<section title="22.1. Agency-owned Mobile Devices"><subsection title="Objective"><paragraph
    title="22.1.1."


><![CDATA[<p>Information&nbsp;on agency-owned mobile devices is protected from unauthorised disclosure.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="22.1.2."


><![CDATA[<p>This section covers information relating to the use of agency-owned mobile devices including, but not restricted to, mobile phones, smartphones, portable electronic devices, personal digital assistants, laptops, netbooks, tablet computers, and other portable Internet connected devices.</p>]]></paragraph>
<paragraph
    title="22.1.3."


><![CDATA[<p>It is important to note that product security, selection, maintenance, sanitisation and disposal requirements in <a title="Product Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 - Product Security</a> also apply to agency-owned mobile devices.</p>]]></paragraph>
</block>
<block title="Trusted Operating Environments"><paragraph
    title="22.1.4."


><![CDATA[<p>A Trusted Operating Environment (TOE) provides assurance that every reasonable effort has been made to secure the operating system of a mobile device such that it presents a managed risk to an agency’s information and systems. &nbsp;Any residual risks are explicitly accepted by the agency.</p>]]></paragraph>
<paragraph
    title="22.1.5."


><![CDATA[<p>Special care is necessary when dealing with All-of-Government systems or systems that affect several agencies. Security measures that can be implemented to assist in the development of a TOE include:</p><ul>
<li>strong usage policies are in place;</li>
<li>unnecessary hardware, software and operating system components are removed;</li>
<li>unused or undesired functionality in software and operating systems is removed or disabled;</li>
<li>anti-malware and other security software is installed and regularly updated;</li>
<li>downloads of software, data or documents are limited or not permitted;</li>
<li>installation of unapproved applications is not permitted;</li>
<li>software-based firewalls limiting inbound and outbound network connections are installed;</li>
<li>patching of installed the operating system and other software is current;</li>
<li>each connection is authenticated (multi-factor) before permitting access to an agency network;</li>
<li>both the user and mobile device are authenticated during the authentication process;</li>
<li>mobile device configurations may be validated before a connection is permitted;</li>
<li>privileged access from the mobile device to the agency network is not allowed;</li>
<li>access to some data may not be permitted; and</li>
<li>agency control of the mobile device may supersede any convenience aspects.</li>
</ul>]]></paragraph>
</block>
<block title="Treating workstations as mobile devices"><paragraph
    title="22.1.6."


><![CDATA[<p>When an agency issues a workstation for home-based work instead of a mobile device the requirements in this section apply equally to the issued workstation.</p>]]></paragraph>
</block>
<block title="Devices with multiple operating states"><paragraph
    title="22.1.7."


><![CDATA[<p>Some mobile devices may have functionality to allow them to operate in either an unclassified state or a classified state. &nbsp;In such cases the mobile devices will need to be handled according to the state that it is being operated in at the time. &nbsp;For example, some devices can start-up in an unclassified mode or start-up in a cryptographically protected mode.</p>]]></paragraph>
</block>
<block title="Bluetooth and Infra-Red Devices"><paragraph
    title="22.1.8."


><![CDATA[<p>Bluetooth and Infra-Red devices, such as keyboards, headsets and mice are subject to an additional set of risks. &nbsp;Refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13958">Chapter 11 – Communication Systems and Devices</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="22.1.9."


><![CDATA[<p class="NormS10C1b">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 109.722%;">
<tbody>
<tr>
<td style="width: 17.4271%;"><strong>Reference</strong></td>
<td style="width: 19.3283%;"><strong>Title</strong></td>
<td style="width: 63.2129%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 17.4271%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 19.3283%;">
<p>GOV2, GOV4, GOV6, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</p>
</td>
<td style="width: 63.2129%;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a> &nbsp;&nbsp;</p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a><br><br></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Mobile devices usage policy"><paragraph
    title="22.1.10.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>As mobile devices routinely leave the office environment and the physical protection it affords it is important that policies are developed to ensure that they are protected in an appropriate manner when used outside of controlled agency facilities.</p>]]></paragraph>
<paragraph
    title="22.1.10.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must"
    cid="4471"
><![CDATA[<p>Agencies MUST develop a policy governing the use of mobile devices.</p>]]></paragraph>
<paragraph
    title="22.1.10.C.02."

    tags="Governance,Mobile Devices"


    classification="Secret, Top Secret, Confidential"
    compliance="Must Not"
    cid="4472"
><![CDATA[<p>Agencies MUST NOT allow mobile devices to process or store TOP SECRET information unless explicitly approved by GCSB to do so.</p>]]></paragraph>
<paragraph
    title="22.1.10.C.03."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4473"
><![CDATA[<p>Agencies SHOULD implement a Mobile Device Management (MDM) solution.</p>]]></paragraph>
</block>
<block title="Personnel awareness"><paragraph
    title="22.1.11.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>Mobile devices can have both a data and voice component capable of processing or communicating classified information. In such cases, personnel will need to be aware of the approved classification level for each function.</p>
<p>This includes Paging Services, Multi-Media Message Service (MMS) and Short Message Service (SMS) which are NOT appropriate for sensitive or classified information. Paging and message services do not appropriately encrypt information and cannot be relied upon for the communication of classified information.</p>]]></paragraph>
<paragraph
    title="22.1.11.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Must"
    cid="4476"
><![CDATA[<p>Agencies MUST advise personnel of the maximum permitted classifications for data and voice communications when using mobile devices.</p>]]></paragraph>
<paragraph
    title="22.1.11.C.02."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Should Not"
    cid="4477"
><![CDATA[<p>Agencies SHOULD NOT use Paging Services, SMS or MMS for sensitive or classified communications.</p>]]></paragraph>
</block>
<block title="Non-agency owned and controlled mobile devices"><paragraph
    title="22.1.12.R.01."

    tags="Governance,Mobile Devices,BYOD"


><![CDATA[<p>Agencies need to retain control of any non-agency device that contains agency or government information. &nbsp;Non-agency devices are discussed in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17126">Section 21.4 – BYOD</a>.</p>]]></paragraph>
<paragraph
    title="22.1.12.C.01."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4480"
><![CDATA[<p>Agencies MUST apply the full set of BYOD controls for devices NOT directly owned and controlled by the agency. &nbsp;These controls are detailed in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17126">Section 21.4 – BYOD</a>.</p>]]></paragraph>
</block>
<block title="Agency owned mobile device storage encryption"><paragraph
    title="22.1.13.R.01."

    tags="Encryption,Technical,Mobile Devices"


><![CDATA[<p>Encrypting the internal storage and removable media of agency owned mobile devices will reduce the risk of data loss associated with a lost or stolen device. While the use of encryption may not be suitable to treat the device as an unclassified asset it will still present a significant challenge to a malicious actor looking to gain easy access to information stored on the device. To ensure that the benefits of encryption on mobile devices are maintained, users must not store passphrases, passwords, PINS or other access codes for the encryption software on, or with, the device.</p>]]></paragraph>
<paragraph
    title="22.1.13.R.02."

    tags="Encryption,Technical,Mobile Devices"


><![CDATA[<p>Information on the use of encryption to reduce storage and physical transfer requirements is detailed in&nbsp;<a href="http://nzism.gcsb.govt.nz/ism-document#Section-15746">Section 17.1 – Cryptographic Fundamentals</a>&nbsp;and&nbsp;<a href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">17.2 – Approved Cryptographic Algorithms</a>.</p>]]></paragraph>
<paragraph
    title="22.1.13.R.03."

    tags="Encryption,Technical,Mobile Devices"


><![CDATA[<p>Refer to the&nbsp;<a title="PSR - Mobile and Remote working" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/managing-specific-scenarios/mobile-and-remote-working/" target="_blank">PSR - Mobile and Remote working</a></p><p>Refer to the&nbsp;<a title="Handling requirements for protectively marked information and equipment" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/classification-system-and-handling-requirements/handling-requirements/" target="_blank">PSR&nbsp;- Handling Requirements for protectively marked information and equipment</a></p>]]></paragraph>
<paragraph
    title="22.1.13.C.01."

    tags="Encryption,Technical,Mobile Devices"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="4483"
><![CDATA[<p>Agencies unable to lower the storage and physical transfer requirements of a mobile device to an unclassified level through the use of encryption MUST physically store or transfer the device as a classified asset in accordance with the relevant handling instructions.</p>]]></paragraph>
<paragraph
    title="22.1.13.C.02."

    tags="Encryption,Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Must Not"
    cid="4484"
><![CDATA[<p>Users MUST NOT store passwords, passphrases, PINs or other access codes for encryption on or with the mobile device on which data will be encrypted when the device is issued for normal operations.</p>]]></paragraph>
<paragraph
    title="22.1.13.C.03."

    tags="Encryption,Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4485"
><![CDATA[<p>Agencies unable to lower the storage and physical transfer requirements of a mobile device to an unclassified level through the use of encryption SHOULD physically store or transfer the device as a classified asset in accordance with the relevant handling instructions.</p>]]></paragraph>
<paragraph
    title="22.1.13.C.04."

    tags="Approved Cryptographic Algorithms,Encryption,Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4486"
><![CDATA[<p>Agencies SHOULD encrypt classified information on all mobile devices using an Approved Cryptographic Algorithm.</p>]]></paragraph>
<paragraph
    title="22.1.13.C.05."

    tags="Encryption,Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4487"
><![CDATA[<p>Pool or shared devices SHOULD be reissued with unique passwords, passphrases, PINs or other access codes for each separate issue or deployment.</p>]]></paragraph>
</block>
<block title="Mobile device communications encryption"><paragraph
    title="22.1.14.R.01."

    tags="Encryption,Technical,Mobile Devices"


><![CDATA[<p>The above approach cannot be used for communicating classified information over public infrastructure, the internet or non-agency controlled networks. &nbsp;If appropriate encryption is not available the mobile device will not be approved for communicating classified information.</p>]]></paragraph>
<paragraph
    title="22.1.14.R.02."

    tags="Encryption,Technical,Mobile Devices"


><![CDATA[<p>Note: This applies to information and systems classified as RESTRICTED/SENSITIVE and any higher classification.</p>]]></paragraph>
<paragraph
    title="22.1.14.R.03."

    tags="Encryption,Technical,Mobile Devices"


><![CDATA[<p>Encryption does not change the classification level of the information or system itself but allows reduced handling requirements to be applied.</p>]]></paragraph>
<paragraph
    title="22.1.14.C.01."

    tags="Encryption,Technical,Mobile Devices"


    classification="Secret, Confidential, Top Secret, Restricted/Sensitive"
    compliance="Must"
    cid="4492"
><![CDATA[<p>Agencies MUST use encryption on mobile devices communicating over public infrastructure, the Internet or non-agency controlled networks.</p>]]></paragraph>
<paragraph
    title="22.1.14.C.02."

    tags="Encryption,Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4493"
><![CDATA[<p>Agencies SHOULD use encryption for Official Information or any classified information on mobile devices communicating over public infrastructure, the Internet or non-agency controlled networks.</p>]]></paragraph>
</block>
<block title="Mobile device privacy filters"><paragraph
    title="22.1.15.R.01."

    tags="Technical,Mobile Devices"


><![CDATA[<p>Privacy filters can be applied to the screens of mobile devices to prevent onlookers from reading the contents off the screen of the device. &nbsp;This assists in mitigating a shoulder surfing or other oversight attack or compromise.</p>]]></paragraph>
<paragraph
    title="22.1.15.C.01."

    tags="Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4496"
><![CDATA[<p>Agencies SHOULD apply privacy filters to the screens of mobile devices.</p>]]></paragraph>
</block>
<block title="Disabling Bluetooth functionality"><paragraph
    title="22.1.16.R.01."

    tags="Bluetooth,Technical,Mobile Devices"


><![CDATA[<p>As Bluetooth provides little security for the information that is passed between devices and a number of exploits have been publicised, it SHOULD NOT be used on mobile devices. Refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13958">Chapter 11 – Communications Systems and Devices</a>.</p>]]></paragraph>
<paragraph
    title="22.1.16.C.01."

    tags="Bluetooth,Technical,Mobile Devices"


    classification="Secret, Top Secret, Confidential"
    compliance="Must Not"
    cid="4499"
><![CDATA[<p>Agencies MUST NOT enable Bluetooth functionality on mobile devices.</p>]]></paragraph>
<paragraph
    title="22.1.16.C.02."

    tags="Bluetooth,Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should Not"
    cid="4500"
><![CDATA[<p>Agencies SHOULD NOT enable Bluetooth functionality on mobile devices.</p>]]></paragraph>
</block>
<block title="Configuration control"><paragraph
    title="22.1.17.R.01."

    tags="Technical,Mobile Devices"


><![CDATA[<p>Poorly controlled devices are more vulnerable to compromise and provide an attacker with a potential access point into agency systems. &nbsp;Although agencies may initially provide a secure device, the state of security may degrade over time. &nbsp;The agency will need to revaluate the security of devices regularly to ensure their integrity.</p>]]></paragraph>
<paragraph
    title="22.1.17.C.01."

    tags="Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Must Not"
    cid="4503"
><![CDATA[<p>Agency personnel MUST NOT disable security functions or security configurations on a mobile device once provisioned.</p>]]></paragraph>
<paragraph
    title="22.1.17.C.02."

    tags="Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4504"
><![CDATA[<p>Agencies SHOULD control the configuration of mobile devices in the same manner as devices in the agency’s office environment.</p>]]></paragraph>
<paragraph
    title="22.1.17.C.03."

    tags="Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4505"
><![CDATA[<p>Agencies SHOULD prevent personnel from installing unauthorised applications on a mobile device once provisioned.</p>]]></paragraph>
</block>
<block title="Maintaining mobile device security"><paragraph
    title="22.1.18.R.01."

    tags="Technical,Mobile Devices"


><![CDATA[<p>As mobile devices are not continually connected to ICT systems within an agency it is important that they are routinely returned to the agency so that patches can be applied and they can be tested to ensure that they are still secure.</p>
<p>Alternatively a mobile device management solution may implement policy checks and updates on connection to agency systems.</p>]]></paragraph>
<paragraph
    title="22.1.18.C.01."

    tags="Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4508"
><![CDATA[<p>Agencies SHOULD ensure that mobile devices have security updates applied on a regular basis and are tested to ensure that the mobile devices are still secure.</p>]]></paragraph>
<paragraph
    title="22.1.18.C.02."

    tags="Technical,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4509"
><![CDATA[<p>Agencies SHOULD conduct policy checks as mobile devices connect to agency systems.</p>]]></paragraph>
</block>
<block title="Connecting mobile devices to the Internet"><paragraph
    title="22.1.19.R.01."

    tags="Technical,Mobile Devices"


><![CDATA[<p>During the period that a device is connected to the Internet, without a VPN connection, it is exposed to attacks. &nbsp;This period needs to be minimised to reduce the security risks. &nbsp;Minimising this period includes ensuring that system users do not connect directly to the Internet to access the Web between VPN sessions.</p>]]></paragraph>
<paragraph
    title="22.1.19.R.02."

    tags="Technical,Mobile Devices,Split tunnelling"


><![CDATA[<p>A split tunnel VPN can allow access to an agency’s systems from another network, including unsecure networks such as the Internet. &nbsp;If split tunnelling is enabled there is an increased security risk that the VPN connection is susceptible to attack from such networks.</p>]]></paragraph>
<paragraph
    title="22.1.19.C.01."

    tags="Technical,Mobile Devices,Split tunnelling"


    classification="All Classifications"
    compliance="Must"
    cid="4513"
><![CDATA[<p>Agencies MUST disable split tunnelling when using a VPN connection from a mobile device to connect to an agency network.</p>]]></paragraph>
<paragraph
    title="22.1.19.C.02."

    tags="Technical,Mobile Devices"


    classification="Secret, Confidential, Top Secret"
    compliance="Should Not"
    cid="4514"
><![CDATA[<p>Agencies SHOULD NOT allow mobile devices to connect to the Internet except when temporarily connecting to facilitate the establishment of a VPN connection to an agency network.</p>]]></paragraph>
</block>
<block title="Emergency destruction"><paragraph
    title="22.1.20.R.01."

    tags="Technical,Mobile Devices,Emergency Destruction,Emergency Procedures"


><![CDATA[<p>Where a mobile device carries classified information, or there is an increased risk of loss or compromise of the device, agencies will need to develop emergency destruction procedures. &nbsp;Such procedures should focus on the destruction of information on the mobile device and not necessarily the device itself. &nbsp;Many mobile devices used for classified information achieve this through the use of a cryptographic key zeroise or sanitisation function.</p>]]></paragraph>
<paragraph
    title="22.1.20.R.02."

    tags="Governance,Mobile Devices,Emergency Destruction,Emergency Procedures"


><![CDATA[<p>Staff will need to understand the rationale and be familiar with emergency destruction procedures, especially where there is a higher probability of loss, theft or compromise.</p>]]></paragraph>
<paragraph
    title="22.1.20.C.01."

    tags="Governance,Mobile Devices,Emergency Destruction,Emergency Procedures"


    classification="All Classifications"
    compliance="Must"
    cid="4519"
><![CDATA[<p>Agencies MUST develop an emergency destruction plan for mobile devices.</p>]]></paragraph>
<paragraph
    title="22.1.20.C.02."

    tags="Technical,Mobile Devices,Emergency Destruction,Emergency Procedures"


    classification="All Classifications"
    compliance="Must"
    cid="4520"
><![CDATA[<p>If a cryptographic zeroise or sanitise function is provided for cryptographic keys on a mobile device it MUST be used as part of the emergency destruction procedures.</p>]]></paragraph>
<paragraph
    title="22.1.20.C.03."

    tags="Governance,Mobile Devices,Emergency Destruction,Emergency Procedures"


    classification="All Classifications"
    compliance="Should"
    cid="4521"
><![CDATA[<p>Agencies SHOULD ensure personnel are trained in emergency destruction procedures and are familiar with the emergency destruction plan.</p>]]></paragraph>
</block>
<block title="Labelling"><paragraph
    title="22.1.21.R.01."

    tags="Governance,Mobile Telephony"


><![CDATA[<p>Agencies may wish to affix an additional label to mobile devices asking finders of lost devices to hand it in to any New Zealand police station, or if overseas, a New Zealand embassy, consulate or high commission.</p>]]></paragraph>
<paragraph
    title="22.1.21.C.01."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Should"
    cid="4524"
><![CDATA[<p>Agencies SHOULD use soft labelling for mobile devices when appropriate to reduce their attractiveness value.</p>]]></paragraph>
</block>
<block title="Unauthorised use of mobile devices"><paragraph
    title="22.1.22.R.01."

    tags="Governance,Mobile Devices"


><![CDATA[<p>Where mobile devices are issued to personnel for business purposes their use for private purposes should be governed by agency policy and agreed by the employee or contractor to whom the device is issued.</p>]]></paragraph>
<paragraph
    title="22.1.22.R.02."

    tags="Governance,Mobile Devices,Risk Management"


><![CDATA[<p>Agencies must recognise the risks and costs associated with personal use of an agency device.</p>]]></paragraph>
<paragraph
    title="22.1.22.C.01."

    tags="Governance,Mobile Devices,Risk Management"


    classification="All Classifications"
    compliance="Should"
    cid="4530"
><![CDATA[<p>Agencies SHOULD develop a policy to manage the non-business or personal use of an agency owned device.</p>]]></paragraph>
<paragraph
    title="22.1.22.C.02."

    tags="Governance,Mobile Devices"


    classification="All Classifications"
    compliance="Should Not"
    cid="4531"
><![CDATA[<p>Mobile devices SHOULD NOT be used other than by personnel specifically authorised by the agency.</p>]]></paragraph>
</block>
</subsection>
</section>
