tags"><paragraph
    title="11.6.68.R.01."

    tags="Communications systems,Technical,RF Devices"


><![CDATA[<p>The RF interface on some tags can be temporarily deactivated. In a supply chain application, for example, tags may be turned off to prevent unauthorised access to the tags during shipment. This feature is useful when communication between readers and a tag is infrequent allowing the tag to be activated when required but limiting vulnerability to rogue transactions if left operational for extended periods with no authorised activity. Temporary deactivation can also extend battery life in powered tags.</p>]]></paragraph>
<paragraph
    title="11.6.68.C.01."

    tags="Communications systems,Technical,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="3002"
><![CDATA[<p>Agencies SHOULD consider temporary deactivation of RFID tags where the tag is likely to be inactive for extended periods.</p>]]></paragraph>
</block>
<block title="Incident Management"><paragraph
    title="11.6.69.R.01."

    tags="Communications systems,Technical,Incident Management,RF Devices"


><![CDATA[<p>Incident management and audit procedures, logging and time stamps help detect and manage security breaches. These are important tools in protecting systems and managing security breaches.</p>]]></paragraph>
<paragraph
    title="11.6.69.C.01."

    tags="Communications systems,Technical,Incident Management,RF Devices"


    classification="All Classifications"
    compliance="Must"
    cid="3006"
><![CDATA[<p>Agencies MUST develop and implement incident identification and management processes in accordance with this manual (See <a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a>, <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13001">Chapter 6 – Information Security Monitoring</a>, <a title="Information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information Security Incidents</a>, <a title="Personnel security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 – Personnel Security </a>and <a title="Access control and passwords" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access Control and passwords</a>).</p>]]></paragraph>
</block>
<block title="Disposal"><paragraph
    title="11.6.70.R.01."

    tags="Communications systems,Technical,Disposal,RF Devices"


><![CDATA[<p>Tag disposal and recycling procedures that permanently disable or destroy sensitive data reduces the possibility that they could be used later for tracking or targeting, and prevents access to sensitive data stored on tags. In addition the continued operating presence of a tag after it has performed its intended function can pose a business intelligence or privacy risk, including tracking, targeting or access to sensitive data on the tag.</p>]]></paragraph>
<paragraph
    title="11.6.70.R.02."

    tags="Communications systems,Technical,Disposal,RF Devices"


><![CDATA[<p>Disposal may be undertaken electronically by using a tag’s “kill” feature or using a strong electromagnetic field to permanently deactivate a tag’s circuitry. Alternatively physical destruction can be achieved by tearing or shredding. Where a tag supports an electronic deactivation mechanism, tags should be electronically deactivated before physical destruction.</p>]]></paragraph>
<paragraph
    title="11.6.70.C.01."

    tags="Communications systems,Technical,Disposal,RF Devices"


    classification="All Classifications"
    compliance="Should"
    cid="3010"
><![CDATA[<p>Agencies SHOULD consider secure disposal procedures and incorporate these into the RFID Usage Policy. Refer also to <a title="Media and IT equipment management, decommissioning and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 – Media and IT equipment management, decommissioning and disposal</a>.</p>]]></paragraph>
</block>
<block title="Operator Training and User Awareness"><paragraph
    title="11.6.71.R.01."

    tags="Communications systems,Governance,RF Devices"


><![CDATA[<p>Operator training can help ensure that personnel using the RFID system have the necessary skills and knowledge follow appropriate guidelines and policies. If HERF/HERO/HERP risks are present, appropriate security training covers mitigation techniques, such as safe handling distances.</p>]]></paragraph>
<paragraph
    title="11.6.71.C.01."

    tags="Communications systems,Governance,RF Devices"


    classification="All Classifications"
    compliance="Must"
    cid="3047"
><![CDATA[<p>Agencies MUST develop and implement user awareness and training programmes to support and enable safe use of RFID services (See <a title="Information security awareness and training" href="http://nzism.gcsb.govt.nz/ism-document#Section-13361">Section 9.1 – Information Security Awareness and Training</a>).</p>]]></paragraph>
</block>
</subsection>
<subsection title="Abbreviations"><paragraph
    title="11.6.72."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td><strong>Term</strong></td>
<td><strong>Meaning</strong></td>
</tr>
<tr>
<td><strong>EMV</strong></td>
<td>
<p>Europay, MasterCard, and Visa technical standard</p>
</td>
</tr>
<tr>
<td><strong>EPC</strong></td>
<td>
<p>Electronic Product Code</p>
</td>
</tr>
<tr>
<td><strong>HERF</strong></td>
<td>
<p>Hazards of Electromagnetic Radiation to Fuel</p>
</td>
</tr>
<tr>
<td><strong>HERO</strong></td>
<td>
<p>Hazards of Electromagnetic Radiation to Ordnance</p>
</td>
</tr>
<tr>
<td><strong>HERP</strong></td>
<td>
<p>Hazards of Electromagnetic Radiation to Personnel</p>
</td>
</tr>
<tr>
<td><strong>HMAC</strong></td>
<td>
<p>Keyed-Hash Message Authentication Code</p>
</td>
</tr>
<tr>
<td><strong>RFID</strong></td>
<td>
<p>Radio Frequency Identification</p>
</td>
</tr>
<tr>
<td><strong>SAM</strong></td>
<td>
<p>Secure Access Module/ Secure Application Module</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Terms"><paragraph
    title="11.6.73."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td><strong>Term</strong></td>
<td><strong>Meaning</strong></td>
</tr>
<tr>
<td><strong>EMV</strong></td>
<td>
<p>Europay, MasterCard, and Visa technical standard for payment cards, payment terminals and automated teller machines (ATMs)</p>
</td>
</tr>
<tr>
<td><strong>EPC</strong></td>
<td>
<p>An Electronic Product Code (EPC) is a universal identifier that gives a unique identity to a specific physical object. In most instances, EPCs are encoded on RFID tags attached to the object and used for stock tracking and management purposes. Many types of assets can be tagged including fixed assets, documents, transport containers and clothing items.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Radio Frequency Identification (RFID)</strong></p>
</td>
<td>
<p>RFID is technology utilising electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum to uniquely identify an object, item, animal, or person. RFID is increasingly used as replacement for bar codes. An RFID system consists of three components: an antenna, transceiver (usually the RFID reader) and a transponder (also known as a tag).</p>
</td>
</tr>
<tr>
<td>
<p><strong>Secure Access Module</strong></p>
</td>
<td>
<p>A <strong>Secure Access Module</strong> (or Secure Application Module) is used to enhance the security and cryptographic performance of devices. SAMs are commonly found in devices needing to perform secure transactions, such as payment terminals. It can be used for cryptographic computation and secure authentication against smart cards or contactless EMV cards.</p>
<p>Physically a SAM card can either be a separate component and plugged into a device when required or incorporated into an integrated circuit.</p>
</td>
</tr>
<tr>
<td><strong>Tag</strong></td>
<td>
<p>The transponder in an RFID system, frequently found attached to an item or object to provide electronic identification.</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
</section>
