PHY055
It's important that you consider the following good practices when designing your physical security.
PHY055
It's important that you consider the following good practices when designing your physical security.
PHY015
Deter | Deter or discourage unauthorised people from attempting to gain unauthorised access to your facility. Implement measures that unauthorised people perceive as too difficult or needing special tools and training to defeat. |
Detect | Detect unauthorised access as early as possible. Implement measures to work out whether an unauthorised action is occurring or has occurred. |
Delay | Delay an unauthorised access attempt for as long as possible to allow an effective security response to be activated. Implement measures to slow the progress of a harmful event. |
Respond | An effective response counters the anticipated activity of an unauthorised person within a time appropriate to the delay measures. Prepare measures to prevent, resist, or mitigate the impact of an attack or event. |
Recover | Take the steps required to recover from a security incident. Plan to restore operations to as near normal as possible in a timely manner following an incident. |
PHY016
Crime Prevention Through Environmental Design (CPTED) should be an integral part of your facility planning.
To apply the principles of CPTED, identify which aspects of the physical environment could affect people’s behaviour and then use that knowledge to design an environment which minimises crime.
Always base your security measures on your organisation’s risk assessment, as CPTED alone might not meet all your security needs.
More information on CPTED:
Many publications deal with CPTED in the domains of private housing and public areas, but the principles apply equally to government organisations.
Crime Prevention through Environmental Design (3rd edition, 2013) by Timothy Crowe M.S. Criminology - Florida State University, revised by Lawrence Fennelly.
PHY019
Your organisation must protect individual documents in line with the Management protocol for information security and its associated requirements.
Material with a compartmented marking, such as a codeword or SCI, may need additional mandatory security controls.
Provide physical protection for hardcopy and electronic information according to its Business Impact Level (BIL).
A ‘limited amount of information’ means a grouping of information that doesn’t result in a higher BIL or need a higher protective marking than the information collection that it comes from.
At times, there may be a relationship between security classifications for official information and BILs. The security classifications directly match the BILs when considering the confidentiality of individual documents or files. However, this does not necessarily apply to collections of assets. For example, within a collection of assets with a aggregated business impact level of 4, each individual item might not be marked as CONFIDENTIAL.
However, a protective marking, or confidentiality, of an asset isn’t the only factor to consider when you work out a BIL. You need to consider all factors affecting the security of an asset before you apply a BIL. BILs also need to consider integrity and availability.
The following tables summarises the likely links between protective markings and BILs of individual documents or limited amounts of information.
Individual document marking | Business impact level |
UNCLASSIFIED (may not be marked) | 1 Low |
IN-CONFIDENCE | 2 Medium |
SENSITIVE or RESTRICTED | 3 High |
CONFIDENTIAL | 4 Very high |
SECRET | 5 Extreme |
TOP SECRET | 6 Catastrophic |
Aggregated information means collections of protectively-marked or unclassified official information. For example, collections of electronic information.
When information is aggregated, it often becomes more valuable and needs greater protection.
Your organisation must implement physical security measures to mitigate the risks associated with aggregated information.
TOP SECRET or aggregated information that could cause catastrophic damage to New Zealand’s national security if its security was breached, can only be stored in an area certified by the New Zealand Security Intelligence Service (NZSIS). You need their certification before you first use an area and after any modifications to it.
You can arrange for another agency to hold your TOP SECRET information if you don’t have suitable facilities or the cost of establishing facilities is not justifiable. However, if your organisation owns the information, you must provide security containers for holding the information and control access into the containers.
PHY020
The design of your physical security measures must comply with the following acts and any associated regulations or codes:
When your organisation is implementing physical security measures, use the following standards, handbooks, and codes to guide you.
Australian and New Zealand Standards (AS and NZS)
British Standards (BS)
International Organization for Standardization (ISO)
Japanese Industrial Standard (JIS)
UL Standards
American and Canadian standards
Handbooks
Codes
Guidance for establishing zone 3, 4, or 5 areas
The following classified material will guide you when you’re establishing zone 3, 4 or 5 areas. Contact us for more information.