<section title="18.1. Network Management"><subsection title="Objective"><paragraph
    title="18.1.1."


><![CDATA[<p>Any change to the configuration of networks is authorised and controlled through appropriate change management processes to ensure security, functionality and capability is maintained.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="18.1.2."


><![CDATA[<p>This section covers information relating to the selection, management and documentation of network infrastructure.</p>]]></paragraph>
</block>
<block title="Network diagrams"><paragraph
    title="18.1.3."


><![CDATA[<p>An agency’s network diagrams should illustrate all network devices including firewalls, IDSs, IPSs, routers, switches, hubs, etc.  It does not need to illustrate all IT equipment on the network, such as workstations or printers which can be collectively represented.  The inclusion of significant devices such as MFD’s and servers can aid interpretation.</p>]]></paragraph>
</block>
<block title="Systems Documentation"><paragraph
    title="18.1.4."


><![CDATA[<p>Knowledge of systems design, equipment and implementation is a primary objective of those seeking to attack or compromise systems or to steal information.  System documentation is a rich source allowing attackers to identify design weaknesses and vulnerabilities.  The security of systems documentation is therefore important in preserving the security of systems.</p>]]></paragraph>
<paragraph
    title="18.1.5."


><![CDATA[<p>Detailed network documentation and configuration details can contain information about IP addresses, port numbers, host names, services and protocols, software version numbers, patch status, security enforcing devices and information about information compartments and enclaves containing highly valuable information.  This information can be used by a malicious actor to compromise an agency’s network.</p>]]></paragraph>
<paragraph
    title="18.1.6."


><![CDATA[<p>This information may be particularly exposed when sent to offshore vendors, consultants and other service providers.  Encrypting this data will provide an important protective measure and assist in securing this data and information.</p>]]></paragraph>
<paragraph
    title="18.1.7."


><![CDATA[<p>Reference should also be made to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-14623">Section 12.7 – Supply Chain</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="18.1.8."


><![CDATA[<p class="NormS10C1b">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 110.59%;">
<tbody>
<tr>
<td style="width: 17.2905%;"><strong>Reference</strong></td>
<td style="width: 17.9192%;"><strong>Title</strong></td>
<td style="width: 64.7608%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 17.2905%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 17.9192%;">
<p>GOV5, GOV6, INFOSEC1, INFOSEC2, INFOSEC3 and INFOSEC4</p>
</td>
<td style="width: 64.7608%;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a><a title="PSR Mandatory Requirements - Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/information-security/mandatory-requirements-2/" target="_blank">/</a>&nbsp; &nbsp;</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Classification of Network Documentation"><paragraph
    title="18.1.9.R.01."

    tags="Information Security Documentation,Network Security,Technical"


><![CDATA[<p>To provide an appropriate level of protection to systems and network documentation, a number of security aspects should be considered. These include:</p><ul>
<li>the existence of the system;</li>
<li>the intended use;</li>
<li>the classification of the data to be carried or processed by this system;</li>
<li>the connectivity and agencies connected; </li>
<li>protection enhancements and modifications; and</li>
<li>the level of detail included in the documentation.</li>
</ul><p>High level conceptual diagrams and accompanying documentation should also be subject to these considerations</p>]]></paragraph>
<paragraph
    title="18.1.9.C.01."

    tags="Information Security Documentation,Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3170"
><![CDATA[<p>Agencies MUST perform a security risk assessment before providing network documentation to a third party, such as a commercial provider or contractor.</p>]]></paragraph>
<paragraph
    title="18.1.9.C.02."

    tags="Information Security Documentation,Network Security,Technical"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="3172"
><![CDATA[<p>Systems documentation and detailed network diagrams MUST be classified at least to the level of classification of the data to be carried on those systems.</p>]]></paragraph>
<paragraph
    title="18.1.9.C.03."

    tags="Information Security Documentation,Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3174"
><![CDATA[<p>Network documentation provided to a third party, such as to a commercial provider or contractor, MUST contain only the information necessary for them to undertake their contractual services and functions, consistent with the need-to-know principle.</p>]]></paragraph>
<paragraph
    title="18.1.9.C.04."

    tags="Information Security Documentation,Network Security,Technical"


    classification="All Classifications"
    compliance="Must Not"
    cid="3176"
><![CDATA[<p>Detailed network configuration information MUST NOT be published in tender documentation.</p>]]></paragraph>
<paragraph
    title="18.1.9.C.05."

    tags="Information Security Documentation,Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3179"
><![CDATA[<p>Security aspects SHOULD be considered when determining the classification level of systems and network documentation.</p>]]></paragraph>
</block>
<block title="Configuration management"><paragraph
    title="18.1.10.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>If the network is not centrally managed, there could be sections of the network that do not comply with the agency’s security policies, and thus create a vulnerability.</p>]]></paragraph>
<paragraph
    title="18.1.10.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>Changes should be authorised by a change management process, including representatives from all parties involved in the management of the network.  This process ensures that changes are understood by all parties and reduces the likelihood of an unexpected impact on the network.</p>]]></paragraph>
<paragraph
    title="18.1.10.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3188"
><![CDATA[<p>Agencies SHOULD keep the network configuration under the control of a network management authority.</p>]]></paragraph>
<paragraph
    title="18.1.10.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3190"
><![CDATA[<p>All changes to the configuration SHOULD be documented and approved through a formal change control process.</p>]]></paragraph>
<paragraph
    title="18.1.10.C.03."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3191"
><![CDATA[<p>Agencies SHOULD regularly review their network configuration to ensure that it conforms to the documented network configuration.</p>]]></paragraph>
<paragraph
    title="18.1.10.C.04."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3192"
><![CDATA[<p>Agencies SHOULD deploy an automated tool that compares the running configuration of network devices against the documented configuration.</p>]]></paragraph>
</block>
<block title="Network diagrams"><paragraph
    title="18.1.11.R.01."

    tags="Information Security Documentation,Network Security,Technical"


><![CDATA[<p>As most decisions are made on the documentation that illustrates the network, it is important that:</p><ul>
<li>a network diagram exists;</li>
<li>the security architecture is recorded;</li>
<li>the network diagram is an accurate depiction of the network; and</li>
<li>the network diagram indicates when it was last updated.</li>
</ul>]]></paragraph>
<paragraph
    title="18.1.11.C.01."

    tags="Information Security Documentation,Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3195"
><![CDATA[<p>For each network an agency manages they MUST have:</p><ul>
<li>a high-level diagram showing all connections and gateways into the network; and</li>
<li>a network diagram showing all communications equipment.</li>
</ul>]]></paragraph>
</block>
<block title="Updating network diagrams"><paragraph
    title="18.1.12.R.01."

    tags="Information Security Documentation,Network Security,Technical"


><![CDATA[<p>Because of the importance of the network diagram and decisions made based upon its contents, it should be updated as changes are made.  This will assist system administrators to completely understand and adequately protect the network.</p>]]></paragraph>
<paragraph
    title="18.1.12.C.01."

    tags="Information Security Documentation,Network Security,Technical"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3198"
><![CDATA[<p>An agency’s network diagrams MUST:</p><ul>
<li>be updated as network changes are made; and</li>
<li>include a ‘Current as at [date]’ statement on each page.</li>
</ul>]]></paragraph>
<paragraph
    title="18.1.12.C.02."

    tags="Information Security Documentation,Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3199"
><![CDATA[<p>An agency’s network diagrams SHOULD:</p><ul>
<li>be updated as network changes are made; and</li>
<li>include a ‘Current as at [date]’ statement on each page.</li>
</ul>]]></paragraph>
</block>
<block title="Limiting network access"><paragraph
    title="18.1.13.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>If an attacker has limited opportunities to connect to a given network, they have limited opportunities to attack that network.  Network access controls not only prevent against attackers traversing a network but also prevent system users carelessly connecting a network to another network of a different classification.  It is also useful in segregating sensitive or compartmented information for specific system users with a need-to-know.</p>]]></paragraph>
<paragraph
    title="18.1.13.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>Although circumventing some network access controls can be trivial, their use is primarily aimed at the protection they provide against accidental connection to another network.</p>]]></paragraph>
<paragraph
    title="18.1.13.R.03."

    tags="Network Security,Technical"


><![CDATA[<p>The design of a robust security architecture is fundamental to the security of a system.  This may include concepts such as trust zones, application of the principles of separation and segregation through, for example, segmented networks and VPNs and other design techniques.</p>]]></paragraph>
<paragraph
    title="18.1.13.C.01."

    tags="Network Security,Technical"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="3204"
><![CDATA[<p>Agencies MUST implement network access controls on all networks.</p>]]></paragraph>
<paragraph
    title="18.1.13.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3205"
><![CDATA[<p>Agencies SHOULD implement network access controls on all networks.</p>]]></paragraph>
</block>
<block title="Management traffic"><paragraph
    title="18.1.14.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Implementing protection measures specifically for management traffic provides another layer of defence on the network. This also makes it more difficult for an attacker to accurately define their target network.</p>]]></paragraph>
<paragraph
    title="18.1.14.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3208"
><![CDATA[<p>Agencies SHOULD implement protection measures to minimise the risk of unauthorised access to network management traffic on a network.</p>]]></paragraph>
</block>
<block title="Simple Network Management IT Protocol (SNMP)"><paragraph
    title="18.1.15.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>The Simple Network Management Protocol (SNMP) can be used to monitor the status of network devices such as switches, routers and wireless access points.  Early versions of SNMP were insecure. SNMPv3 uses stronger authentication methods but continues to establish default SNMP community strings and promiscuous access.  Encryption may be used as an additional assurance measure but this may create additional workload in investigating faults.  An assessment of risk, threats and the agency’s requirements may be required to determine an appropriate configuration.</p>]]></paragraph>
<paragraph
    title="18.1.15.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should Not"
    cid="3211"
><![CDATA[<p>Agencies SHOULD NOT use SNMP unless a specific requirement exists.</p>]]></paragraph>
<paragraph
    title="18.1.15.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3238"
><![CDATA[<p>Agencies SHOULD implement SNMPv3 where a specific SNMP requirement exists.</p>]]></paragraph>
<paragraph
    title="18.1.15.C.03."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3239"
><![CDATA[<p>Agencies SHOULD change all default community strings in SNMP implementations.</p>]]></paragraph>
<paragraph
    title="18.1.15.C.04."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3240"
><![CDATA[<p>SNMP access SHOULD be configured as read-only.</p>]]></paragraph>
</block>
</subsection>
</section>
