<section title="21.2. Data Import and Export"><subsection title="Objective"><paragraph
    title="21.2.1."


><![CDATA[<p>Data is&nbsp;transferred through gateways in a controlled and accountable manner.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="21.2.2."


><![CDATA[<p>This section covers the specific requirements relating to the movement of data between systems via gateways. &nbsp;Fundamental requirements of data transfers between systems can be found in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16836">Section 20.1 – Data Transfers</a>. &nbsp;These fundamental requirements apply to gateways.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="User responsibilities"><paragraph
    title="21.2.3.R.01."

    tags="Data Management,Governance,Data Transfers"


><![CDATA[<p>When users transfer data to or from a system they need to be aware of the potential consequences of their actions. &nbsp;This could include data spills of sensitive or classified data onto systems not accredited to handle the data, or the unintended introduction of malicious code to a system. &nbsp; Accordingly, users need to be held accountable for all data transfers they make.</p>]]></paragraph>
<paragraph
    title="21.2.3.C.01."

    tags="Data Management,Governance,Data Transfers"


    classification="All Classifications"
    compliance="Must"
    cid="4264"
><![CDATA[<p>Users transferring data to and from a system MUST be held accountable for the data they transfer.</p>]]></paragraph>
</block>
<block title="Data Transfer authorisation"><paragraph
    title="21.2.4.R.01."

    tags="Data Management,Governance,Data Transfers"


><![CDATA[<p>Users can help prevent information security incidents by:</p><ul>
<li>checking protective markings to ensure that the destination system is appropriate for the data being transferred;</li>
<li>performing antivirus checks on data to be transferred to and from a system;</li>
<li>following the processes and procedures for the transfer of data.</li>
</ul>]]></paragraph>
<paragraph
    title="21.2.4.C.01."

    tags="Data Management,Governance,Data Transfers"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="4269"
><![CDATA[<p>All data transferred to a system of a lesser sensitivity or classification MUST be approved by a trusted source.</p>]]></paragraph>
</block>
<block title="Trusted sources"><paragraph
    title="21.2.5.R.01."

    tags="Data Management,Governance,Data Transfers"


><![CDATA[<p>Trusted sources are designated personnel who have the delegated authority to assess and approve the transfer or release of data or documents. Trusted sources may include security personnel within the agency such as the CISO and the ITSM.&nbsp;</p>]]></paragraph>
<paragraph
    title="21.2.5.C.01."

    tags="Data Management,Governance,Data Transfers"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="4277"
><![CDATA[<p>Trusted sources MUST be:</p><ul>
<li>a strictly limited list derived from business requirements and the result of a security risk assessment;</li>
<li>where necessary an appropriate security clearance is held; and</li>
<li>approved by the Accreditation Authority.</li>
</ul>]]></paragraph>
</block>
<block title="Import of data through gateways"><paragraph
    title="21.2.6.R.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


><![CDATA[<p>In order to ensure the continued functioning of systems it is important to constantly analyse data being imported. &nbsp;Converting data from one format into another can effectively destroy most malicious active content.</p>]]></paragraph>
<paragraph
    title="21.2.6.C.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="4280"
><![CDATA[<p>When agencies import data to a system through gateways, the data MUST be filtered by a product specifically designed for that purpose, including filtering malicious and active content.</p>]]></paragraph>
<paragraph
    title="21.2.6.C.02."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="4281"
><![CDATA[<p>When agencies import data to a system through gateways, full or partial audits of the event logs MUST be performed at least monthly.</p>]]></paragraph>
<paragraph
    title="21.2.6.C.03."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Confidential, Secret, Top Secret"
    compliance="Should"
    cid="4282"
><![CDATA[<p>Agencies SHOULD convert data being imported at gateways into an alternative format before entering the network.</p>]]></paragraph>
</block>
<block title="Export of data through gateways"><paragraph
    title="21.2.7.R.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


><![CDATA[<p>In order to ensure the continued integrity and confidentiality of data on an agency network, data MUST pass through a series of checks before it is exported onto systems of a lesser classification.</p>]]></paragraph>
<paragraph
    title="21.2.7.R.02."

    tags="Data Management,Technical,Data Transfers,Gateways"


><![CDATA[<p>Filtering content based on protective markings is an adequate method to protect the confidentiality of lesser classified material.</p>]]></paragraph>
<paragraph
    title="21.2.7.C.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="All Classifications"
    compliance="Should"
    cid="4286"
><![CDATA[<p>Agencies SHOULD restrict the export of data to a system of a lesser classification by filtering data using at least protective marking checks.</p>]]></paragraph>
</block>
<block title="Export of highly formatted textual data through gateways"><paragraph
    title="21.2.8.R.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


><![CDATA[<p>The security risks of releasing higher classified data are partially reduced when the data is restricted to highly formatted textual data. &nbsp;In such cases the data is less likely to contain hidden data and have classified content. &nbsp;Such data can be automatically scanned through a series of checks to detect classified content. &nbsp;Risk is further reduced when there is a gateway filter that blocks (rejects) the export of data classified above the classification of the network outside of the gateway, and logs are regularly reviewed to detect if there has been unusual usage or overuse.</p>]]></paragraph>
<paragraph
    title="21.2.8.C.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4289"
><![CDATA[<p>When the export of highly formatted textual data occurs through gateways agencies MUST implement:</p>
<ul>
<li>checks for protective markings;</li>
<li>data filtering performed by a product specifically designed for that purpose;</li>
<li>data range and data type checks; and</li>
<li>full or partial audits of the event logs performed at least monthly.</li>
</ul>]]></paragraph>
</block>
<block title="Export of other data through gateways"><paragraph
    title="21.2.9.R.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


><![CDATA[<p>Textual data which is not highly formatted can contain hidden data as well as having a higher classification due to the aggregated content. &nbsp;Risk is somewhat reduced by running additional automated checks on non-formatted data being exported, in addition to those checks for highly formatted textual data. &nbsp;Where a classification cannot be automatically determined, a human trusted source should make that determination.</p>]]></paragraph>
<paragraph
    title="21.2.9.C.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Confidential, Secret, Top Secret"
    compliance="Must"
    cid="4292"
><![CDATA[<p>When agencies export data, other than highly formatted textual data, through gateways, agencies MUST implement data filtering performed by a product specifically designed for that purpose.</p>]]></paragraph>
<paragraph
    title="21.2.9.C.02."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4293"
><![CDATA[<p>When agencies do not perform audits of the complete data transfer logs at least monthly they MUST perform randomly timed audits of random subsets of the data transfer logs on a weekly basis.</p>]]></paragraph>
<paragraph
    title="21.2.9.C.03."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Top Secret, Secret, Confidential"
    compliance="Should"
    cid="4294"
><![CDATA[<p>Where the classification cannot be determined automatically, a human trusted source SHOULD assess the classification of the data.</p>]]></paragraph>
<paragraph
    title="21.2.9.C.04."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="Top Secret, Confidential, Secret"
    compliance="Should"
    cid="4295"
><![CDATA[<p>When the export of other data occurs through gateways agencies SHOULD perform audits of the complete data transfer logs at least monthly.</p>]]></paragraph>
</block>
<block title="Preventing export of NZEO data to foreign systems"><paragraph
    title="21.2.10.R.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


><![CDATA[<p>NZEO networks are particularly sensitive and further security measures need to be put in place when connecting them to other networks.</p>]]></paragraph>
<paragraph
    title="21.2.10.C.01."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="All Classifications"
    compliance="Must"
    cid="4301"
><![CDATA[<p>To prevent the export of NZEO data to foreign systems, agencies MUST implement NZEO data filtering performed by a product specifically designed or configured for that purpose.</p>]]></paragraph>
<paragraph
    title="21.2.10.C.02."

    tags="Data Management,Technical,Data Transfers,Gateways"


    classification="All Classifications"
    compliance="Must"
    cid="4303"
><![CDATA[<p>Agencies MUST undertake checks of protective markings and keywords before permitting data export.</p>]]></paragraph>
</block>
<block title="Requirement to sign exported data"><paragraph
    title="21.2.11.R.01."

    tags="Data Management,Technical,Data Transfers,Assurance"


><![CDATA[<p>Digitally signing data being exported, demonstrates authenticity and improves assurance that the data has not been altered in transit.</p>]]></paragraph>
<paragraph
    title="21.2.11.C.01."

    tags="Data Management,Technical,Data Transfers,Assurance"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="4308"
><![CDATA[<p>A trusted source MUST sign the data to be exported if the data is to be communicated over a network to which untrusted personnel or systems have access.</p>]]></paragraph>
<paragraph
    title="21.2.11.C.02."

    tags="Data Management,Technical,Data Transfers,Assurance"


    classification="Secret, Confidential"
    compliance="Must"
    cid="4309"
><![CDATA[<p>Agencies MUST ensure that the gateway verifies authority to release prior to the release of the data to be exported.</p>]]></paragraph>
<paragraph
    title="21.2.11.C.03."

    tags="Data Management,Technical,Data Transfers,Assurance"


    classification="Confidential, Top Secret, Secret"
    compliance="Should"
    cid="4310"
><![CDATA[<p>Agencies SHOULD use a product evaluated to at least an EAL4 assurance level for the purpose of data signing and signature confirmation.</p>]]></paragraph>
</block>
</subsection>
</section>
