<section title="19.1. Gateways"><subsection title="Objective"><paragraph
    title="19.1.1."


><![CDATA[<p>To ensure that gateways are properly configured to protect agency systems and information transferred between systems from different security domains.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="19.1.2."


><![CDATA[<p>Gateways can be considered to be information flow control mechanisms operating at the Network layer and may also control information flow at the Transport, Session, Presentation and Application layers of the Open Systems Interconnection model (OSI).&nbsp; Specific controls for different technologies can be found in:</p><ul>
<li><a title="Firewalls" href="http://nzism.gcsb.govt.nz/ism-document#Section-16688">Section 19.3 –Firewalls</a></li>
<li><a title="Diodes" href="http://nzism.gcsb.govt.nz/ism-document#Section-16715">Section 19.4 – Diodes</a></li>
<li><a title="Peripherals (KVM) switches" href="http://nzism.gcsb.govt.nz/ism-document#Section-16519">Section 18.6 – Peripheral (KVM) switches;&nbsp;</a>and</li>
<li><a title="Session border controllers" href="http://nzism.gcsb.govt.nz/ism-document#Section-16735">Section 19.5 – Session Border Controllers</a>.</li>
</ul>]]></paragraph>
<paragraph
    title="19.1.3."


><![CDATA[<p class="NormS19C1">Additional information relating to topics covered in this section can be found in the following sections of this manual:</p><ul>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-12591">Section 4.4 – Accreditation Framework</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-13260">Section 8.2 – Servers and Network Devices</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-13284">Section 8.3 – Network Infrastructure</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-13306">Section 8.4 – IT Equipment</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-15349">Section 16.1 – Identification, Authentication and passwords</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-15629">Section 16.6 – Event Logging and Auditing</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16688">Section 19.3 – Firewalls</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16715">Section 19.4 – Diodes</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16735">Section 19.5 – Session Border Controllers</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16836">Section 20.1 – Data Transfers</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16876">Section 20.2 – Data Import and Export</a>; and</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16919">Section 20.3 – Content Filtering</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Deploying Gateways"><paragraph
    title="19.1.4."


><![CDATA[<p>This section provides a baseline for agencies deploying gateways.  Agencies will need to consult additional sections of this manual depending on the specific type of gateways deployed.</p>]]></paragraph>
<paragraph
    title="19.1.5."


><![CDATA[<p>For network devices used to control data flow in bi-directional gateways, <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16688">Section 19.3 – Firewalls</a> will need to be consulted. <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16715">Section 19.4 – Diodes </a>will also need to be consulted for one-way gateways.&nbsp; Additionally, for both types of gateways, <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16836">Section 20.1 - Data Transfers </a>and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16643">Section 19.2 - Cross-Domain Solutions</a>, will need to be consulted for requirements on appropriately controlling data flows.</p>]]></paragraph>
<paragraph
    title="19.1.6."


><![CDATA[<p>The requirements in this manual for content filtering, data import and data export apply to all types of gateways.</p>]]></paragraph>
</block>
<block title="Gateway classification"><paragraph
    title="19.1.7."


><![CDATA[<p>For the purposes of this chapter, the gateway assumes the highest classification of the connected domains.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="19.1.8."


><![CDATA[<p class="NormS10C1b">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td style="text-align: center;"><strong>Reference</strong></td>
<td style="text-align: center;"><strong>Title</strong></td>
<td style="width: 15%; text-align: center;"><strong>Publisher</strong></td>
<td style="text-align: center;"><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Gateway / Cross Domain Solution Audit Guide, Australian Government</strong></td>
<td style="width: 15%; text-align: center;">ASD</td>
<td><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-gateways" target="_blank">https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-gateways</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Good Practices for deploying DNSSEC, ENISA</strong></td>
<td style="width: 15%; text-align: center;"><span>ENISA</span></td>
<td><a rel="noopener noreferrer" href="https://www.enisa.europa.eu/publications/gpgdnssec" target="_blank">https://www.enisa.europa.eu/publications/gpgdnssec</a></td>
</tr>
<tr>
<td><strong><strong>ISO/IEC 27033-4:2014</strong></strong></td>
<td><strong>Information technology -- Security techniques -- Network security -- Part 4: Securing communications between networks using security gateways</strong></td>
<td style="width: 15%; text-align: center;"><span>ISO</span></td>
<td><a title="Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways" rel="noopener noreferrer" href="https://www.iso.org/standard/51583.html" target="_blank">https://www.iso.org/standard/51583.html</a></td>
</tr>
<tr>
<td>
<p><strong><strong>ISO/IEC 7498-1:1994</strong></strong></p>
</td>
<td>
<p><strong>The OSI model</strong></p>
<p><strong>Information Technology – Open Systems Interconnection: The Basic Model</strong></p>
</td>
<td style="width: 15%; text-align: center;">ISO</td>
<td><a title="Information technology — Open Systems Interconnection — Basic Reference Model: The Basic Model" rel="noopener noreferrer" href="https://www.iso.org/standard/20269.html" target="_blank">https://www.iso.org/standard/20269.html</a>&nbsp;</td>
</tr>
<tr>
<td>
<p><strong><strong>NIST Special Publication&nbsp;<strong>800-41, September 2009</strong></strong></strong></p>
</td>
<td>
<p><strong><strong>Guidelines on Firewalls and Firewall Policy</strong></strong></p>
</td>
<td style="width: 15%; text-align: center;"><span>NIST</span></td>
<td><a title="NIST SP 800-41" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41r1.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41r1.pdf [PDF, 331 KB]</a><br><a title="Information technology — Open Systems Interconnection — Basic Reference Model: The Basic Model" rel="noopener noreferrer" href="https://www.iso.org/standard/20269.html" target="_blank"></a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="19.1.9."


><![CDATA[<p class="NormS10C1b">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 100%; height: 138.723px;">
<tbody>
<tr style="height: 75.5417px;">
<td style="width: 23.7347%; height: 75.5417px;"><strong>Reference</strong></td>
<td style="width: 35.2017%; height: 75.5417px;"><strong>Title</strong></td>
<td style="width: 39.4661%; height: 75.5417px;"><strong>Source</strong></td>
</tr>
<tr style="height: 63.181px;">
<td style="width: 23.7347%; height: 63.181px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 35.2017%; height: 63.181px;">
<p>GOV5, GOV6, INFOSEC1, INFOSEC2, INFOSEC3 and INFOSEC4</p>
</td>
<td style="width: 39.4661%; height: 63.181px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Gateways involving cascaded connections"><paragraph
    title="19.1.10.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Protecting a cascaded connection path with the minimum assurance requirement of a direct connection between the highest and lowest networks ensures appropriate reduction in security risks of the extended connection.&nbsp; An illustration of a cascaded connection can be seen below.</p>
<p><img class="leftAlone" title="" src="assets/NZISM/19.1.8.R.01-Cascading-Connections.png" alt="19.1.8.R.01 Cascading Connections" width="600" height="479"></p>]]></paragraph>
<paragraph
    title="19.1.10.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3538"
><![CDATA[<p>When agencies have cascaded connections between networks involving multiple gateways they MUST ensure that the assurance levels specified for network devices between the overall lowest and highest networks are met by the gateway between the highest network and the next highest network within the cascaded connection.</p>]]></paragraph>
</block>
<block title="Using gateways"><paragraph
    title="19.1.11.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Physically locating all gateway components inside a secure server room will reduce the risk of unauthorised access to the device(s).</p>]]></paragraph>
<paragraph
    title="19.1.11.R.02."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>The system owner of the higher security domain of connected security domains would be most familiar with the controls required to protect the more sensitive information and as such is best placed to manage any shared components of gateways.&nbsp; In some cases where multiple security domains from different agencies are connected to a gateway, it may be more appropriate to have a qualified third party manage the gateway on behalf of all connected agencies.</p><p>Gateway components may also reside in a virtual environment – refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation </a>and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17362">Section 22.3 – Virtual Local Area Networks</a></p>]]></paragraph>
<paragraph
    title="19.1.11.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3548"
><![CDATA[<p>Agencies MUST ensure that:</p><ul>
<li>all agency networks are protected from networks in other security domains by one or more gateways;</li>
<li>all gateways contain mechanisms to filter or limit data flow at the network and content level to only the information necessary for business purposes; and</li>
<li>all gateway components, discrete and virtual, are physically located within an appropriately secured server room.</li>
</ul>]]></paragraph>
<paragraph
    title="19.1.11.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3551"
><![CDATA[<p>For gateways between networks in different security domains, any shared components MUST be managed by the system owners of the highest security domain or by a mutually agreed party.</p>]]></paragraph>
</block>
<block title="Configuration of gateways"><paragraph
    title="19.1.12.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Gateways are essential in controlling the flow of information between security domains.  Any failure, particularly at the higher classifications, may have serious consequences.  Hence mechanisms for alerting personnel to situations that may give rise to information security incidents are especially important for gateways.</p>]]></paragraph>
<paragraph
    title="19.1.12.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3562"
><![CDATA[<p>Agencies MUST ensure that gateways:</p><ul>
<li>are the only communications paths into and out of internal networks;</li>
<li>by default, deny all connections into and out of the network;</li>
<li>allow only explicitly authorised connections;</li>
<li>are managed via a secure path isolated from all connected networks (i.e.  physically at the gateway or on a dedicated administration network);</li>
<li>provide sufficient logging and audit capabilities to detect information security incidents, attempted intrusions or anomalous usage patterns; and</li>
<li>provide real-time alerts.</li>
</ul>]]></paragraph>
</block>
<block title="Operation of gateways"><paragraph
    title="19.1.13.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Providing an appropriate logging and audit capability will help to detect information security incidents and attempted network intrusions, allowing the agency to respond and to take measures to reduce the risk of future attempts.</p>]]></paragraph>
<paragraph
    title="19.1.13.R.02."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Storing event logs on a separate, secure log server will assist in preventing attackers from deleting logs in an attempt to destroy evidence of any intrusion.</p>]]></paragraph>
<paragraph
    title="19.1.13.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3578"
><![CDATA[<p>Agencies MUST ensure that all gateways connecting networks in different security domains:</p><ul>
<li>include a firewall of an appropriate assurance level on all gateways to filter and log network traffic attempting to enter the gateway;</li>
<li>are configured to save event logs to a separate, secure log server;</li>
<li>are protected by authentication, logging and audit of all physical access to gateway components; and</li>
<li>have all controls tested to verify their effectiveness after any changes to their configuration.</li>
</ul>]]></paragraph>
</block>
<block title="Demilitarised zones"><paragraph
    title="19.1.14.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Demilitarised zones are used to prevent direct access to information and systems on internal agency networks.  Agencies that require certain information and systems to be accessed <em>from</em> the Internet or some other form of remote access, should place them in the less trusted demilitarised zone instead of on internal agency networks.</p>]]></paragraph>
<paragraph
    title="19.1.14.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="3622"
><![CDATA[<p>Agencies MUST use demilitarised zones to house systems and information directly accessed externally.</p>]]></paragraph>
<paragraph
    title="19.1.14.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3623"
><![CDATA[<p>Agencies SHOULD use demilitarised zones to house systems and information directly accessed externally.</p>]]></paragraph>
</block>
<block title="Risk assessment"><paragraph
    title="19.1.15.R.01."

    tags="Technical,Risk Assessment,Gateways,Gateway Security"


><![CDATA[<p>Performing a risk assessment on the gateway and its configuration prior to its implementation will assist in the early identification and mitigation of security risks.</p>]]></paragraph>
<paragraph
    title="19.1.15.C.01."

    tags="Technical,Risk Assessment,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3626"
><![CDATA[<p>Agencies MUST perform a risk assessment on gateways and their configuration <em>prior</em> to their implementation.</p>]]></paragraph>
</block>
<block title="Risk transfer"><paragraph
    title="19.1.16.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Gateways could connect networks with different domain owners, including across agency boundaries.&nbsp; As a result, all domain and system owners MUST understand and accept the risks from all other networks before gateways are implemented.</p>]]></paragraph>
<paragraph
    title="19.1.16.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3630"
><![CDATA[<p>All domain and system owners connected through a gateway MUST understand and accept the residual security risk of the gateway and from any connected domains including those via a cascaded connection.</p>]]></paragraph>
<paragraph
    title="19.1.16.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3633"
><![CDATA[<p>Agencies SHOULD annually review the security architecture of the gateway and risks of all connected domains including those via a cascaded connection.</p>]]></paragraph>
</block>
<block title="Information stakeholders and Shared Ownership"><paragraph
    title="19.1.17.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Changes to a domain connected to a gateway can affect the security posture of other connected domains.  All domains owners should be considered stakeholders in all connected domains.</p>]]></paragraph>
<paragraph
    title="19.1.17.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="3637"
><![CDATA[<p>Once connectivity is established, domain owners MUST be considered information stakeholders for all connected domains.</p>]]></paragraph>
<paragraph
    title="19.1.17.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3640"
><![CDATA[<p>Once connectivity is established, domain owners SHOULD be considered information stakeholders for all connected domains.</p>]]></paragraph>
</block>
<block title="System user training"><paragraph
    title="19.1.18.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>It is important that system users are competent to use gateways in a secure manner.  This can be achieved through appropriate training before being granted access.</p>]]></paragraph>
<paragraph
    title="19.1.18.C.01."

    tags="Governance,Gateways,Gateway Security"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="3648"
><![CDATA[<p>All system users MUST be trained on the secure use and security risks of the gateways before being granted access.</p>]]></paragraph>
<paragraph
    title="19.1.18.C.02."

    tags="Governance,System Access,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3649"
><![CDATA[<p>All system users SHOULD be trained in the secure use and security risks of the gateways before being granted access.</p>]]></paragraph>
</block>
<block title="Administration of gateways"><paragraph
    title="19.1.19.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Application of role separation and segregation of duties in administration activities will protect against security risks posed by a malicious system user with extensive access to gateways.</p>]]></paragraph>
<paragraph
    title="19.1.19.C.01."

    tags="Technical,System Access,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3660"
><![CDATA[<p>Agencies MUST limit access to gateway administration functions.</p>]]></paragraph>
<paragraph
    title="19.1.19.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3663"
><![CDATA[<p>Agencies MUST ensure that system administrators are formally trained to manage gateways by qualified trainers.</p>]]></paragraph>
<paragraph
    title="19.1.19.C.03."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3668"
><![CDATA[<p>Agencies MUST ensure that all system administrators of gateways that process NZEO information meet the nationality requirements for these endorsements.</p>]]></paragraph>
<paragraph
    title="19.1.19.C.04."

    tags="Technical,Gateways,Gateway Security"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="3672"
><![CDATA[<p>Agencies MUST separate roles for the administration of gateways (e.g.  separate network and security policy configuration roles).</p>]]></paragraph>
<paragraph
    title="19.1.19.C.05."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3676"
><![CDATA[<p>Agencies SHOULD separate roles for the administration of gateways (e.g. separate network and security policy configuration roles).</p>]]></paragraph>
</block>
<block title="System user authentication"><paragraph
    title="19.1.20.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Authentication to networks as well as gateways can reduce the risk of unauthorised access and provide an audit capability to support the investigation of information security incidents.</p>]]></paragraph>
<paragraph
    title="19.1.20.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3683"
><![CDATA[<p>Agencies MUST authenticate system users to all classified networks accessed through gateways.</p>]]></paragraph>
<paragraph
    title="19.1.20.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3685"
><![CDATA[<p>Agencies MUST ensure that only authenticated and authorised system users can use the gateway.</p>]]></paragraph>
<paragraph
    title="19.1.20.C.03."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3686"
><![CDATA[<p>Agencies SHOULD use multi-factor authentication for access to networks and gateways.</p>]]></paragraph>
</block>
<block title="IT equipment authentication"><paragraph
    title="19.1.21.R.01."

    tags="IT Equipment,Technical,Gateways,Gateway Security"


><![CDATA[<p>Authenticating IT equipment to networks accessed through gateways will assist in preventing unauthorised IT equipment connecting to a network.</p>]]></paragraph>
<paragraph
    title="19.1.21.C.01."

    tags="IT Equipment,Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3695"
><![CDATA[<p>Agencies SHOULD authenticate any IT equipment that connects to networks accessed through gateways.</p>]]></paragraph>
</block>
<block title="Configuration control"><paragraph
    title="19.1.22.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>To avoid changes that may introduce vulnerabilities into a gateway, agencies should fully consider any changes and associated risks.&nbsp; Changes may also necessitate re-certification and accreditation of the system, see <a title="System Certification and Accreditation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 – System Certification and Accreditation</a>.</p>]]></paragraph>
<paragraph
    title="19.1.22.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="3702"
><![CDATA[<p>Agencies MUST undertake a risk assessment and update the SRMP before changes are implemented.</p>]]></paragraph>
<paragraph
    title="19.1.22.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3705"
><![CDATA[<p>Agencies MUST document any changes to gateways in accordance with the agency’s Change Management Policy.</p>]]></paragraph>
<paragraph
    title="19.1.22.C.03."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3707"
><![CDATA[<p>Agencies SHOULD undertake a risk assessment and update the SRMP before changes are implemented.</p>]]></paragraph>
</block>
<block title="Testing of gateways"><paragraph
    title="19.1.23.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>The testing of security measures on gateways will assist in ensuring that the integrity of the gateway is being maintained.  An attacker who is aware of the regular testing schedule may cease malicious activities during such periods to avoid detection.  Any test should, therefore, be unannounced and conducted at irregular intervals.</p>]]></paragraph>
<paragraph
    title="19.1.23.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="3712"
><![CDATA[<p>Agencies SHOULD ensure that testing of security measures is performed at random intervals no more than six months apart.</p>]]></paragraph>
</block>
</subsection>
</section>
