<section title="13.3. Media Usage"><subsection title="Objective"><paragraph
    title="13.3.1."


><![CDATA[<p>Media is used with systems in a controlled and accountable manner.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="13.3.2."


><![CDATA[<p>This section covers information on using media with systems. Further information on using media to transfer data between systems can be found in <a title="Data transfers" href="http://nzism.gcsb.govt.nz/ism-document#Section-16836">Section 20.1 - Data Transfers</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="13.3.3."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 100%; height: 229.514px;">
<tbody>
<tr style="height: 73.0556px;">
<td style="width: 19.2976%; height: 73.0556px;"><strong>Reference</strong></td>
<td style="width: 17.2114%; height: 73.0556px;"><strong>Title</strong></td>
<td style="width: 63.4562%; height: 73.0556px;"><strong>Source</strong></td>
</tr>
<tr style="height: 156.458px;">
<td style="width: 19.2976%; height: 156.458px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 17.2114%; height: 156.458px;">
<p>GOV3, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</p>
</td>
<td style="width: 63.4562%; height: 156.458px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a>&nbsp;&nbsp;&nbsp;</p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Using media with systems"><paragraph
    title="13.3.4.R.01."

    tags="Technical,Media Management"


><![CDATA[<p>To prevent classified data spills agencies will need to prevent classified media from being connected to, or used with, systems of a lesser classification than the protective marking of the media.</p>]]></paragraph>
<paragraph
    title="13.3.4.R.02."

    tags="Technical,Media Management"


><![CDATA[<p>Where media is used for backup purposes, the media will be certified for use at the highest level of classification to be backed-up. Refer also to <a title="Business Continuity and Disaster Recovery" href="http://nzism.gcsb.govt.nz/ism-document#Section-13074">Section 6.4 – Business Continuity and Disaster Recovery</a>.</p>]]></paragraph>
<paragraph
    title="13.3.4.C.01."

    tags="Technical,Media Management"


    classification="Confidential, Top Secret, Secret"
    compliance="Must Not"
    cid="4075"
><![CDATA[<p>Agencies MUST NOT use media containing classified information with a system that has a classification lower than the classification of the media.</p>]]></paragraph>
</block>
<block title="Storage of media"><paragraph
    title="13.3.5.R.01."

    tags="Technical,Media Management"


><![CDATA[<p>The security requirements for storage and physical transfer of classified information and IT equipment are specified in the <a title="PSR Physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR Policy Framework - Physical Security.</a></p>]]></paragraph>
<paragraph
    title="13.3.5.C.01."

    tags="Technical,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4078"
><![CDATA[<p>Agencies MUST ensure that storage facilities for media containing classified information meets the minimum physical security storage requirements as specified in the <a title="PSR Physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR Policy Framework - Physical Security</a>.</p>]]></paragraph>
</block>
<block title="Connecting media to systems"><paragraph
    title="13.3.6.R.01."

    tags="Technical,Media Management"


><![CDATA[<p>Some operating systems provide functionality to automatically execute or read certain types of programs that reside on optical media and flash memory media when connected. While this functionality was designed with a legitimate purpose in mind, such as automatically loading a graphical user interface for the system user to browse the contents of the media, or to install software residing on the media, it can also be used for malicious purposes.</p>]]></paragraph>
<paragraph
    title="13.3.6.R.02."

    tags="Technical,Media Management"


><![CDATA[<p>An attacker can create a file on optical media or a connectable device that the operating system will attempt to automatically execute.  When the operating system executes the file, it can have the same effect as when a system user explicitly executes malicious code.  The operating system executes the file without asking the system user for permission.</p>]]></paragraph>
<paragraph
    title="13.3.6.R.03."

    tags="Technical,Media Management"


><![CDATA[<p>Some operating systems will cache information on media to improve performance. As such, inserting media of a higher classification into a system of a lower classification could cause data to be read and saved from the device without user intervention.</p>]]></paragraph>
<paragraph
    title="13.3.6.R.04."

    tags="Technical,Media Management"


><![CDATA[<p>Using device access control software will prevent unauthorised media from being attached to a system. Using an allow listing approach gives security personnel greater control over what can, and what cannot, be connected to the system.</p>]]></paragraph>
<paragraph
    title="13.3.6.C.01."

    tags="Technical,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4086"
><![CDATA[<p>Agencies MUST disable any automatic execution features within operating systems for connectable devices and media.</p>]]></paragraph>
<paragraph
    title="13.3.6.C.02."

    tags="Technical,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4089"
><![CDATA[<p>Agencies MUST prevent unauthorised media from connecting to a system via the use of:</p><ul>
<li>device access control software;</li>
<li>seals;</li>
<li>physical means; or </li>
<li>other methods approved by the Accreditation Authority.</li>
</ul>]]></paragraph>
<paragraph
    title="13.3.6.C.03."

    tags="Technical,Media Management"


    classification="All Classifications"
    compliance="Should"
    cid="4091"
><![CDATA[<p>When writable media is connected to a writable communications port or device, agencies SHOULD implement controls to prevent the unintended writing of data to the media.</p>]]></paragraph>
</block>
<block title="IEEE 1394 (FIREWIRE) interface connections"><paragraph
    title="13.3.7.R.01."

    tags="Technical,FireWire,Media Management"


><![CDATA[<p>Known vulnerabilities have been demonstrated where attackers can connect a FireWire capable device to a locked workstation and modify information in RAM to gain access to encryption keys. Furthermore, as FireWire provides direct access to the system memory, an attacker can read or write directly to memory.</p>]]></paragraph>
<paragraph
    title="13.3.7.R.02."

    tags="Technical,FireWire,Media Management"


><![CDATA[<p>The best defence against this vulnerability is to disable access to FireWire ports using either software controls or physically disabling the FireWire ports so that devices cannot be connected. Alternatively select equipment without FireWire capability.</p>]]></paragraph>
<paragraph
    title="13.3.7.C.01."

    tags="Technical,FireWire,Media Management"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="4096"
><![CDATA[<p>Agencies MUST disable IEEE 1394 interfaces.</p>]]></paragraph>
<paragraph
    title="13.3.7.C.02."

    tags="Technical,FireWire,Media Management"


    classification="All Classifications"
    compliance="Should"
    cid="4097"
><![CDATA[<p>Agencies SHOULD disable IEEE 1394 interfaces.</p>]]></paragraph>
</block>
<block title="Transferring media"><paragraph
    title="13.3.8.R.01."

    tags="Technical,Media Management"


><![CDATA[<p>As media is often transferred through areas not certified to process the level of classified information on the media, additional protection mechanisms need to be implemented.</p>]]></paragraph>
<paragraph
    title="13.3.8.R.02."

    tags="Technical,Media Management"


><![CDATA[<p>Applying encryption to media may reduce the requirements for storage and physical transfer as outlined in the <a title="PSR Physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>. The reduction of any requirements is based on the original classification of information residing on the media and the level of assurance in the cryptographic product being used to encrypt the media.</p>]]></paragraph>
<paragraph
    title="13.3.8.R.03."

    tags="Technical,Media Management"


><![CDATA[<p>Further information on reducing storage and physical transfer requirements can be found in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15746">Section 17.1 - Cryptographic Fundamentals</a>.</p>]]></paragraph>
<paragraph
    title="13.3.8.C.01."

    tags="Technical,Media Management"


    classification="All Classifications"
    compliance="Must"
    cid="4102"
><![CDATA[<p>Agencies MUST ensure that processes for transferring media containing classified information meets the minimum physical transfer requirements as specified in the <a title="PSR physical security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR</a>.</p>]]></paragraph>
<paragraph
    title="13.3.8.C.02."

    tags="Encryption,Technical,Media Management"


    classification="All Classifications"
    compliance="Should"
    cid="4103"
><![CDATA[<p>Agencies SHOULD encrypt data stored on media with at least an Approved Cryptographic Algorithm (<a title="Approved cryptographic algorithms" href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">See Section 17.2 – Approved Cryptographic Algorithms</a>) if it is to be transferred to another area or location.</p>]]></paragraph>
</block>
<block title="Using media for data transfers"><paragraph
    title="13.3.9.R.01."

    tags="Technical,Data Transfers,Media Management"


><![CDATA[<p>Agencies transferring data between systems of different security domains or classifications are strongly encouraged to use media such as write-once CDs and DVDs. This will limit opportunity for information from the higher classified systems to be accidently transferred to lower classified systems. This procedure will also make each transfer a single, auditable event.</p>]]></paragraph>
<paragraph
    title="13.3.9.C.01."

    tags="Technical,Data Transfers,Media Management"


    classification="All Classifications"
    compliance="Should"
    cid="4111"
><![CDATA[<p>Data transfers between systems of different classification SHOULD be logged in an auditable log or register.</p>]]></paragraph>
<paragraph
    title="13.3.9.C.02."

    tags="Technical,Data Transfers,Media Management"


    classification="All Classifications"
    compliance="Should Not"
    cid="4114"
><![CDATA[<p>Agencies transferring data manually between two systems of different security domains or classifications SHOULD NOT use rewriteable media.</p>]]></paragraph>
</block>
<block title="Media in secure areas"><paragraph
    title="13.3.10.R.01."

    tags="Technical,Media Management,Secure Area"


><![CDATA[<p>Certain types of media including USB, FireWire and eSATA capable devices MUST be disabled or explicitly approved as an exception by the Accreditation Authority for a TOP SECRET environment (the GCSB). This provides an additional level of system user awareness and security.</p>]]></paragraph>
<paragraph
    title="13.3.10.R.02."

    tags="Technical,Media Management,Secure Area"


><![CDATA[<p>This practice should be used in addition to device access control software on workstations in case system users are unaware of, or choose to ignore, security requirements for media.</p>]]></paragraph>
<paragraph
    title="13.3.10.C.01."

    tags="Technical,Media Management,Secure Area"


    classification="Top Secret"
    compliance="Must Not"
    cid="4121"
><![CDATA[<p>Agencies MUST NOT permit any media that uses external interface connections within a TOP SECRET area without prior written approval from the Accreditation Authority.</p>]]></paragraph>
</block>
</subsection>
</section>
