<section title="21.1. Data Transfers"><subsection title="Objective"><paragraph
    title="21.1.1."


><![CDATA[<p>Data transfers between systems are controlled and accountable.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="21.1.2."


><![CDATA[<p>This section covers the fundamental requirements of data transfers between systems and applies equally to data transfers using removal media and to data transfers via gateways.</p>]]></paragraph>
<paragraph
    title="21.1.3."


><![CDATA[<p>Additional requirements for data transfers using removal media can be found in the <a href="http://nzism.gcsb.govt.nz/ism-document#Section-14767">Section 13.3 – Media Usage</a> and additional requirements for data transfers via gateways can be found in the <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16876">Section 20.2 – Data Import and Export</a>.</p>]]></paragraph>
<paragraph
    title="21.1.4."


><![CDATA[<p>Transfers from a classified system where strong information security controls exist to a system of lower classification where controls may not be as robust, can lead to data spills, information loss and privacy breaches. &nbsp;It is important that appropriate levels of oversight and accountability are in place to minimise or prevent the undesirable loss or leakage of information.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="21.1.5."


><![CDATA[<p class="NormS10C1b">Relevant PSR requirements can be found at:</p>
<p>&nbsp;</p>
<table class="table-grey" style="width: 100%;">
<tbody>
<tr>
<td style="width: 19.2976%;"><strong>Reference</strong></td>
<td style="width: 17.733%;"><strong>Title</strong></td>
<td style="width: 62.9346%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 19.2976%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 17.733%;">GOV2, GOV6, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PERSEC1, PERSEC2, PERSEC3 and PERSEC4</td>
<td style="width: 62.9346%;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a> &nbsp;</p>
<a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="User responsibilities"><paragraph
    title="21.1.6.R.01."

    tags="Data Management,Governance,Data Transfers"


><![CDATA[<p>When users transfer data to and from systems they need to be aware of the potential consequences of their actions. &nbsp;This could include data spills of classified information onto systems not accredited to handle the classification of the data or the unintended introduction of malicious code. &nbsp;Accordingly agencies will need to hold personnel accountable for all data transfers that they make.</p>]]></paragraph>
<paragraph
    title="21.1.6.C.01."

    tags="Data Management,Governance,Data Transfers"


    classification="All Classifications"
    compliance="Must"
    cid="4138"
><![CDATA[<p>Agencies MUST establish a policy and train staff in the processes for data transfers between systems and the authorisations required before transfers can take place.</p>]]></paragraph>
<paragraph
    title="21.1.6.C.02."

    tags="Data Management,Governance,Data Transfers"


    classification="All Classifications"
    compliance="Must"
    cid="4141"
><![CDATA[<p>Agencies MUST ensure that system users transferring data to and from a system are held accountable for the data they transfer.</p>]]></paragraph>
</block>
<block title="Data transfer processes and procedures"><paragraph
    title="21.1.7.R.01."

    tags="Data Management,Governance,Data Transfers"


><![CDATA[<p>Personnel can assist in preventing information security incidents by checking protective markings (classifications, endorsements and releasability) checks to ensure that the destination system is appropriate for the protection of the data being transferred, performing antivirus checks on data to be transferred to and from a system, and following all processes and procedures for the transfer of data.</p>]]></paragraph>
<paragraph
    title="21.1.7.C.01."

    tags="Data Management,Governance,Data Transfers"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="4147"
><![CDATA[<p>Agencies MUST ensure that data transfers are performed in accordance with processes and procedures approved by the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="21.1.7.C.02."

    tags="Data Management,Governance,Data Transfers"


    classification="All Classifications"
    compliance="Should"
    cid="4148"
><![CDATA[<p>Agencies SHOULD ensure that data transfers are performed in accordance with processes and procedures approved by the Accreditation Authority.</p>]]></paragraph>
</block>
<block title="Data transfer authorisation"><paragraph
    title="21.1.8.R.01."

    tags="Data Management,Governance,Data Transfers"


><![CDATA[<p>Using a trusted source to approve transfers from a classified system to another system of a lesser classification or where a releasability endorsement is applied to the data to be transferred, ensures appropriate oversight and reporting of the activity.</p>]]></paragraph>
<paragraph
    title="21.1.8.C.01."

    tags="Data Management,Governance,Data Transfers"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="4151"
><![CDATA[<p>Agencies MUST ensure that all data transferred to a system of a lesser classification or a less secure system, is approved by a trusted source.</p>]]></paragraph>
</block>
<block title="Trusted sources"><paragraph
    title="21.1.9.R.01."

    tags="Data Management,Governance,Data Transfers"


><![CDATA[<p>Trusted sources are designated personnel who have the delegated authority to assess and approve the transfer or release of data or documents. &nbsp;Trusted sources may include security personnel within the agency such as the CISO and the ITSM.</p>]]></paragraph>
<paragraph
    title="21.1.9.C.01."

    tags="Data Management,Governance,Data Transfers"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="4156"
><![CDATA[<p>Trusted sources MUST be:</p><ul>
<li>a strictly limited list derived from business requirements and the result of a security risk assessment;</li>
<li>where necessary an appropriate security clearance is held; and</li>
<li>approved by the Accreditation Authority.</li>
</ul>]]></paragraph>
</block>
<block title="Import of data"><paragraph
    title="21.1.10.R.01."

    tags="Data Management,Technical,Data Transfers"


><![CDATA[<p>Scanning imported data for active or malicious content reduces the security risk of a system or network being infected, thus allowing the continued confidentiality, integrity and availability of the system or network.</p>]]></paragraph>
<paragraph
    title="21.1.10.R.02."

    tags="Data Management,Technical,Data Transfers"


><![CDATA[<p>Format checks provide a method to prevent known malicious formats from entering the system or network. &nbsp;Keeping and regularly auditing these logs allow for the system or network to be checked for any unusual activity or usage.</p>]]></paragraph>
<paragraph
    title="21.1.10.R.03."

    tags="Data Management,Technical,Data Transfers,Incident Management"


><![CDATA[<p>Personnel reporting unexpected events through the agency’s incident management process provide an early opportunity to contain malware, limit damage and correct errors.</p>]]></paragraph>
<paragraph
    title="21.1.10.C.01."

    tags="Data Management,Technical,Data Transfers"


    classification="All Classifications"
    compliance="Must"
    cid="4165"
><![CDATA[<p>Agencies importing data to a system MUST ensure that the data is scanned for malicious and active content.</p>]]></paragraph>
<paragraph
    title="21.1.10.C.02."

    tags="Data Management,Technical,Data Transfers"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4168"
><![CDATA[<p>Agencies importing data to a system MUST implement the following controls:</p>
<ul>
<li>scanning for malicious and active content;</li>
<li>data format checks;</li>
<li>identify unexpected attachments or embedded objects;</li>
<li>log each event; and</li>
<li>monitoring to detect overuse/unusual usage patterns.</li>
</ul>]]></paragraph>
</block>
<block title="Export of highly formatted textual data"><paragraph
    title="21.1.11.R.01."

    tags="Data Management,Technical,Data Transfers"


><![CDATA[<p>When highly formatted textual data with no free text fields is to be transferred between systems, the checking requirements are lessened because the format of the information is strongly defined.</p>]]></paragraph>
<paragraph
    title="21.1.11.C.01."

    tags="Data Management,Technical,Data Transfers"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="4239"
><![CDATA[<p>When agencies export formatted textual data with no free text fields and all fields have a predefined set of permitted formats and data values, agencies MUST implement the following controls:</p>
<ul>
<li>protective marking checks;</li>
<li>data validation and format checks;</li>
<li>size limits;</li>
<li>keyword checks;</li>
<li>identify unexpected attachments or embedded objects;</li>
<li>log each event; and</li>
<li>monitoring to detect overuse/unusual usage patterns.</li>
</ul>]]></paragraph>
</block>
<block title="Export of other data"><paragraph
    title="21.1.12.R.01."

    tags="Data Management,Technical,Data Transfers"


><![CDATA[<p>Textual data that it is not highly formatted can be difficult to check in an automated manner. &nbsp;Agencies will need to implement measures to ensure that classified information is not accidentally being transferred to another system not accredited for that classification or transferred into the public domain.</p>]]></paragraph>
<paragraph
    title="21.1.12.C.01."

    tags="Data Management,Technical,Data Transfers"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="4245"
><![CDATA[<p>When agencies export data, other than highly formatted textual data, agencies MUST implement the following controls:</p>
<ul>
<li>protective marking checks;</li>
<li>data validation and format checks;</li>
<li>limitations on data types;</li>
<li>size limits;</li>
<li>keyword checks;</li>
<li>identify unexpected attachments or embedded objects;</li>
<li>log each event; and</li>
<li>monitoring to detect overuse/unusual usage patterns.</li>
</ul>]]></paragraph>
</block>
<block title="Preventing export of NZEO data to foreign systems"><paragraph
    title="21.1.13.R.01."

    tags="Data Management,Technical,Data Transfers"


><![CDATA[<p>In order to reduce the security risk of spilling data with an endorsement onto foreign systems, it is important that procedures are developed to detect NZEO marked data and to prevent it from crossing into foreign systems or being exposed to foreign nationals.</p>]]></paragraph>
<paragraph
    title="21.1.13.C.01."

    tags="Data Management,Technical,Data Transfers"


    classification="All Classifications"
    compliance="Must"
    cid="4249"
><![CDATA[<p>Agencies MUST:</p>
<ul>
<li>ensure that keyword searches are performed on all textual data;</li>
<li>ensure that any identified data is quarantined until reviewed and approved for release by a trusted source other than the originator; and</li>
<li>develop procedures to prevent NZEO information in both textual and non-textual formats from being exported.</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
