<section title="11.7. Card Access Control Systems"><subsection title="Objective"><paragraph
    title="11.7.1."


><![CDATA[<p>To ensure Access Control Systems incorporating contactless RFID or smart cards are used safely and securely in order to protect privacy, prevent unauthorised access and to prevent the compromise of secure spaces.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope "><paragraph
    title="11.7.2."


><![CDATA[<p>This section provides information relating to the risks, security and secure use of RFID or smart cards in access control systems. This section does not discuss biometric access control systems.</p>]]></paragraph>
<paragraph
    title="11.7.3."


><![CDATA[<p>The previous section (<a title="RFIDs" href="http://nzism.gcsb.govt.nz/ism-document#Section-14166">11.6. Radio Frequency Identification Devices</a>) provides background information and technical detail of the RFID aspects and should be read in conjunction with this section.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="11.7.4."


><![CDATA[<p>Contactless access control systems based on RFID (Radio Frequency Identification) has largely replaced earlier technologies such as magnetic swipe cards in almost all security-critical applications. Two generations of RFID access cards exist:</p><ul>
<li>an earlier generation of cards, which use only basic proprietary security mechanisms; and </li>
<li>a more recent generation that incorporates advances in CMOS and smart card technology to implement cryptography and other protective measures.</li>
</ul>]]></paragraph>
<paragraph
    title="11.7.5."


><![CDATA[<p>Older access control systems often incorporated a magnetic strip and were easily cloned. More recent systems support the use of PINs in addition to RFID. Unfortunately PINs are also sometimes stored on the cards, often unencrypted and unprotected, and thus facilitating attacks on both the card and the PIN.</p>]]></paragraph>
<paragraph
    title="11.7.6."


><![CDATA[<p>Access control systems typically comprise four components:</p><ul>
<li>A reader that programmes the access cards for particular employees and their permitted access to parts of the site, building to secure areas.</li>
<li>A transceiver at each control point to communicate with cards.</li>
<li>A controller to control the locks of access points (doors).</li>
<li>The backend system that hosts all permissions and authorised data and interfaces with the reader, transceiver and controllers.</li>
</ul>]]></paragraph>
<paragraph
    title="11.7.7."


><![CDATA[<p>Traditionally access control systems were hosted by stand-alone equipment. Modern access control system may be hosted on standard computer equipment and hosted in the organisation’s datacentre. It is possible that a system intrusion can target access control systems, making the switches, gates and locks remotely accessible.</p>]]></paragraph>
<paragraph
    title="11.7.8."


><![CDATA[<p>Low frequency RFID badge systems use 125KHz, (ISO 11784/5 and ISO 14223). Newer high frequency RFID cards use 13.56MHz (ISO 15693, ISO 14443 and ISO 18000-3).</p>]]></paragraph>
<paragraph
    title="11.7.9."


><![CDATA[<p>Some cards also operate at UHF frequencies of 850-960Mhz (ISO 18000-6). Some cards are designed to operate at low and high frequencies by embedding multiple antennae in the cards.</p>]]></paragraph>
<paragraph
    title="11.7.10."


><![CDATA[<p>The <a title="ISO/IEC 14443" rel="noopener noreferrer" href="https://www.iso.org/search.html?q=14443" target="_blank">ISO/IEC 14443</a> standard for contactless smart card communications defines two types of contactless cards ("A" and "B") and allows for communications at distances up to 10 cm operating at 13.56 MHz.</p>]]></paragraph>
<paragraph
    title="11.7.11."


><![CDATA[<p>The alternative <a title="ISO/IEC 15693" rel="noopener noreferrer" href="https://www.iso.org/search.html?q=15693" target="_blank">ISO/IEC 15693</a> standard allows communications at distances up to 50 cm. The <a title="ISO/IEC 7816" rel="noopener noreferrer" href="https://www.iso.org/search.html?q=7816" target="_blank">ISO/IEC 7816</a> standard (in 15 parts) defines the physical, electrical interface and operating characteristics of these cards.</p>]]></paragraph>
<paragraph
    title="11.7.12."


><![CDATA[<p>UHF cards follow the <a title="EPC Global Gen2" rel="noopener noreferrer" href="https://www.gs1.org/sites/default/files/docs/epc/uhfc1g2_2_0_0_standard_20131101.pdf" target="_blank">EPC Global Gen2</a> standard and the <a title="ISO/IEC 18000-6" rel="noopener noreferrer" href="https://www.iso.org/search.html?q=18000-6" target="_blank">ISO 18000-6</a> standards and are designed to operate at distances of up to 10 metres.</p>]]></paragraph>
</block>
<block title="Smart Cards"><paragraph
    title="11.7.13."


><![CDATA[<p>Smart cards typically incorporate an embedded integrated circuit typically incorporating a microchip with internal memory, a read-only CSN (Card Serial Number) or a UID (User Identification). The card connects to a reader with direct physical contact or a contactless radio frequency (RFID) interface. With an embedded microchip, smart cards can store large amounts of data, carry out on-card functions (such as encryption and authentication) and interact intelligently with a smart card reader. Smart card technology can be found in a variety of form factors, including plastic cards, key fobs, watches, subscriber identification modules used in mobile phones, and USB-based tokens. Smart cards are widely used in payment card (debit and credit cards and electronic wallets) and access control systems.</p>]]></paragraph>
<paragraph
    title="11.7.14."


><![CDATA[<p>In common with other RFID devices, smart cards incorporate an antenna embedded in the body of the card (or key fob, watch or token). When the card is brought within range of the reader, the chip in the card is powered on. Once powered on, an RF communication protocol is initiated and communication established between the card and the reader for data transfer.</p>]]></paragraph>
<paragraph
    title="11.7.15."


><![CDATA[<p>Smart cards typically incorporate protective mechanisms including authentication, secure data storage, encryption, tamper-resistance and secure communication. Support for biometric authentication may also be incorporated.</p>]]></paragraph>
</block>
<block title="Near Field Communication (NFC)"><paragraph
    title="11.7.16."


><![CDATA[<p>NFC is an RFID technology that enables two electronic devices to establish communication by bringing them within 4 cm of each other. As with other "proximity" technologies, NFC employs electromagnetic induction between two loop antennae when NFC devices exchange information. NFC operates in the globally available unlicensed radio frequency band of 13.56 MHz conforming to the ISO/IEC 18000-3 standard. In access control applications these devices are sometimes known as “prox cards”.</p>]]></paragraph>
</block>
<block title="Attacks"><paragraph
    title="11.7.17."


><![CDATA[<p>In addition to attacks on RFID components described in the previous section, access control cards can be susceptible to relay and chip hacking attacks.</p>]]></paragraph>
<paragraph
    title="11.7.18."


><![CDATA[<p>Relay attacks rely on rogue readers to activate the tag even when not in proximity to a legitimate reader. The card holder will be unaware that such an attack is underway. An effective defence is to incorporate distance-to-reader verification although few RFID systems incorporate this mechanism.</p>]]></paragraph>
<paragraph
    title="11.7.19."


><![CDATA[<p>Signals between cards and a legitimate reader can be intercepted at distances of up to a metre. Greater distances are possible with higher powered equipment, special antennae and in low interference environments. The signals and data, including card credentials, are captured off-line and used to clone access cards. Again the card holder will be unaware that such an attack is underway.</p>]]></paragraph>
<paragraph
    title="11.7.20."


><![CDATA[<p>Chip hacking is facilitated by physical access to the card but can be mitigated by second factor authentication, encryption of data on the card and card tamper detection.</p>]]></paragraph>
<paragraph
    title="11.7.21."


><![CDATA[<p>Threats, vulnerabilities and mitigations of RFID access control systems are summarised in the table below:</p><table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Threat/Vulnerability</strong></p>
</td>
<td><strong>Mitigation </strong></td>
</tr>
<tr>
<td>
<p><strong>Interception of the RFID signals</strong></p>
</td>
<td>
<p>Encryption of RF links</p>
<p>Harden RFID elements</p>
</td>
</tr>
<tr>
<td><strong>Implants</strong></td>
<td>
<p>Physical security</p>
<p>CCTV</p>
<p>Tamper resistant readers</p>
</td>
</tr>
<tr>
<td>
<p><strong>Cryptographic attacks</strong></p>
</td>
<td>
<p>Use of approved cryptographic algorithms and protocols</p>
<p>Strong key management</p>
<p>Incident detection and management</p>
<p>Use of evaluated products</p>
</td>
</tr>
<tr>
<td>
<p><strong>Replay Authentications</strong></p>
</td>
<td>Robust Random Number Generation on readers</td>
</tr>
<tr>
<td>
<p><strong>Key extraction reader attacks through side channel analysis or fault injection</strong></p>
</td>
<td>
<p>Use of evaluated products with SAM chips</p>
<p>Incident detection and management</p>
</td>
</tr>
<tr>
<td>
<p><strong>Attack on authentication keys on the card</strong></p>
</td>
<td>
<p>Key diversification</p>
<p>Strong key management</p>
<p>Incident detection and management</p>
</td>
</tr>
<tr>
<td>
<p><strong>Chip Hacking</strong></p>
</td>
<td>
<p>Use of approved cryptographic algorithms and protocols on the card</p>
<p>Tamper protection</p>
<p>Incident detection and management</p>
</td>
</tr>
<tr>
<td>
<p><strong>Malware</strong></p>
</td>
<td>
<p>Update and patching for all system components</p>
<p>Incident detection and management</p>
</td>
</tr>
<tr>
<td>
<p><strong>Backend systems</strong></p>
</td>
<td>
<p>System hardening</p>
<p>Update and patching for all system components</p>
<p>Intrusion detection</p>
<p>Incident detection and management</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Product Selection"><paragraph
    title="11.7.22."


><![CDATA[<p>A number of protection profiles related to smartcards and related devices and systems are provided on the Common Criteria website. Refer also to <a title="Product Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>.</p>]]></paragraph>
</block>
<block title="Secure Access Module"><paragraph
    title="11.7.23."


><![CDATA[<p>A Secure Access Module (or Secure Application Module - SAM) is used to enhance the security and cryptographic performance of devices. SAMs are commonly found in devices needing to perform secure transactions, such as payment terminals. It can be used for cryptographic computation and secure authentication against smart cards or contactless payment cards.</p>]]></paragraph>
<paragraph
    title="11.7.24."


><![CDATA[<p>Physically a SAM card can either be a separate component and plugged into a device when required or incorporated into an integrated circuit. A typically use is for the secure storage of cryptographic keys or other sensitive data. SAM hardware and software are designed to prevent information leakage and incorporates countermeasures against electromagnetic radiation, timing measurements, and other side channel attacks. These properties mean that SAMs offer a much higher level of protection than the terminals and readers, which often utilise general-purpose computers.</p>]]></paragraph>
<paragraph
    title="11.7.25."


><![CDATA[<p>SAM’s typically support 3DES and AES cryptographic algorithms and SHA hashing algorithms in their hardware cryptographic co-processor implementations. Refer to Chapter 17 for information on approved cryptographic algorithms and protocols. It is important to note that 3DES is approved for use on legacy systems only and SHA-1 is not an approved hashing algorithm.</p>]]></paragraph>
</block>
<block title="Card Protection"><paragraph
    title="11.7.26."


><![CDATA[<p>RFID blocking wallets and RFID card sleeves are available to block RFID frequencies. These are typically used for the protection of credit and other payment, access, transit cards and e-passports as a countermeasure for skimming attacks.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References - Guidance"><paragraph
    title="11.7.27."


><![CDATA[<p class="NormS10C2">Further references on Guidance can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Common Criteria Protection Profiles</strong></p>
</td>
<td>
<p>Common Criteria</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.commoncriteriaportal.org/pps/" target="_blank">https://www.commoncriteriaportal.org/pps/</a></td>
</tr>
<tr>
<td><strong>SP 800-82</strong></td>
<td>
<p><strong>NIST Special Publication 800-82 rev.2 Guide to Industrial Control&nbsp;</strong><strong>Systems (ICS) Security, May 2015</strong></p>
</td>
<td>NIST</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-82r2.pdf" target="_blank">Guide to Industrial Control Systems (ICS) Security (nist.gov)</a></td>
</tr>
</tbody>
</table><p class="NormS10C2">&nbsp;</p><p class="NormS10C2">&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="References - Standards"><paragraph
    title="11.7.28."


><![CDATA[<p class="NormS10C2">Further references on standards can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td>&nbsp;<strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-1:2011</strong></td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 1: Cards with contacts -- Physical characteristics</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td>
<p><a rel="noopener noreferrer" href="https://www.iso.org/standard/54089.html" target="_blank">https://www.iso.org/standard/54089.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-2:2007</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 2: Cards with contacts -- Dimensions and location of the contacts</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 2: Cards with contacts — Dimensions and location of the contacts" rel="noopener noreferrer" href="https://www.iso.org/standard/45989.html" target="_blank">https://www.iso.org/standard/45989.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-3:2006</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 3: Cards with contacts -- Electrical interface and transmission protocols</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/standard/38770.html" target="_blank">https://www.iso.org/standard/38770.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-4:2013</strong>&nbsp;</td>
<td><strong>Identification cards -- Integrated circuit cards -- Part 4: Organization, security and commands for interchange</strong></td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 4: Organization, security and commands for interchange" rel="noopener noreferrer" href="https://www.iso.org/standard/54550.html" target="_blank">https://www.iso.org/standard/54550.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-5:2004</strong>&nbsp;</td>
<td><strong>Identification cards -- Integrated circuit cards -- Part 5: Registration of application providers</strong></td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 5: Registration of application providers" rel="noopener noreferrer" href="https://www.iso.org/standard/34259.html" target="_blank">https://www.iso.org/standard/34259.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-6:2004</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 6: Interindustry data elements for interchange</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange" rel="noopener noreferrer" href="https://www.iso.org/standard/38780.html" target="_blank">https://www.iso.org/standard/38780.html</a>&nbsp;</td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-7:1999</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit(s) cards with contacts -- Part 7: Interindustry commands for Structured Card Query Language (SCQL)</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit(s) cards with contacts — Part 7: Interindustry commands for Structured Card Query Language (SCQL)" rel="noopener noreferrer" href="https://www.iso.org/standard/28869.html" target="_blank">https://www.iso.org/standard/28869.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-8:2019</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 8:&nbsp;Commands and mechanisms for security operations</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 8: Commands and mechanisms for security operations" rel="noopener noreferrer" href="https://www.iso.org/standard/75844.html" target="_blank">https://www.iso.org/standard/75844.html&nbsp;</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-9:2017</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 9: Commands for card management</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 9: Commands for card management" rel="noopener noreferrer" href="https://www.iso.org/standard/67802.html" target="_blank">https://www.iso.org/standard/67802.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-10:1999</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit(s) cards with contacts -- Part 10: Electronic signals and answer to reset for synchronous cards</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit(s) cards with contacts — Part 10: Electronic signals and answer to reset for synchronous cards" rel="noopener noreferrer" href="https://www.iso.org/standard/30558.html" target="_blank">https://www.iso.org/standard/30558.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-11:2017</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 11: Personal verification through biometric methods</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/standard/67799.html" target="_blank">https://www.iso.org/standard/67799.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-12:2005</strong>&nbsp;</td>
<td>
<p><strong>Identification cards - Integrated circuit cards -- Part 12: Cards with contacts -- USB electrical interface and operating procedures</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards - Integrated circuit cards — Part 12: Cards with contacts — USB electrical interface and operating procedures" rel="noopener noreferrer" href="https://www.iso.org/standard/40604.html" target="_blank">https://www.iso.org/standard/40604.html&nbsp;</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-13:2007</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 13: Commands for application management in a multi-application environment</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 13: Commands for application management in a multi-application environment" rel="noopener noreferrer" href="https://www.iso.org/standard/40605.html" target="_blank">https://www.iso.org/standard/40605.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 7816-15:2016</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Integrated circuit cards -- Part 15: Cryptographic information application</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Integrated circuit cards — Part 15: Cryptographic information application" rel="noopener noreferrer" href="https://www.iso.org/standard/65250.html" target="_blank">https://www.iso.org/standard/65250.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 10373-7:2019</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Test methods -- Part 7: Vicinity cards</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Cards and security devices for personal identification — Test methods — Part 7: Contactless vicinity objects" rel="noopener noreferrer" href="https://www.iso.org/standard/74958.html" target="_blank">https://www.iso.org/standard/74958.html&nbsp;</a></td>
</tr>
<tr>
<td><strong>ISO 11784:1996 Amdt 2:2010</strong>&nbsp;</td>
<td>
<p class="no-uppercase"><strong>Radio frequency identification of animals — Code structure — Amendment 2: Indication of an advanced transponder</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="Radio frequency identification of animals — Code structure — Amendment 2: Indication of an advanced transponder" rel="noopener noreferrer" href="https://www.iso.org/standard/45365.html" target="_blank">https://www.iso.org/standard/45365.html</a></td>
</tr>
<tr>
<td><strong>ISO 14223-1:2011</strong>&nbsp;</td>
<td>
<p class="no-uppercase"><strong>Radiofrequency identification of animals — Advanced transponders — Part 1: Air interface</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="Radiofrequency identification of animals — Advanced transponders — Part 1: Air interface" rel="noopener noreferrer" href="https://www.iso.org/standard/50979.html" target="_blank">https://www.iso.org/standard/50979.html</a></td>
</tr>
<tr>
<td><strong>ISO 14223-2:2010</strong>&nbsp;</td>
<td>
<p><strong>Radiofrequency identification of animals -- Advanced transponders -- Part 2: Code and command structure</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="Radiofrequency identification of animals — Advanced transponders — Part 2: Code and command structure" rel="noopener noreferrer" href="https://www.iso.org/standard/45364.html" target="_blank">https://www.iso.org/standard/45364.html</a></td>
</tr>
<tr>
<td><strong>ISO 14443-1:2008</strong>&nbsp;</td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 1: Physical characteristics</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 1: Physical characteristics" rel="noopener noreferrer" href="https://www.iso.org/standard/39693.html" target="_blank">https://www.iso.org/standard/39693.html</a>&nbsp;</td>
</tr>
<tr>
<td><strong>ISO/IEC 14443-2:2010</strong>&nbsp;</td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 2: Radio frequency power and signal interface</strong></p>
</td>
<td style="text-align: center;">&nbsp;ISO</td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 2: Radio frequency power and signal interface" rel="noopener noreferrer" href="https://www.iso.org/standard/50941.html" target="_blank">https://www.iso.org/standard/50941.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 14443-3:2011</strong>&nbsp;</td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 3: Initialization and anticollision</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 3: Initialization and anticollision" rel="noopener noreferrer" href="https://www.iso.org/standard/50942.html" target="_blank">https://www.iso.org/standard/50942.html</a>&nbsp;</td>
</tr>
<tr>
<td><strong>ISO/IEC 14443-4:2008&nbsp;</strong>&nbsp;</td>
<td>
<p><strong>Identification cards – Contactless integrated circuit cards – Proximity cards – Part 4: Transmission protocol</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Contactless integrated circuit cards — Proximity cards — Part 4: Transmission protocol" rel="noopener noreferrer" href="https://www.iso.org/standard/50648.html" target="_blank">https://www.iso.org/standard/50648.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 18000-3:2010&nbsp;</strong>&nbsp;</td>
<td>
<p><strong>Information technology -- Radio frequency identification for item management -- Part 3: Parameters for air interface communications at 13,56 MHz</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Information technology — Radio frequency identification for item management — Part 3: Parameters for air interface communications at 13,56 MHz" rel="noopener noreferrer" href="https://www.iso.org/standard/53424.html" target="_blank">https://www.iso.org/standard/53424.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 18000-6:2013&nbsp;</strong>&nbsp;</td>
<td>
<p><strong>Information technology -- Radio frequency identification for item management -- Part 6: Parameters for air interface communications at 860 MHz to 960 MHz General</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Information technology — Radio frequency identification for item management — Part 6: Parameters for air interface communications at 860 MHz to 960 MHz General" rel="noopener noreferrer" href="https://www.iso.org/standard/59644.html" target="_blank">https://www.iso.org/standard/59644.html</a>&nbsp;</td>
</tr>
<tr>
<td><strong>ISO/IEC TR 29123:2007&nbsp;</strong>&nbsp;</td>
<td>
<p><strong>Identification Cards – Proximity Cards – Requirements for the enhancement of interoperability</strong></p>
</td>
<td style="text-align: center;">&nbsp;<span>ISO</span></td>
<td><a title="Identification Cards — Proximity Cards — Requirements for the enhancement of interoperability" rel="noopener noreferrer" href="https://www.iso.org/standard/45146.html" target="_blank">https://www.iso.org/standard/45146.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 15693-1:2010</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Contactless integrated circuit cards -- Vicinity cards -- Part 1: Physical characteristics</strong></p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td><a title="Identification cards — Contactless integrated circuit cards — Vicinity cards — Part 1: Physical characteristics" rel="noopener noreferrer" href="https://www.iso.org/standard/39694.html" target="_blank">https://www.iso.org/standard/39694.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 15693-2:2006</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Contactless integrated circuit cards -- Vicinity cards -- Part 2: Air interface and initialization</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="Identification cards — Contactless integrated circuit cards — Vicinity cards — Part 2: Air interface and initialization" rel="noopener noreferrer" href="https://www.iso.org/standard/39695.html" target="_blank">https://www.iso.org/standard/39695.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 15693-3:2019</strong>&nbsp;</td>
<td>
<p><strong>Identification cards -- Contactless integrated circuit cards -- Vicinity cards -- Part 3: Anticollision and transmission protocol</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="Cards and security devices for personal identification — Contactless vicinity objects — Part 3: Anticollision and transmission protocol" rel="noopener noreferrer" href="https://www.iso.org/standard/73602.html" target="_blank">https://www.iso.org/standard/73602.html</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale and Controls"> <block title="Risk Assessment"><paragraph
    title="11.7.29.R.01."

    tags="Communications systems,Technical,Access Control,Risk Assessment"


><![CDATA[<p>As with many technologies, adoption of RFID access cards has the potential to introduce a wide range of risks in addition to the risks that already exist for agency systems. This may compromise the cards and enable unauthorised access, in addition to RFID risks discussed in the previous section. A risk assessment is an essential tool in determining and assessing the range and extent of risk and threat in the use of RFID access cards.</p>]]></paragraph>
<paragraph
    title="11.7.29.C.01."

    tags="Communications systems,Technical,Access Control,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="3130"
><![CDATA[<p>Agencies MUST conduct and document a risk assessment before implementing or adopting an RFID access card system.</p>]]></paragraph>
<paragraph
    title="11.7.29.C.02."

    tags="Communications systems,Technical,Access Control,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="3131"
><![CDATA[<p>This risk assessment MUST be the basis of a security architecture design.</p>]]></paragraph>
</block>
<block title="Security Architecture"><paragraph
    title="11.7.30.R.01."

    tags="Communications systems,Technical,Access Control"


><![CDATA[<p>The foundation of strong security architecture in RFID follows these important principles:</p><ol>
<li><strong>Physical Security</strong> - over readers, secure areas, issued and unissued access cards;</li>
<li><strong>Controlled access to the data</strong> – only authorised entities (people, systems, devices) can read and write information to the cards, card databases and backend systems;</li>
<li><strong>Control over access to the system</strong> – only authorised entities can configure or add devices to the system, and all devices on the system are authentic and trustworthy;</li>
<li><strong>Confidence and trust</strong> – back-end systems are designed and implemented in accordance with the current version of the NZISM. This includes intrusion detection and incident management mechanisms and procedures.</li>
</ol>]]></paragraph>
<paragraph
    title="11.7.30.R.02."

    tags="Communications systems,Technical,Access Control"


><![CDATA[<p>Some access systems may cover several organisations or sites. In such cases, multiple organisations or sites may require access to databases that contain personnel identifiers, passwords and access permissions. The security architecture should incorporate strong security controls including the authentication of external entities, incident management, audit logging and other essential security controls.</p>]]></paragraph>
<paragraph
    title="11.7.30.C.01."

    tags="Communications systems,Technical,Access Control"


    classification="All Classifications"
    compliance="Must"
    cid="3138"
><![CDATA[<p>Agencies MUST develop a strong security architecture to protect access to databases and systems.</p>]]></paragraph>
<paragraph
    title="11.7.30.C.02."

    tags="Communications systems,Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="3139"
><![CDATA[<p>Agencies SHOULD apply the NZISM access controls (<a title="Communication systems and devices" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13958">Chapter 11</a>) and cryptographic controls (<a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17</a>) to access card systems.</p>]]></paragraph>
<paragraph
    title="11.7.30.C.03."

    tags="Communications systems,Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="3141"
><![CDATA[<p>Agencies SHOULD consider the application of the following design elements:</p><ul>
<li>Implement a Demilitarized Zone (DMZ) to isolate card systems from other parts of the organisation’s network and from high-risk Internet Protocol (IP) network connections;</li>
<li>Secure or remove connections between the Internet and card system network segments;</li>
<li>Secure or remove vulnerable dialup modem links; </li>
<li>Secure or remove vulnerable wireless radio links and network access points; and</li>
<li>Network activity monitoring for unusual or anomalous access activity and well as intrusion detection.</li>
</ul>]]></paragraph>
</block>
<block title="Policy"><paragraph
    title="11.7.31.R.01."

    tags="Communications systems,Governance,Access Control"


><![CDATA[<p>An Access Card Usage Policy is an essential component addressing topics such as how personal information is stored and shared, card holder responsibilities and procedures to manage card loss or damage. Refer also to <a title="Data management" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16835">Chapter&nbsp;20 – Data Management</a>.</p>]]></paragraph>
<paragraph
    title="11.7.31.R.02."

    tags="Communications systems,Governance,Access Control"


><![CDATA[<p>Any access card implementation should also be incorporated into the agency’s security policies. Refer also to <a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a>.</p>]]></paragraph>
<paragraph
    title="11.7.31.C.01."

    tags="Communications systems,Governance,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="3156"
><![CDATA[<p>Agencies SHOULD develop, implement and maintain an Access Card Usage Policy.</p>]]></paragraph>
<paragraph
    title="11.7.31.C.02."

    tags="Communications systems,Governance,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="3157"
><![CDATA[<p>Agencies SHOULD incorporate access cards into the agency’s security policies and information security documentation.</p>]]></paragraph>
</block>
<block title="Physical Security"><paragraph
    title="11.7.32.R.01."

    tags="Communications systems,Technical,Access Control,Physical Security"


><![CDATA[<p>Physical security over readers, door controls, cables and control systems, as well as the cards themselves is fundamental to the operation of a secure system.</p>]]></paragraph>
<paragraph
    title="11.7.32.R.02."

    tags="Communications systems,Technical,Access Control,Physical Security"


><![CDATA[<p>In order to minimise unnecessary electromagnetic radiation readers and control equipment should be carefully positioned. Care should be taken with the use of card readers in proximity to:</p><ul>
<li>Fuel, ordnance, and other hazardous materials, </li>
<li>Metal and reflective objects that can modify and amplify signals in unintended and potentially harmful ways, and </li>
<li>Legitimate radio systems to avoid interference.</li>
</ul>]]></paragraph>
<paragraph
    title="11.7.32.C.01."

    tags="Communications systems,Technical,Access Control,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="3162"
><![CDATA[<p>Agencies SHOULD select systems that provide resistance to physical or electronic tampering.</p>]]></paragraph>
<paragraph
    title="11.7.32.C.02."

    tags="Communications systems,Technical,Access Control,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="3163"
><![CDATA[<p>Agencies SHOULD implement systems to minimise the risk of physical or electronic tampering.</p>]]></paragraph>
<paragraph
    title="11.7.32.C.03."

    tags="Communications systems,Technical,Access Control,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="3165"
><![CDATA[<p>Agencies SHOULD consider placement of tags and location of readers to avoid unnecessary electromagnetic radiation.</p>]]></paragraph>
<paragraph
    title="11.7.32.C.04."

    tags="Communications systems,Technical,Access Control,Physical Security"


    classification="All Classifications"
    compliance="Should"
    cid="3166"
><![CDATA[<p>Agencies SHOULD consider and select other physical controls in accordance with the <a title="PSR Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>.</p>]]></paragraph>
</block>
<block title="Card Data Protection"><paragraph
    title="11.7.33.R.01."

    tags="Communications systems,Governance,Access Control"


><![CDATA[<p>Cards are invariably retained by the card holder and subject to loss, theft or being misplaced. Cards are also not always within the control of the card holder outside of normal office hours. Measures to protect cards in these situations are fundamental to the maintenance of the integrity and security of the access control system.</p>]]></paragraph>
<paragraph
    title="11.7.33.C.01."

    tags="Communications systems,Cryptography,Technical,Access Control"


    classification="All Classifications"
    compliance="Must"
    cid="3171"
><![CDATA[<p>Agencies MUST follow the requirements of the NZISM in the selection and implementation of cryptographic protocols and algorithms, and in key management, detailed in <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 - Cryptography</a>.</p>]]></paragraph>
<paragraph
    title="11.7.33.C.02."

    tags="Communications systems,Encryption,Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="3173"
><![CDATA[<p>Agencies SHOULD encrypt data before it is written to cards.</p>]]></paragraph>
<paragraph
    title="11.7.33.C.03."

    tags="Communications systems,Encryption,Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="3175"
><![CDATA[<p>Agencies SHOULD consider the use of cards systems incorporating Secure Access Modules (SAMs).</p>]]></paragraph>
</block>
<block title="Incident Management"><paragraph
    title="11.7.34.R.01."

    tags="Communications systems,Technical,Access Control,Incident Management"


><![CDATA[<p>Incident management and audit procedures, logging and time stamps help detect and manage security breaches. These are important tools in protecting systems and managing security breaches.</p>]]></paragraph>
<paragraph
    title="11.7.34.C.01."

    tags="Communications systems,Technical,Access Control,Incident Management"


    classification="All Classifications"
    compliance="Must"
    cid="3180"
><![CDATA[<p>Agencies MUST develop and implement incident identification and management processes in accordance with this manual (See <a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a>, <a title="Information security monitoring" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13001">Chapter 6 – Information Security Monitoring</a>, <a title="Information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information Security Incidents</a>, <a title="Personnel security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 – Personnel Security</a> and <a title="Access control and passwords" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access control and passwords</a>).</p>]]></paragraph>
</block>
<block title="Disposal"><paragraph
    title="11.7.35.R.01."

    tags="Communications systems,Technical,Access Control,Disposal"


><![CDATA[<p>Card disposal and recycling procedures that permanently disable or destroy sensitive data reduces the possibility that they could be used later for tracking or targeting, and prevents access to sensitive data stored on cards. In addition the continued operating presence of a card after it has performed its intended function can pose an unauthorised access, business intelligence or privacy risk, including tracking and targeting of personnel or access to sensitive data on the access card.</p>]]></paragraph>
<paragraph
    title="11.7.35.R.02."

    tags="Communications systems,Technical,Access Control,Disposal"


><![CDATA[<p>Disposal may be undertaken by electronically by using a card’s wipe feature or using a strong electromagnetic field to permanently deactivate a tag’s circuitry. Alternatively physical destruction can be achieved by tearing or shredding. Where a tag supports an electronic deactivation mechanism, tags should be electronically deactivated before physical destruction.</p>]]></paragraph>
<paragraph
    title="11.7.35.C.01."

    tags="Communications systems,Technical,Access Control,Disposal"


    classification="All Classifications"
    compliance="Should"
    cid="3189"
><![CDATA[<p>Agencies SHOULD consider secure disposal procedures and incorporate these into the Access Card Usage Policy. Refer also to <a title="Media and IT equipment management, decommissioning and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Media and IT equipment management, decommissioning and disposal</a>.</p>]]></paragraph>
</block>
</subsection>
</section>
