BSI 22/30455865 DC 2022
$13.70
BS ISO/IEC 24383. Information technology. Physical network security for the accommodation of customer premises cabling infrastructure and information technology equipment
Published By | Publication Date | Number of Pages |
BSI | 2022 | 77 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
3 | HORIZONTAL_STD FUNCTION_EMC FUNCTION_ENV FUNCTION_QUA FUNCTION_SAFETY |
5 | B.2.4 19BSecurity lighting |
7 | FOREWORD |
8 | INTRODUCTION |
9 | 1 Scope 2 Normative references |
10 | 3 Definitions and abbreviations 3.1 Definitions |
12 | 3.2 Abbreviations |
13 | 4 Conformance 5 Principles 5.1 General 5.2 Relationship with ISO/IEC 27000 series 5.3 Risk assessment concepts 5.3.1 General |
14 | 5.3.2 Information sensitivity levels 5.4 Defence in depth 5.4.1 General |
15 | 5.4.2 Public perimeter 5.4.3 Organizational perimeter |
16 | 5.4.4 Equipment/distributor room 5.4.5 Rack/cabinet 5.4.6 Cabling component containment |
17 | 5.4.7 Cabling component 5.5 Network infrastructure 5.6 Controlling access 5.7 Physical access to cabling should be minimized to avoid threats. Perimeters and spaces 5.7.1 General 5.7.2 Area and room relationships 5.7.2.1 General |
18 | 5.7.2.2 Example: solution one 5.7.2.3 Example: solution two |
19 | 5.7.2.4 Example: solution three |
20 | 5.7.3 Unauthorized observation 5.7.4 Security treatments and controls |
21 | 5.8 Threat |
22 | 6 Public perimeter 6.1 General 6.2 Spaces and structures 6.2.1 Access control 6.2.1.1 Requirements 6.2.1.1.1 Open 6.2.1.1.2 Restricted 6.2.1.1.3 Secure 6.2.1.1.4 Highly secure 6.2.1.2 Recommendations 6.2.1.2.1 Open 6.2.1.2.2 Restricted 6.2.1.2.3 Secure 6.2.1.2.4 Highly secure 6.2.2 Intrusion resistance 6.2.2.1 Requirements 6.2.2.1.1 Open 6.2.2.1.2 Restricted 6.2.2.1.3 Secure 6.2.2.1.4 Highly secure 6.2.2.2 Recommendations 6.2.2.2.1 Open 6.2.2.2.2 Restricted 6.2.2.2.3 Secure 6.2.2.2.4 Highly secure 6.2.3 Monitoring 6.2.3.1 Requirements 6.2.3.1.1 Open 6.2.3.1.2 Restricted 6.2.3.1.3 Secure |
23 | 6.2.3.1.4 Highly secure 6.2.3.2 Recommendations 6.2.3.2.1 Open 6.2.3.2.2 Restricted 6.2.3.2.3 Secure 6.2.3.2.4 Highly secure 6.3 Pathways 6.3.1 Access control 6.3.1.1 Requirements 6.3.1.1.1 Open 6.3.1.1.2 Restricted 6.3.1.1.3 Secure 6.3.1.1.4 Highly secure 6.3.1.2 Recommendations 6.3.1.2.1 Open 6.3.1.2.2 Restricted 6.3.1.2.3 Secure 6.3.1.2.4 Highly secure 6.3.2 Intrusion resistance 6.3.2.1 Requirements 6.3.2.1.1 Open 6.3.2.1.2 Restricted 6.3.2.1.3 Secure 6.3.2.1.4 Highly secure 6.3.2.2 Recommendations 6.3.2.2.1 Open 6.3.2.2.2 Restricted 6.3.2.2.3 Secure 6.3.2.2.4 Highly secure 6.3.3 Monitoring 6.3.3.1 Requirements |
24 | 6.3.3.1.1 Open 6.3.3.1.2 Restricted 6.3.3.1.3 Secure 6.3.3.1.4 Highly secure 6.3.3.2 Recommendations 6.3.3.2.1 Open 6.3.3.2.2 Restricted 6.3.3.2.3 Secure 6.3.3.2.4 Highly secure 6.4 Infrastructure components 6.4.1 Access control 6.4.1.1 Requirements 6.4.1.1.1 Open 6.4.1.1.2 Restricted 6.4.1.1.3 Secure 6.4.1.1.4 Highly secure 6.4.1.2 Recommendations 6.4.1.2.1 Open 6.4.1.2.2 Restricted 6.4.1.2.3 Secure 6.4.1.2.4 Highly secure 6.4.2 Intrusion resistance 6.4.2.1 Requirements 6.4.2.1.1 Open 6.4.2.1.2 Restricted 6.4.2.1.3 Secure 6.4.2.1.4 Highly secure 6.4.2.2 Recommendations 6.4.2.2.1 Open 6.4.2.2.2 Restricted 6.4.2.2.3 Secure 6.4.2.2.4 Highly secure 6.4.3 Monitoring 6.4.3.1 Requirements |
25 | 6.4.3.1.1 Open 6.4.3.1.2 Restricted 6.4.3.1.3 Secure 6.4.3.1.4 Highly secure 6.4.3.2 Recommendations 6.4.3.2.1 Open 6.4.3.2.2 Restricted 6.4.3.2.3 Secure 6.4.3.2.4 Highly secure 7 Building perimeter 7.1 Spaces and structures 7.1.1 Access control 7.1.1.1 Requirements 7.1.1.1.1 Open 7.1.1.1.2 Restricted |
26 | 7.1.1.1.3 Secure |
28 | 7.1.1.1.4 Highly secure |
29 | 7.1.1.2 Recommendations 7.1.1.2.1 Open 7.1.1.2.2 Restricted 7.1.1.2.3 Secure 7.1.1.2.4 Highly secure 7.1.2 Intrusion resistance 7.1.2.1 Requirements 7.1.2.1.1 Open 7.1.2.1.2 Restricted 7.1.2.1.3 Secure 7.1.2.1.4 Highly secure 7.1.2.2 Recommendations 7.1.2.2.1 Open 7.1.2.2.2 Restricted 7.1.2.2.3 Secure 7.1.2.2.4 Highly secure 7.1.3 Monitoring 7.1.3.1 Requirements |
30 | 7.1.3.1.1 Open 7.1.3.1.2 Restricted 7.1.3.1.3 Secure 7.1.3.1.4 Highly secure 7.1.3.2 Recommendations 7.1.3.2.1 Open 7.1.3.2.2 Restricted 7.1.3.2.3 Secure 7.1.3.2.4 Highly secure 7.2 Pathways 7.2.1 Access control 7.2.1.1 Requirements 7.2.1.1.1 Open 7.2.1.1.2 Restricted 7.2.1.1.3 Secure 7.2.1.1.4 Highly secure |
31 | 7.2.1.2 Recommendations 7.2.1.2.1 Open 7.2.1.2.2 Restricted 7.2.1.2.3 Secure 7.2.1.2.4 Highly secure 7.2.2 Intrusion resistance 7.2.2.1 Requirements 7.2.2.1.1 Open 7.2.2.1.2 Restricted 7.2.2.1.3 Secure 7.2.2.1.4 Highly secure 7.2.2.2 Recommendations 7.2.2.2.1 Open 7.2.2.2.2 Restricted 7.2.2.2.3 Secure 7.2.2.2.4 Highly secure 7.2.3 Monitoring 7.2.3.1 Requirements 7.2.3.1.1 Open 7.2.3.1.2 Restricted 7.2.3.1.3 Secure 7.2.3.1.4 Highly secure 7.2.3.2 Recommendations 7.2.3.2.1 Open 7.2.3.2.2 Restricted 7.2.3.2.3 Secure 7.2.3.2.4 Highly secure 7.3 Infrastructure components 7.3.1 Access control 7.3.1.1 Requirements |
32 | 7.3.1.1.1 Open 7.3.1.1.2 Restricted 7.3.1.1.3 Secure 7.3.1.1.4 Highly secure 7.3.1.2 Recommendations 7.3.1.2.1 Open 7.3.1.2.2 Restricted 7.3.1.2.3 Secure 7.3.1.2.4 Highly secure 7.3.2 Intrusion resistance 7.3.2.1 Requirements 7.3.2.1.1 Open 7.3.2.1.2 Restricted 7.3.2.1.3 Secure 7.3.2.1.4 Highly secure 7.3.2.2 Recommendations 7.3.2.2.1 Open 7.3.2.2.2 Restricted 7.3.2.2.3 Secure 7.3.2.2.4 Highly secure 7.3.3 Monitoring 7.3.3.1 Requirements 7.3.3.1.1 Open 7.3.3.1.2 Restricted 7.3.3.1.3 Secure 7.3.3.1.4 Highly secure 7.3.3.2 Recommendations 7.3.3.2.1 Open 7.3.3.2.2 Restricted 7.3.3.2.3 Secure 7.3.3.2.4 Highly secure 8 Equipment/distributor room 8.1 Spaces and structures |
33 | 8.1.1 Access control 8.1.1.1 General 8.1.1.2 Emergency access 8.1.1.3 Requirements 8.1.1.3.1 Open Access control: Mechanical lock 8.1.1.3.2 Restricted |
34 | Wall: Solid from permanent floor to permanent ceiling with physical barrier that permits airflow but restricts physical access only as required above ceiling or under access floor for air circulation. Ceiling: Solid plywood ceiling where no panel can be lifted. Floor: Slab. If raised poor is utilised, then metal grill shall be installed between the wall and slab; metal grill to be secured with security screws. Windows: No windows. Door: Single leaf, solid core door equivalent to LPS 1175 SR3. Access control: Single factor authentication access-controlled (proximity card reader) entrance / exit into the physical space. Wall: Dual steel panel(internal) construction. This shall extend between secure floor to secure ceiling. This can extend slab to slab, or ceiling to raised floor, or any combination. Ceiling: A metal mesh shall be provided either: |
35 | Floor: No mandatory treatments if the floor is a concrete slab. If raised flooring is utilised, then metal grill shall be installed between the wall and slab. The metal grill shall be welded to the steel panel in the wall. Door: Single leaf, solid core door equivalent to LPS 1175 SR4. 8.1.1.3.3 Secure Secure equipment room wall construction shall meet the same requirements of Secure area perimeter walls and extend from permanent floor to permanent ceiling. Floor: No mandatory treatments if the floor is a concrete slab. Windows: No windows. Door: Single leaf, solid core door equivalent to LPS 1175 SR4. Access control: Single factor authentication access-controlled (proximity card reader) entrance / exit into the physical space. |
36 | Wall: Dual steel panel(internal) construction. This shall extend between secure floor to secure ceiling. This can extend slab to slab, or ceiling to raised floor, or any combination. Access control: Dual factor authentication access-controlled (e.g. proximity card reader plus biometrics) entrance / exit into the physical space. 8.1.1.3.4 Highly secure Highly Secure equipment room wall construction shall meet the same requirements of Highly Secure area perimeter walls and extend from permanent floor to permanent ceiling. Floor: No mandatory treatments if the floor is a concrete slab or equivalent intrusion resistance. Windows: No windows. Door: Single leaf, solid core door equivalent to LPS 1175 SR4. Access control: Dual factor authentication access-controlled (e.g. proximity card reader plus biometrics) entrance / exit into the physical space. |
37 | Wall: Additional single steel panel(internal) construction. This shall extend between secure floor to secure ceiling. This can extend slab to slab, or ceiling to raised floor, or any combination. Door: Second single leaf, solid core door equivalent to LPS 1175 SR4. 8.1.1.4 Recommendations 8.1.1.4.1 Open 8.1.1.4.2 Restricted 8.1.1.4.3 Secure 8.1.1.4.4 Highly secure 8.1.2 Intrusion resistance 8.1.2.1 Requirements 8.1.2.1.1 Open 8.1.2.1.2 Restricted Provide an intrusion detection system with a volumetric detection alarm system at the entrance. 8.1.2.1.3 Secure Provide an intrusion detection system with a volumetric detection alarm system for high threat areas. Alarm notification shall be continuously monitored and encrypted with a keep-alive feature. 8.1.2.1.4 Highly secure Provide an intrusion detection system with alarm switches on each door and window, and volumetric detector covering all possible access areas. Provide volumetric detectors covering all transit areas, data and electronic equipment working and storage areas, and outside walls. Provide volumetric detectors for over raised ceiling and under raised floors. Alarm notification shall be continuously monitored and encrypted with a keep-alive feature. Intrusion detection and alarm systems shall have backup power for a minimum of 8 hours with a redundant wired or wireless connection. 8.1.2.2 Recommendations |
38 | 8.1.2.2.1 Open 8.1.2.2.2 Restricted 8.1.2.2.3 Secure 8.1.2.2.4 Highly secure 8.1.3 Monitoring 8.1.3.1 Requirements 8.1.3.1.1 Open 8.1.3.1.2 Restricted 8.1.3.1.3 Secure Video surveillance: Surveillance at all portals entering into the equipment room, equivalent to highly secure equipment room. 8.1.3.1.4 Highly secure Video surveillance: Surveillance at all portals entering into highly secure space. 8.1.3.2 Recommendations 8.1.3.2.1 Open 8.1.3.2.2 Restricted 8.1.3.2.3 Secure 8.1.3.2.4 Highly secure 8.2 Pathways 8.2.1 Access control 8.2.1.1 Requirements 8.2.1.1.1 Open 8.2.1.1.2 Restricted 8.2.1.1.3 Secure 8.2.1.1.4 Highly secure 8.2.1.2 Recommendations 8.2.1.2.1 Open 8.2.1.2.2 Restricted 8.2.1.2.3 Secure 8.2.1.2.4 Highly secure 8.2.2 Intrusion resistance 8.2.2.1 Requirements 8.2.2.1.1 Open 8.2.2.1.2 Restricted 8.2.2.1.3 Secure 8.2.2.1.4 Highly secure 8.2.2.2 Recommendations |
39 | 8.2.2.2.1 Open 8.2.2.2.2 Restricted 8.2.2.2.3 Secure 8.2.2.2.4 Highly secure 8.2.3 Monitoring 8.2.3.1 Requirements 8.2.3.1.1 Open 8.2.3.1.2 Restricted 8.2.3.1.3 Secure 8.2.3.1.4 Highly secure 8.2.3.2 Recommendations 8.2.3.2.1 Open 8.2.3.2.2 Restricted 8.2.3.2.3 Secure 8.2.3.2.4 Highly secure 8.3 Infrastructure components 8.3.1 Access control 8.3.1.1 Requirements 8.3.1.1.1 Open 8.3.1.1.2 Restricted 8.3.1.1.3 Secure 8.3.1.1.4 Highly secure 8.3.1.2 Recommendations 8.3.1.2.1 Open 8.3.1.2.2 Restricted 8.3.1.2.3 Secure 8.3.1.2.4 Highly secure 8.3.2 Intrusion resistance 8.3.2.1 Requirements 8.3.2.1.1 Open 8.3.2.1.2 Restricted 8.3.2.1.3 Secure 8.3.2.1.4 Highly secure 8.3.2.2 Recommendations 8.3.2.2.1 Open 8.3.2.2.2 Restricted 8.3.2.2.3 Secure 8.3.2.2.4 Highly secure 8.3.3 Monitoring 8.3.3.1 Requirements |
40 | 8.3.3.1.1 Open 8.3.3.1.2 Restricted 8.3.3.1.3 Secure 8.3.3.1.4 Highly secure 8.3.3.2 Recommendations 8.3.3.2.1 Open 8.3.3.2.2 Restricted 8.3.3.2.3 Secure 8.3.3.2.4 Highly secure 9 Rack/cabinet 9.1 Spaces and structures 9.1.1 General 9.1.2 Access control 9.1.2.1 General 9.1.2.2 Requirements 9.1.2.2.1 Open 9.1.2.2.2 Restricted |
41 | 9.1.2.2.3 Secure 9.1.2.2.4 Highly secure 9.1.2.3 Recommendations 9.1.2.3.1 Open 9.1.2.3.2 Restricted 9.1.2.3.3 Secure 9.1.2.3.4 Highly secure 9.1.3 Intrusion resistance 9.1.3.1 Requirements 9.1.3.1.1 Open 9.1.3.1.2 Restricted 9.1.3.1.3 Secure 9.1.3.1.4 Highly secure 9.1.3.2 Recommendations 9.1.3.2.1 Open 9.1.3.2.2 Restricted 9.1.3.2.3 Secure 9.1.3.2.4 Highly secure 9.1.4 Monitoring 9.1.4.1 Requirements 9.1.4.1.1 Open 9.1.4.1.2 Restricted 9.1.4.1.3 Secure 9.1.4.1.4 Highly secure 9.1.4.2 Recommendations |
42 | 9.1.4.2.1 Open 9.1.4.2.2 Restricted 9.1.4.2.3 Secure 9.1.4.2.4 Highly secure 9.2 Pathways 9.2.1 Access control 9.2.1.1 General 9.2.1.2 Requirements 9.2.1.2.1 Open 9.2.1.2.2 Restricted 9.2.1.2.3 Secure 9.2.1.2.4 Highly secure 9.2.1.3 Recommendations 9.2.1.3.1 Open 9.2.1.3.2 Restricted 9.2.1.3.3 Secure 9.2.1.3.4 Highly secure 9.2.2 Intrusion resistance 9.2.2.1 Requirements 9.2.2.1.1 Open 9.2.2.1.2 Restricted 9.2.2.1.3 Secure 9.2.2.1.4 Highly secure 9.2.2.2 Recommendations 9.2.2.2.1 Open 9.2.2.2.2 Restricted 9.2.2.2.3 Secure 9.2.2.2.4 Highly secure 9.2.3 Monitoring 9.2.3.1 Requirements |
43 | 9.2.3.1.1 Open 9.2.3.1.2 Restricted 9.2.3.1.3 Secure 9.2.3.1.4 Highly secure 9.2.3.2 Recommendations 9.2.3.2.1 Open 9.2.3.2.2 Restricted 9.2.3.2.3 Secure 9.2.3.2.4 Highly secure 9.3 Infrastructure components 9.3.1 Access control 9.3.1.1 General 9.3.1.2 Terminating in cabinets 9.3.1.3 Patch panel separation 9.3.1.4 Highly Secure ports shall be exclusively located in their own cabinets, frames, or racks. Patch cord installation 9.3.1.5 Patch panel terminations 9.3.1.6 External cabinets |
44 | 9.3.1.7 Inter-rack relationship 9.3.1.8 Requirements 9.3.1.8.1 Open 9.3.1.8.2 Restricted 9.3.1.8.3 Secure 9.3.1.8.4 Highly secure |
45 | 9.3.1.9 Recommendations 9.3.1.9.1 Open 9.3.1.9.2 Restricted 9.3.1.9.3 Secure 9.3.1.9.4 Highly secure 9.3.2 Intrusion resistance 9.3.2.1 Requirements 9.3.2.1.1 Open 9.3.2.1.2 Restricted 9.3.2.1.3 Secure 9.3.2.1.4 Highly secure 9.3.2.2 Recommendations 9.3.2.2.1 Open 9.3.2.2.2 Restricted 9.3.2.2.3 Secure 9.3.2.2.4 Highly secure 9.3.3 Monitoring 9.3.3.1 Requirements 9.3.3.1.1 Open 9.3.3.1.2 Restricted 9.3.3.1.3 Secure 9.3.3.1.4 Highly secure 9.3.3.2 Recommendations 9.3.3.2.1 Open 9.3.3.2.2 Restricted 9.3.3.2.3 Secure 9.3.3.2.4 Highly secure 10 Cabling component containment 10.1 Spaces and structures 10.1.1 Access control 10.1.1.1 Requirements 10.1.1.1.1 Open 10.1.1.1.2 Restricted 10.1.1.1.3 Secure 10.1.1.1.4 Highly secure 10.1.1.2 Recommendations 10.1.1.2.1 Open 10.1.1.2.2 Restricted 10.1.1.2.3 Secure 10.1.1.2.4 Highly secure 10.1.2 Intrusion resistance 10.1.2.1 Requirements |
46 | 10.1.2.1.1 Open 10.1.2.1.2 Restricted 10.1.2.1.3 Secure 10.1.2.1.4 Highly secure 10.1.2.2 Recommendations 10.1.2.2.1 Open 10.1.2.2.2 Restricted 10.1.2.2.3 Secure 10.1.2.2.4 Highly secure 10.1.3 Monitoring 10.1.3.1 Requirements 10.1.3.1.1 Open 10.1.3.1.2 Restricted 10.1.3.1.3 Secure 10.1.3.1.4 Highly secure 10.1.3.2 Recommendations 10.1.3.2.1 Open 10.1.3.2.2 Restricted 10.1.3.2.3 Secure 10.1.3.2.4 Highly secure 10.2 Pathways 10.2.1 Access control 10.2.1.1 General 10.2.1.2 Security conduit 10.2.1.2.1 General |
47 | 10.2.1.2.2 Security conduit – optical fibre 10.2.1.2.3 Fibre-optic cable pathways 10.2.1.2.4 Protected Pathway System (PPS) 10.2.1.2.4.1 General |
48 | 10.2.1.2.4.2 Outside outlets 10.2.1.2.4.3 Application 10.2.1.2.4.4 Level 1 PPS requirements Level 1 PPS conduit |
49 | Level 1 PPS tray Level 1 PPS installation Level 1 PPS pull boxes Level 1 PPS enclosures Level 1 suspended PPS Level 1 direct buried PPS |
50 | Level 1 underground PPS Level 1 PPS monitoring 10.2.1.2.4.5 Level 2 PPS requirements Level 2 PPS conduit Level 2 PPS installation Level 2 PPS pull boxes Level 2 PPS enclosures Level 2 suspended PPS |
51 | Level 2 direct buried PPS Level 2 underground PPS |
52 | Level 2 PPS monitoring |
53 | 10.2.1.2.5 Alarmed cable 10.2.1.2.6 Continuously viewed carrier 10.2.1.2.7 PPS distribution general 10.2.1.2.8 PPS outlet closures general 10.2.1.2.9 Wall finish 10.2.1.2.10 Wall penetrations 10.2.1.2.11 PPS termination 10.2.1.3 Cables in walls |
54 | 10.2.1.4 Cables in shared walls 10.2.1.5 Wall penetrations 10.2.1.6 Pathway systems 10.2.1.6.1 General 10.2.1.6.2 Common pathway system 10.2.1.6.3 Enclosed pathway systems for multiorganizational facilities |
55 | 10.2.1.7 Sealing PPS systems 10.2.1.8 Cable inspection 10.2.1.9 Security seals 10.2.1.10 Outside plant 10.2.1.10.1 Access pits |
56 | 10.2.1.10.2 Building lead-in 10.2.1.10.3 Inter-building conduit 10.2.1.11 Requirements 10.2.1.11.1 Open 10.2.1.11.2 Restricted 10.2.1.11.3 Secure 10.2.1.11.4 Highly secure 10.2.1.12 Recommendations |
57 | 10.2.1.12.1 Open 10.2.1.12.2 Restricted 10.2.1.12.3 Secure 10.2.1.12.4 Highly secure 10.2.2 Intrusion resistance 10.2.2.1 Requirements 10.2.2.1.1 Open 10.2.2.1.2 Restricted 10.2.2.1.3 Secure 10.2.2.1.4 Highly secure 10.2.2.2 Recommendations 10.2.2.2.1 Open 10.2.2.2.2 Restricted 10.2.2.2.3 Secure 10.2.2.2.4 Highly secure 10.2.3 Monitoring 10.2.3.1 Requirements 10.2.3.1.1 Open 10.2.3.1.2 Restricted 10.2.3.1.3 Secure 10.2.3.1.4 Highly secure 10.2.3.2 Recommendations 10.2.3.2.1 Open 10.2.3.2.2 Restricted 10.2.3.2.3 Secure 10.2.3.2.4 Highly secure 10.3 Infrastructure components 10.3.1 Access control 10.3.1.1 Requirements 10.3.1.1.1 Open 10.3.1.1.2 Restricted 10.3.1.1.3 Secure 10.3.1.1.4 Highly secure 10.3.1.2 Recommendations 10.3.1.2.1 Open 10.3.1.2.2 Restricted 10.3.1.2.3 Secure 10.3.1.2.4 Highly secure 10.3.2 Intrusion resistance 10.3.2.1 Requirements |
58 | 10.3.2.1.1 Open 10.3.2.1.2 Restricted 10.3.2.1.3 Secure 10.3.2.1.4 Highly secure 10.3.2.2 Recommendations 10.3.2.2.1 Open 10.3.2.2.2 Restricted 10.3.2.2.3 Secure 10.3.2.2.4 Highly secure 10.3.3 Monitoring 10.3.3.1 Requirements 10.3.3.1.1 Open 10.3.3.1.2 Restricted 10.3.3.1.3 Secure 10.3.3.1.4 Highly secure 10.3.3.2 Recommendations 10.3.3.2.1 Open 10.3.3.2.2 Restricted 10.3.3.2.3 Secure 10.3.3.2.4 Highly secure 11 Cabling component 11.1 Spaces and structures 11.1.1 Access control 11.1.1.1 Requirements 11.1.1.1.1 Open 11.1.1.1.2 Restricted 11.1.1.1.3 Secure 11.1.1.1.4 Highly secure 11.1.1.2 Recommendations 11.1.1.2.1 Open 11.1.1.2.2 Restricted 11.1.1.2.3 Secure 11.1.1.2.4 Highly secure 11.1.2 Intrusion resistance 11.1.2.1 Requirements 11.1.2.1.1 Open 11.1.2.1.2 Restricted 11.1.2.1.3 Secure 11.1.2.1.4 Highly secure 11.1.2.2 Recommendations |
59 | 11.1.2.2.1 Open 11.1.2.2.2 Restricted 11.1.2.2.3 Secure 11.1.2.2.4 Highly secure 11.1.3 Monitoring 11.1.3.1 Requirements 11.1.3.1.1 Open 11.1.3.1.2 Restricted 11.1.3.1.3 Secure 11.1.3.1.4 Highly secure 11.1.3.2 Recommendations 11.1.3.2.1 Open 11.1.3.2.2 Restricted 11.1.3.2.3 Secure 11.1.3.2.4 Highly secure 11.2 Pathways 11.2.1 Access control 11.2.1.1 Requirements 11.2.1.1.1 Open 11.2.1.1.2 Restricted 11.2.1.1.3 Secure 11.2.1.1.4 Highly secure 11.2.1.2 Recommendations 11.2.1.2.1 Open 11.2.1.2.2 Restricted 11.2.1.2.3 Secure 11.2.1.2.4 Highly secure 11.2.2 Intrusion resistance 11.2.2.1 Requirements 11.2.2.1.1 Open 11.2.2.1.2 Restricted 11.2.2.1.3 Secure 11.2.2.1.4 Highly secure 11.2.2.2 Recommendations 11.2.2.2.1 Open 11.2.2.2.2 Restricted 11.2.2.2.3 Secure 11.2.2.2.4 Highly secure 11.2.3 Monitoring 11.2.3.1 Requirements |
60 | 11.2.3.1.1 Open 11.2.3.1.2 Restricted 11.2.3.1.3 Secure 11.2.3.1.4 Highly secure 11.2.3.2 Recommendations 11.2.3.2.1 Open 11.2.3.2.2 Restricted 11.2.3.2.3 Secure 11.2.3.2.4 Highly secure 11.3 Infrastructure components 11.3.1 Access control 11.3.1.1 General 11.3.1.2 Cable colours 11.3.1.3 Banding |
61 | 11.3.1.4 Optical fibre cables 11.3.1.5 Telecommunications outlet box 11.3.1.6 Telecommunications outlet box colours 11.3.1.7 Telecommunications outlet box covers 11.3.1.8 Equipment cord installation 11.3.1.9 Cable patching |
62 | 11.3.1.10 Requirements 11.3.1.10.1.1 General Telecommunications outlet security. To minimise the impact of erroneous manipulation of connecting cables. As a minimum, the following port security shall be adopted: 11.3.1.10.1.2 Open 11.3.1.10.1.3 Restricted 11.3.1.10.1.4 Secure 11.3.1.10.1.5 Highly secure 11.3.1.11 Recommendations 11.3.1.11.1 Open 11.3.1.11.2 Restricted 11.3.1.11.3 Secure 11.3.1.11.4 Highly secure 11.3.2 Intrusion resistance 11.3.2.1 Requirements 11.3.2.1.1 Open 11.3.2.1.2 Restricted 11.3.2.1.3 Secure 11.3.2.1.4 Highly secure 11.3.2.2 Recommendations 11.3.2.2.1 Open 11.3.2.2.2 Restricted 11.3.2.2.3 Secure 11.3.2.2.4 Highly secure 11.3.3 Monitoring 11.3.3.1 Requirements 11.3.3.1.1 Open 11.3.3.1.2 Restricted 11.3.3.1.3 Secure 11.3.3.1.4 Highly secure 11.3.3.2 Recommendations |
63 | 11.3.3.2.1 Open 11.3.3.2.2 Restricted 11.3.3.2.3 Secure 11.3.3.2.4 Highly secure 12 Administration 12.1 Reporting of cyber security incidents 12.2 Labelling 12.2.1 Conduit 12.2.2 Telecommunications outlet boxes 12.2.3 Cables 12.3 Documentation |
64 | 12.4 Cable auditing |
65 | 12.5 Monitor the system 12.6 Security documentation 12.6.1 General 12.6.2 System security plan 12.6.3 Incident response plan |
66 | 12.7 Security assessment report 12.8 Training 12.9 Security clearances 12.10 Access requirements |
67 | 13 Evolution of security systems |
68 | Annex A (normative)Free standing barriers |
69 | Annex B (normative)Video surveillance B.1 Requirements B.1.1 Cabling, pathways and spaces B.1.2 Cameras B.1.3 1Monitoring B.2 Recommendations B.2.1 1Pathways B.2.2 Cameras |
70 | B.2.3 19BMonitoring |
71 | Annex C (normative)Intrusion detection C.1 Requirements C.1.1 Cabling, pathways and spaces C.1.2 2Deployment C.1.2.1 System independence C.1.2.2 Power supply C.1.2.3 Sensors and keypads |
72 | C.1.2.4 39BAlarmed carrier cable systems C.1.3 BMonitoring C.1.4 2Documentation C.1.5 2Operation D.1.2.1 System independence |
73 | Annex D (normative)Access control D.1 Requirements D.1.1 Cabling, pathways and spaces D.1.2 Deployment D.1.2.2 Power supply D.1.2.3 System components D.1.2.3.1 General |
74 | D.1.2.3.2 Request-to-exit devices D.1.2.3.3 Door contacts D.1.2.3.4 Electric strike or latch D.1.2.3.5 Dialler units D.2 Recommendations D.2.1 Planning D.2.2 Pathways |
75 | Annex E (normative)Management of personnel E.1 Requirements E.1.1 3Employees and other authorized personnel E.1.2 Staffed guarding |
76 | E.1.3 Visitors E.1.4 Deliveries E.2 Recommendations E.2.1 Visitors E.2.2 Deliveries |
77 | Bibliography |