6.2.1 Equipment siting and
protection
Equipment should be sited and protected to reduce the risks from environmental threats and hazards, and opportunities for unauthorized access, especially as left unattended. Equipment should be correctly maintained to ensure its continued availability and integrity, and later on disposed.
- Minimize unnecessary access into
work areas thrught the following:
a) carefully position information
processing facilities handling sensitive data to reduce the risk of
unauthorized persons seeing information during their use;
b) secure storage
facilities to avoid unauthorized access;
- Ensure to safeguard items
requiring special protection by separating and siting these items from the rest
of the environment. This way, the remaining environment does not require a
higher level of protection;
- Adopt controls to minimize the
risk of potential physical and environmental threats, e.g. theft, fire,
explosives, smoke, water (or water supply failure), dust, vibration, chemical
effects, electrical supply interference, communications interference,
electromagnetic radiation and vandalism.
a) monitor environmental conditions,
such as temperature and humidity for conditions which could adversely affect
the operation of information processing facilities;
b) establish guidelines for eating,
drinking and smoking in proximity to information processing facilities;
- Apply lightning
protection to all buildings and lightning protection filters should be fitted
to all incoming power and communications lines.
- Consider the use of special
protection methods, such as keyboard membranes, for equipment in industrial
environments.
- Protect equipment
processing confidential information to minimize the risk of information leakage
due to electromagnetic emanation.
- Make all users aware
of the security requirements and procedures for protecting unattended equipment,
as well as their responsibilities for implementing such protection:
a) terminate active sessions when
finished, unless they can be secured by an appropriate locking mechanism, e.g.
a password protected screen saver;
b) log-off from applications or network
services when no longer needed;
c) secure computers or mobile
devices from unauthorized use by a key lock or an equivalent control, e.g.
password access, when not in use.
- Maintain the equipment in
accordance with the supplier’s recommended service intervals and specifications.
a) only authorized maintenance
personnel carry out repairs and service equipment. Require assurance that personnel
is sufficiently cleared;
b) keep records of all suspected or
actual faults, and of all preventive and corrective maintenance;
c) comply with all maintenance
requirements imposed by insurance policies
d) inspect the equipment before
putting it back into operation after its maintenance to ensure that the
equipment has not been tampered with and does not malfunction.
- Verify equipment to ensure
whether or not storage media is contained prior to disposal or re-use. Physically destroy the storage
media containing confidential or copyrighted information, or delete or the
information to make the original information non-retrievable rather than using
the standard delete or format function.
a) damaged equipment
containing storage media may require a risk assessment to determine whether the
items should be physically destroyed rather than sent for repair or discarded.
Information can be compromised through careless disposal or re-use of
equipment.
Techniques
for securely overwriting storage media differ according to the storage media
technology. Overwriting tools must be applicable to that technology. The risk
of disclosure of confidential information when equipment is disposed of or
redeployed is also reduced through whole-disk encryption, if:
a) the
encryption process is sufficiently strong and covers the entire disk (including
slack space, swap files, etc.);
b) the encryption keys are long enough to resist brute force attacks;
c) the encryption keys are themselves kept confidential (e.g. never
stored on the same disk).
Encryption
is covered in this manual under 5.1 Cryptographic controls
6.2.2 Security of supporting
utilities and cabling
Equipment should be protected from failures in supporting utilities (e.g. power failures). Power and telecommunications cabling carrying data or supporting information services should be protected from interception, interference or damage.
- Ensure that supporting utilities
(e.g. electricity, telecommunications, water supply, gas, sewage, ventilation
and air conditioning):
a) conform to equipment
manufacturer’s specifications and local legal requirements; b) are inspected and tested as well
as appraised regularly for their capacity to meet business growth and
interactions with other supporting utilities;
c) if necessary, be alarmed to
detect malfunctions and have multiple feeds with diverse physical routing;
d) obtain redundancy for network
connectivity by means of multiple routes from more than one utility provider.
- Provide emergency lighting and
communications, and locate emergency switches and valves to cut off power,
water, gas or other utilities near emergency exits or equipment rooms.
- Ensure that power and
telecommunications lines into information processing facilities are underground
or subject to adequate alternative protection.
a) segregate power cables from
communications cables to prevent interference;
- For sensitive or critical systems
further controls to consider include:
a) install armoured conduit and
locked rooms or boxes at inspection and termination points;
b) use of
electromagnetic shielding to protect the cables;
c) initiate technical sweeps and
physical inspections for unauthorized devices being attached to the cables;
d) control access to patch panels
and cable rooms.
6.2.3 Removal of assets from the
premises and security of assets off-premises
Equipment, information or software should not be taken off-site without prior authorization. Security should be applied to off-site assets taking into account the different risks of working outside the organization’s premises.
- Identify employees and external
party users who have authority to permit off-site removal of assets. Where
necessary and appropriate, record such assets as being removed off-site and
record when returned.
- Document the identity, role and
affiliation of anyone who handles or uses assets and return this documentation
with the equipment, information or software.
- The use of any information
storing and processing equipment outside the organization’s premises should be
authorized by management. This applies to equipment owned by the organization
and that equipment owned privately and used on behalf of the organization.
- Do not to leave unattended the
equipment and media in public places.
- Observe manufacturers’ instructions for protecting at all times, e.g. protection
against exposure to strong electromagnetic fields.
- Determine home-working,
teleworking and temporary sites according to a risk assessment and apply controls
as appropriate, e.g. lockable filing cabinets, clear desk policy, access
controls for computers and secure communication with the office.
- Maintain a log of the chain of custody for the equipment (at least names and organizations
of those who are responsible for the equipment) when the equipment is used off-premises
and is transferred among different individuals or externals.
- Take into account risks, e.g. of damage, theft or eavesdropping, which vary considerably
between locations and determine the most appropriate controls.
Risks, e.g. of damage, theft or
eavesdropping, vary considerably between locations and determine the most
appropriate controls. Any other aspects of
protecting mobile equipment in this manual are included in 1.2 Mobile devices and teleworking .
6.2.4 Clear desk and clear screen
policy
A clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities should be adopted.
- Establish a clear desk and clear
screen policy. Take into account the information classifications, legal and
contractual requirements and the corresponding risks and cultural aspects of
the organization.
a) lock away sensitive or critical
business information (ideally in a safe or cabinet or other forms of security
furniture) when not required, especially when the office is vacated.
b) use screen lock with an
authentication mechanism for computers and terminals when unattended and should
be protected by key locks, passwords or other controls when not in use.
c) remove media containing sensitive
or classified information from printers. Consider the use of printers with PIN
code function, so the originators are the only ones who can get their
print-outs and only when standing next to the printer.
The risks of unauthorized access,
loss of and damage to information during and outside normal working hours are
reduced by implementing the clear desk and clear screen policy. Safes or other
forms of secure storage facilities protect information stored therein against
disaster, e.g. fire, earthquake, flood or explosion.
Printers PIN codes ensure
that the originators are the only ones who can get their print-outs and only
when standing next to the printer.