Shopping Cart

No products in the cart.

BSI 22/30455865 DC 2022

$13.70

BS ISO/IEC 24383. Information technology. Physical network security for the accommodation of customer premises cabling infrastructure and information technology equipment

Published By Publication Date Number of Pages
BSI 2022 77
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
3 HORIZONTAL_STD
FUNCTION_EMC
FUNCTION_ENV
FUNCTION_QUA
FUNCTION_SAFETY
5 B.2.4 19BSecurity lighting
7 FOREWORD
8 INTRODUCTION
9 1 Scope
2 Normative references
10 3 Definitions and abbreviations
3.1 Definitions
12 3.2 Abbreviations
13 4 Conformance
5 Principles
5.1 General
5.2 Relationship with ISO/IEC 27000 series
5.3 Risk assessment concepts
5.3.1 General
14 5.3.2 Information sensitivity levels
5.4 Defence in depth
5.4.1 General
15 5.4.2 Public perimeter
5.4.3 Organizational perimeter
16 5.4.4 Equipment/distributor room
5.4.5 Rack/cabinet
5.4.6 Cabling component containment
17 5.4.7 Cabling component
5.5 Network infrastructure
5.6 Controlling access
5.7 Physical access to cabling should be minimized to avoid threats. Perimeters and spaces
5.7.1 General
5.7.2 Area and room relationships
5.7.2.1 General
18 5.7.2.2 Example: solution one
5.7.2.3 Example: solution two
19 5.7.2.4 Example: solution three
20 5.7.3 Unauthorized observation
5.7.4 Security treatments and controls
21 5.8 Threat
22 6 Public perimeter
6.1 General
6.2 Spaces and structures
6.2.1 Access control
6.2.1.1 Requirements
6.2.1.1.1 Open
6.2.1.1.2 Restricted
6.2.1.1.3 Secure
6.2.1.1.4 Highly secure
6.2.1.2 Recommendations
6.2.1.2.1 Open
6.2.1.2.2 Restricted
6.2.1.2.3 Secure
6.2.1.2.4 Highly secure
6.2.2 Intrusion resistance
6.2.2.1 Requirements
6.2.2.1.1 Open
6.2.2.1.2 Restricted
6.2.2.1.3 Secure
6.2.2.1.4 Highly secure
6.2.2.2 Recommendations
6.2.2.2.1 Open
6.2.2.2.2 Restricted
6.2.2.2.3 Secure
6.2.2.2.4 Highly secure
6.2.3 Monitoring
6.2.3.1 Requirements
6.2.3.1.1 Open
6.2.3.1.2 Restricted
6.2.3.1.3 Secure
23 6.2.3.1.4 Highly secure
6.2.3.2 Recommendations
6.2.3.2.1 Open
6.2.3.2.2 Restricted
6.2.3.2.3 Secure
6.2.3.2.4 Highly secure
6.3 Pathways
6.3.1 Access control
6.3.1.1 Requirements
6.3.1.1.1 Open
6.3.1.1.2 Restricted
6.3.1.1.3 Secure
6.3.1.1.4 Highly secure
6.3.1.2 Recommendations
6.3.1.2.1 Open
6.3.1.2.2 Restricted
6.3.1.2.3 Secure
6.3.1.2.4 Highly secure
6.3.2 Intrusion resistance
6.3.2.1 Requirements
6.3.2.1.1 Open
6.3.2.1.2 Restricted
6.3.2.1.3 Secure
6.3.2.1.4 Highly secure
6.3.2.2 Recommendations
6.3.2.2.1 Open
6.3.2.2.2 Restricted
6.3.2.2.3 Secure
6.3.2.2.4 Highly secure
6.3.3 Monitoring
6.3.3.1 Requirements
24 6.3.3.1.1 Open
6.3.3.1.2 Restricted
6.3.3.1.3 Secure
6.3.3.1.4 Highly secure
6.3.3.2 Recommendations
6.3.3.2.1 Open
6.3.3.2.2 Restricted
6.3.3.2.3 Secure
6.3.3.2.4 Highly secure
6.4 Infrastructure components
6.4.1 Access control
6.4.1.1 Requirements
6.4.1.1.1 Open
6.4.1.1.2 Restricted
6.4.1.1.3 Secure
6.4.1.1.4 Highly secure
6.4.1.2 Recommendations
6.4.1.2.1 Open
6.4.1.2.2 Restricted
6.4.1.2.3 Secure
6.4.1.2.4 Highly secure
6.4.2 Intrusion resistance
6.4.2.1 Requirements
6.4.2.1.1 Open
6.4.2.1.2 Restricted
6.4.2.1.3 Secure
6.4.2.1.4 Highly secure
6.4.2.2 Recommendations
6.4.2.2.1 Open
6.4.2.2.2 Restricted
6.4.2.2.3 Secure
6.4.2.2.4 Highly secure
6.4.3 Monitoring
6.4.3.1 Requirements
25 6.4.3.1.1 Open
6.4.3.1.2 Restricted
6.4.3.1.3 Secure
6.4.3.1.4 Highly secure
6.4.3.2 Recommendations
6.4.3.2.1 Open
6.4.3.2.2 Restricted
6.4.3.2.3 Secure
6.4.3.2.4 Highly secure
7 Building perimeter
7.1 Spaces and structures
7.1.1 Access control
7.1.1.1 Requirements
7.1.1.1.1 Open
7.1.1.1.2 Restricted
26 7.1.1.1.3 Secure
28 7.1.1.1.4 Highly secure
29 7.1.1.2 Recommendations
7.1.1.2.1 Open
7.1.1.2.2 Restricted
7.1.1.2.3 Secure
7.1.1.2.4 Highly secure
7.1.2 Intrusion resistance
7.1.2.1 Requirements
7.1.2.1.1 Open
7.1.2.1.2 Restricted
7.1.2.1.3 Secure
7.1.2.1.4 Highly secure
7.1.2.2 Recommendations
7.1.2.2.1 Open
7.1.2.2.2 Restricted
7.1.2.2.3 Secure
7.1.2.2.4 Highly secure
7.1.3 Monitoring
7.1.3.1 Requirements
30 7.1.3.1.1 Open
7.1.3.1.2 Restricted
7.1.3.1.3 Secure
7.1.3.1.4 Highly secure
7.1.3.2 Recommendations
7.1.3.2.1 Open
7.1.3.2.2 Restricted
7.1.3.2.3 Secure
7.1.3.2.4 Highly secure
7.2 Pathways
7.2.1 Access control
7.2.1.1 Requirements
7.2.1.1.1 Open
7.2.1.1.2 Restricted
7.2.1.1.3 Secure
7.2.1.1.4 Highly secure
31 7.2.1.2 Recommendations
7.2.1.2.1 Open
7.2.1.2.2 Restricted
7.2.1.2.3 Secure
7.2.1.2.4 Highly secure
7.2.2 Intrusion resistance
7.2.2.1 Requirements
7.2.2.1.1 Open
7.2.2.1.2 Restricted
7.2.2.1.3 Secure
7.2.2.1.4 Highly secure
7.2.2.2 Recommendations
7.2.2.2.1 Open
7.2.2.2.2 Restricted
7.2.2.2.3 Secure
7.2.2.2.4 Highly secure
7.2.3 Monitoring
7.2.3.1 Requirements
7.2.3.1.1 Open
7.2.3.1.2 Restricted
7.2.3.1.3 Secure
7.2.3.1.4 Highly secure
7.2.3.2 Recommendations
7.2.3.2.1 Open
7.2.3.2.2 Restricted
7.2.3.2.3 Secure
7.2.3.2.4 Highly secure
7.3 Infrastructure components
7.3.1 Access control
7.3.1.1 Requirements
32 7.3.1.1.1 Open
7.3.1.1.2 Restricted
7.3.1.1.3 Secure
7.3.1.1.4 Highly secure
7.3.1.2 Recommendations
7.3.1.2.1 Open
7.3.1.2.2 Restricted
7.3.1.2.3 Secure
7.3.1.2.4 Highly secure
7.3.2 Intrusion resistance
7.3.2.1 Requirements
7.3.2.1.1 Open
7.3.2.1.2 Restricted
7.3.2.1.3 Secure
7.3.2.1.4 Highly secure
7.3.2.2 Recommendations
7.3.2.2.1 Open
7.3.2.2.2 Restricted
7.3.2.2.3 Secure
7.3.2.2.4 Highly secure
7.3.3 Monitoring
7.3.3.1 Requirements
7.3.3.1.1 Open
7.3.3.1.2 Restricted
7.3.3.1.3 Secure
7.3.3.1.4 Highly secure
7.3.3.2 Recommendations
7.3.3.2.1 Open
7.3.3.2.2 Restricted
7.3.3.2.3 Secure
7.3.3.2.4 Highly secure
8 Equipment/distributor room
8.1 Spaces and structures
33 8.1.1 Access control
8.1.1.1 General
8.1.1.2 Emergency access
8.1.1.3 Requirements
8.1.1.3.1 Open
Access control: Mechanical lock
8.1.1.3.2 Restricted
34 Wall: Solid from permanent floor to permanent ceiling with physical barrier that permits airflow but restricts physical access only as required above ceiling or under access floor for air circulation.
Ceiling: Solid plywood ceiling where no panel can be lifted.
Floor: Slab. If raised poor is utilised, then metal grill shall be installed between the wall and slab; metal grill to be secured with security screws.
Windows: No windows.
Door: Single leaf, solid core door equivalent to LPS 1175 SR3.
Access control: Single factor authentication access-controlled (proximity card reader) entrance / exit into the physical space.
Wall: Dual steel panel(internal) construction. This shall extend between secure floor to secure ceiling. This can extend slab to slab, or ceiling to raised floor, or any combination.
Ceiling: A metal mesh shall be provided either:
35 Floor: No mandatory treatments if the floor is a concrete slab. If raised flooring is utilised, then metal grill shall be installed between the wall and slab. The metal grill shall be welded to the steel panel in the wall.
Door: Single leaf, solid core door equivalent to LPS 1175 SR4.
8.1.1.3.3 Secure
Secure equipment room wall construction shall meet the same requirements of Secure area perimeter walls and extend from permanent floor to permanent ceiling.
Floor: No mandatory treatments if the floor is a concrete slab.
Windows: No windows.
Door: Single leaf, solid core door equivalent to LPS 1175 SR4.
Access control: Single factor authentication access-controlled (proximity card reader) entrance / exit into the physical space.
36 Wall: Dual steel panel(internal) construction. This shall extend between secure floor to secure ceiling. This can extend slab to slab, or ceiling to raised floor, or any combination.
Access control: Dual factor authentication access-controlled (e.g. proximity card reader plus biometrics) entrance / exit into the physical space.
8.1.1.3.4 Highly secure
Highly Secure equipment room wall construction shall meet the same requirements of Highly Secure area perimeter walls and extend from permanent floor to permanent ceiling.
Floor: No mandatory treatments if the floor is a concrete slab or equivalent intrusion resistance.
Windows: No windows.
Door: Single leaf, solid core door equivalent to LPS 1175 SR4.
Access control: Dual factor authentication access-controlled (e.g. proximity card reader plus biometrics) entrance / exit into the physical space.
37 Wall: Additional single steel panel(internal) construction. This shall extend between secure floor to secure ceiling. This can extend slab to slab, or ceiling to raised floor, or any combination.
Door: Second single leaf, solid core door equivalent to LPS 1175 SR4.
8.1.1.4 Recommendations
8.1.1.4.1 Open
8.1.1.4.2 Restricted
8.1.1.4.3 Secure
8.1.1.4.4 Highly secure
8.1.2 Intrusion resistance
8.1.2.1 Requirements
8.1.2.1.1 Open
8.1.2.1.2 Restricted
Provide an intrusion detection system with a volumetric detection alarm system at the entrance.
8.1.2.1.3 Secure
Provide an intrusion detection system with a volumetric detection alarm system for high threat areas. Alarm notification shall be continuously monitored and encrypted with a keep-alive feature.
8.1.2.1.4 Highly secure
Provide an intrusion detection system with alarm switches on each door and window, and volumetric detector covering all possible access areas. Provide volumetric detectors covering all transit areas, data and electronic equipment working and storage areas, and outside walls. Provide volumetric detectors for over raised ceiling and under raised floors. Alarm notification shall be continuously monitored and encrypted with a keep-alive feature. Intrusion detection and alarm systems shall have backup power for a minimum of 8 hours with a redundant wired or wireless connection.
8.1.2.2 Recommendations
38 8.1.2.2.1 Open
8.1.2.2.2 Restricted
8.1.2.2.3 Secure
8.1.2.2.4 Highly secure
8.1.3 Monitoring
8.1.3.1 Requirements
8.1.3.1.1 Open
8.1.3.1.2 Restricted
8.1.3.1.3 Secure
Video surveillance: Surveillance at all portals entering into the equipment room, equivalent to highly secure equipment room.
8.1.3.1.4 Highly secure
Video surveillance: Surveillance at all portals entering into highly secure space.
8.1.3.2 Recommendations
8.1.3.2.1 Open
8.1.3.2.2 Restricted
8.1.3.2.3 Secure
8.1.3.2.4 Highly secure
8.2 Pathways
8.2.1 Access control
8.2.1.1 Requirements
8.2.1.1.1 Open
8.2.1.1.2 Restricted
8.2.1.1.3 Secure
8.2.1.1.4 Highly secure
8.2.1.2 Recommendations
8.2.1.2.1 Open
8.2.1.2.2 Restricted
8.2.1.2.3 Secure
8.2.1.2.4 Highly secure
8.2.2 Intrusion resistance
8.2.2.1 Requirements
8.2.2.1.1 Open
8.2.2.1.2 Restricted
8.2.2.1.3 Secure
8.2.2.1.4 Highly secure
8.2.2.2 Recommendations
39 8.2.2.2.1 Open
8.2.2.2.2 Restricted
8.2.2.2.3 Secure
8.2.2.2.4 Highly secure
8.2.3 Monitoring
8.2.3.1 Requirements
8.2.3.1.1 Open
8.2.3.1.2 Restricted
8.2.3.1.3 Secure
8.2.3.1.4 Highly secure
8.2.3.2 Recommendations
8.2.3.2.1 Open
8.2.3.2.2 Restricted
8.2.3.2.3 Secure
8.2.3.2.4 Highly secure
8.3 Infrastructure components
8.3.1 Access control
8.3.1.1 Requirements
8.3.1.1.1 Open
8.3.1.1.2 Restricted
8.3.1.1.3 Secure
8.3.1.1.4 Highly secure
8.3.1.2 Recommendations
8.3.1.2.1 Open
8.3.1.2.2 Restricted
8.3.1.2.3 Secure
8.3.1.2.4 Highly secure
8.3.2 Intrusion resistance
8.3.2.1 Requirements
8.3.2.1.1 Open
8.3.2.1.2 Restricted
8.3.2.1.3 Secure
8.3.2.1.4 Highly secure
8.3.2.2 Recommendations
8.3.2.2.1 Open
8.3.2.2.2 Restricted
8.3.2.2.3 Secure
8.3.2.2.4 Highly secure
8.3.3 Monitoring
8.3.3.1 Requirements
40 8.3.3.1.1 Open
8.3.3.1.2 Restricted
8.3.3.1.3 Secure
8.3.3.1.4 Highly secure
8.3.3.2 Recommendations
8.3.3.2.1 Open
8.3.3.2.2 Restricted
8.3.3.2.3 Secure
8.3.3.2.4 Highly secure
9 Rack/cabinet
9.1 Spaces and structures
9.1.1 General
9.1.2 Access control
9.1.2.1 General
9.1.2.2 Requirements
9.1.2.2.1 Open
9.1.2.2.2 Restricted
41 9.1.2.2.3 Secure
9.1.2.2.4 Highly secure
9.1.2.3 Recommendations
9.1.2.3.1 Open
9.1.2.3.2 Restricted
9.1.2.3.3 Secure
9.1.2.3.4 Highly secure
9.1.3 Intrusion resistance
9.1.3.1 Requirements
9.1.3.1.1 Open
9.1.3.1.2 Restricted
9.1.3.1.3 Secure
9.1.3.1.4 Highly secure
9.1.3.2 Recommendations
9.1.3.2.1 Open
9.1.3.2.2 Restricted
9.1.3.2.3 Secure
9.1.3.2.4 Highly secure
9.1.4 Monitoring
9.1.4.1 Requirements
9.1.4.1.1 Open
9.1.4.1.2 Restricted
9.1.4.1.3 Secure
9.1.4.1.4 Highly secure
9.1.4.2 Recommendations
42 9.1.4.2.1 Open
9.1.4.2.2 Restricted
9.1.4.2.3 Secure
9.1.4.2.4 Highly secure
9.2 Pathways
9.2.1 Access control
9.2.1.1 General
9.2.1.2 Requirements
9.2.1.2.1 Open
9.2.1.2.2 Restricted
9.2.1.2.3 Secure
9.2.1.2.4 Highly secure
9.2.1.3 Recommendations
9.2.1.3.1 Open
9.2.1.3.2 Restricted
9.2.1.3.3 Secure
9.2.1.3.4 Highly secure
9.2.2 Intrusion resistance
9.2.2.1 Requirements
9.2.2.1.1 Open
9.2.2.1.2 Restricted
9.2.2.1.3 Secure
9.2.2.1.4 Highly secure
9.2.2.2 Recommendations
9.2.2.2.1 Open
9.2.2.2.2 Restricted
9.2.2.2.3 Secure
9.2.2.2.4 Highly secure
9.2.3 Monitoring
9.2.3.1 Requirements
43 9.2.3.1.1 Open
9.2.3.1.2 Restricted
9.2.3.1.3 Secure
9.2.3.1.4 Highly secure
9.2.3.2 Recommendations
9.2.3.2.1 Open
9.2.3.2.2 Restricted
9.2.3.2.3 Secure
9.2.3.2.4 Highly secure
9.3 Infrastructure components
9.3.1 Access control
9.3.1.1 General
9.3.1.2 Terminating in cabinets
9.3.1.3 Patch panel separation
9.3.1.4 Highly Secure ports shall be exclusively located in their own cabinets, frames, or racks. Patch cord installation
9.3.1.5 Patch panel terminations
9.3.1.6 External cabinets
44 9.3.1.7 Inter-rack relationship
9.3.1.8 Requirements
9.3.1.8.1 Open
9.3.1.8.2 Restricted
9.3.1.8.3 Secure
9.3.1.8.4 Highly secure
45 9.3.1.9 Recommendations
9.3.1.9.1 Open
9.3.1.9.2 Restricted
9.3.1.9.3 Secure
9.3.1.9.4 Highly secure
9.3.2 Intrusion resistance
9.3.2.1 Requirements
9.3.2.1.1 Open
9.3.2.1.2 Restricted
9.3.2.1.3 Secure
9.3.2.1.4 Highly secure
9.3.2.2 Recommendations
9.3.2.2.1 Open
9.3.2.2.2 Restricted
9.3.2.2.3 Secure
9.3.2.2.4 Highly secure
9.3.3 Monitoring
9.3.3.1 Requirements
9.3.3.1.1 Open
9.3.3.1.2 Restricted
9.3.3.1.3 Secure
9.3.3.1.4 Highly secure
9.3.3.2 Recommendations
9.3.3.2.1 Open
9.3.3.2.2 Restricted
9.3.3.2.3 Secure
9.3.3.2.4 Highly secure
10 Cabling component containment
10.1 Spaces and structures
10.1.1 Access control
10.1.1.1 Requirements
10.1.1.1.1 Open
10.1.1.1.2 Restricted
10.1.1.1.3 Secure
10.1.1.1.4 Highly secure
10.1.1.2 Recommendations
10.1.1.2.1 Open
10.1.1.2.2 Restricted
10.1.1.2.3 Secure
10.1.1.2.4 Highly secure
10.1.2 Intrusion resistance
10.1.2.1 Requirements
46 10.1.2.1.1 Open
10.1.2.1.2 Restricted
10.1.2.1.3 Secure
10.1.2.1.4 Highly secure
10.1.2.2 Recommendations
10.1.2.2.1 Open
10.1.2.2.2 Restricted
10.1.2.2.3 Secure
10.1.2.2.4 Highly secure
10.1.3 Monitoring
10.1.3.1 Requirements
10.1.3.1.1 Open
10.1.3.1.2 Restricted
10.1.3.1.3 Secure
10.1.3.1.4 Highly secure
10.1.3.2 Recommendations
10.1.3.2.1 Open
10.1.3.2.2 Restricted
10.1.3.2.3 Secure
10.1.3.2.4 Highly secure
10.2 Pathways
10.2.1 Access control
10.2.1.1 General
10.2.1.2 Security conduit
10.2.1.2.1 General
47 10.2.1.2.2 Security conduit – optical fibre
10.2.1.2.3 Fibre-optic cable pathways
10.2.1.2.4 Protected Pathway System (PPS)
10.2.1.2.4.1 General
48 10.2.1.2.4.2 Outside outlets
10.2.1.2.4.3 Application
10.2.1.2.4.4 Level 1 PPS requirements
Level 1 PPS conduit
49 Level 1 PPS tray
Level 1 PPS installation
Level 1 PPS pull boxes
Level 1 PPS enclosures
Level 1 suspended PPS
Level 1 direct buried PPS
50 Level 1 underground PPS
Level 1 PPS monitoring
10.2.1.2.4.5 Level 2 PPS requirements
Level 2 PPS conduit
Level 2 PPS installation
Level 2 PPS pull boxes
Level 2 PPS enclosures
Level 2 suspended PPS
51 Level 2 direct buried PPS
Level 2 underground PPS
52 Level 2 PPS monitoring
53 10.2.1.2.5 Alarmed cable
10.2.1.2.6 Continuously viewed carrier
10.2.1.2.7 PPS distribution general
10.2.1.2.8 PPS outlet closures general
10.2.1.2.9 Wall finish
10.2.1.2.10 Wall penetrations
10.2.1.2.11 PPS termination
10.2.1.3 Cables in walls
54 10.2.1.4 Cables in shared walls
10.2.1.5 Wall penetrations
10.2.1.6 Pathway systems
10.2.1.6.1 General
10.2.1.6.2 Common pathway system
10.2.1.6.3 Enclosed pathway systems for multiorganizational facilities
55 10.2.1.7 Sealing PPS systems
10.2.1.8 Cable inspection
10.2.1.9 Security seals
10.2.1.10 Outside plant
10.2.1.10.1 Access pits
56 10.2.1.10.2 Building lead-in
10.2.1.10.3 Inter-building conduit
10.2.1.11 Requirements
10.2.1.11.1 Open
10.2.1.11.2 Restricted
10.2.1.11.3 Secure
10.2.1.11.4 Highly secure
10.2.1.12 Recommendations
57 10.2.1.12.1 Open
10.2.1.12.2 Restricted
10.2.1.12.3 Secure
10.2.1.12.4 Highly secure
10.2.2 Intrusion resistance
10.2.2.1 Requirements
10.2.2.1.1 Open
10.2.2.1.2 Restricted
10.2.2.1.3 Secure
10.2.2.1.4 Highly secure
10.2.2.2 Recommendations
10.2.2.2.1 Open
10.2.2.2.2 Restricted
10.2.2.2.3 Secure
10.2.2.2.4 Highly secure
10.2.3 Monitoring
10.2.3.1 Requirements
10.2.3.1.1 Open
10.2.3.1.2 Restricted
10.2.3.1.3 Secure
10.2.3.1.4 Highly secure
10.2.3.2 Recommendations
10.2.3.2.1 Open
10.2.3.2.2 Restricted
10.2.3.2.3 Secure
10.2.3.2.4 Highly secure
10.3 Infrastructure components
10.3.1 Access control
10.3.1.1 Requirements
10.3.1.1.1 Open
10.3.1.1.2 Restricted
10.3.1.1.3 Secure
10.3.1.1.4 Highly secure
10.3.1.2 Recommendations
10.3.1.2.1 Open
10.3.1.2.2 Restricted
10.3.1.2.3 Secure
10.3.1.2.4 Highly secure
10.3.2 Intrusion resistance
10.3.2.1 Requirements
58 10.3.2.1.1 Open
10.3.2.1.2 Restricted
10.3.2.1.3 Secure
10.3.2.1.4 Highly secure
10.3.2.2 Recommendations
10.3.2.2.1 Open
10.3.2.2.2 Restricted
10.3.2.2.3 Secure
10.3.2.2.4 Highly secure
10.3.3 Monitoring
10.3.3.1 Requirements
10.3.3.1.1 Open
10.3.3.1.2 Restricted
10.3.3.1.3 Secure
10.3.3.1.4 Highly secure
10.3.3.2 Recommendations
10.3.3.2.1 Open
10.3.3.2.2 Restricted
10.3.3.2.3 Secure
10.3.3.2.4 Highly secure
11 Cabling component
11.1 Spaces and structures
11.1.1 Access control
11.1.1.1 Requirements
11.1.1.1.1 Open
11.1.1.1.2 Restricted
11.1.1.1.3 Secure
11.1.1.1.4 Highly secure
11.1.1.2 Recommendations
11.1.1.2.1 Open
11.1.1.2.2 Restricted
11.1.1.2.3 Secure
11.1.1.2.4 Highly secure
11.1.2 Intrusion resistance
11.1.2.1 Requirements
11.1.2.1.1 Open
11.1.2.1.2 Restricted
11.1.2.1.3 Secure
11.1.2.1.4 Highly secure
11.1.2.2 Recommendations
59 11.1.2.2.1 Open
11.1.2.2.2 Restricted
11.1.2.2.3 Secure
11.1.2.2.4 Highly secure
11.1.3 Monitoring
11.1.3.1 Requirements
11.1.3.1.1 Open
11.1.3.1.2 Restricted
11.1.3.1.3 Secure
11.1.3.1.4 Highly secure
11.1.3.2 Recommendations
11.1.3.2.1 Open
11.1.3.2.2 Restricted
11.1.3.2.3 Secure
11.1.3.2.4 Highly secure
11.2 Pathways
11.2.1 Access control
11.2.1.1 Requirements
11.2.1.1.1 Open
11.2.1.1.2 Restricted
11.2.1.1.3 Secure
11.2.1.1.4 Highly secure
11.2.1.2 Recommendations
11.2.1.2.1 Open
11.2.1.2.2 Restricted
11.2.1.2.3 Secure
11.2.1.2.4 Highly secure
11.2.2 Intrusion resistance
11.2.2.1 Requirements
11.2.2.1.1 Open
11.2.2.1.2 Restricted
11.2.2.1.3 Secure
11.2.2.1.4 Highly secure
11.2.2.2 Recommendations
11.2.2.2.1 Open
11.2.2.2.2 Restricted
11.2.2.2.3 Secure
11.2.2.2.4 Highly secure
11.2.3 Monitoring
11.2.3.1 Requirements
60 11.2.3.1.1 Open
11.2.3.1.2 Restricted
11.2.3.1.3 Secure
11.2.3.1.4 Highly secure
11.2.3.2 Recommendations
11.2.3.2.1 Open
11.2.3.2.2 Restricted
11.2.3.2.3 Secure
11.2.3.2.4 Highly secure
11.3 Infrastructure components
11.3.1 Access control
11.3.1.1 General
11.3.1.2 Cable colours
11.3.1.3 Banding
61 11.3.1.4 Optical fibre cables
11.3.1.5 Telecommunications outlet box
11.3.1.6 Telecommunications outlet box colours
11.3.1.7 Telecommunications outlet box covers
11.3.1.8 Equipment cord installation
11.3.1.9 Cable patching
62 11.3.1.10 Requirements
11.3.1.10.1.1 General
Telecommunications outlet security. To minimise the impact of erroneous manipulation of connecting cables. As a minimum, the following port security shall be adopted:
11.3.1.10.1.2 Open
11.3.1.10.1.3 Restricted
11.3.1.10.1.4 Secure
11.3.1.10.1.5 Highly secure
11.3.1.11 Recommendations
11.3.1.11.1 Open
11.3.1.11.2 Restricted
11.3.1.11.3 Secure
11.3.1.11.4 Highly secure
11.3.2 Intrusion resistance
11.3.2.1 Requirements
11.3.2.1.1 Open
11.3.2.1.2 Restricted
11.3.2.1.3 Secure
11.3.2.1.4 Highly secure
11.3.2.2 Recommendations
11.3.2.2.1 Open
11.3.2.2.2 Restricted
11.3.2.2.3 Secure
11.3.2.2.4 Highly secure
11.3.3 Monitoring
11.3.3.1 Requirements
11.3.3.1.1 Open
11.3.3.1.2 Restricted
11.3.3.1.3 Secure
11.3.3.1.4 Highly secure
11.3.3.2 Recommendations
63 11.3.3.2.1 Open
11.3.3.2.2 Restricted
11.3.3.2.3 Secure
11.3.3.2.4 Highly secure
12 Administration
12.1 Reporting of cyber security incidents
12.2 Labelling
12.2.1 Conduit
12.2.2 Telecommunications outlet boxes
12.2.3 Cables
12.3 Documentation
64 12.4 Cable auditing
65 12.5 Monitor the system
12.6 Security documentation
12.6.1 General
12.6.2 System security plan
12.6.3 Incident response plan
66 12.7 Security assessment report
12.8 Training
12.9 Security clearances
12.10 Access requirements
67 13 Evolution of security systems
68 Annex A (normative)Free standing barriers
69 Annex B (normative)Video surveillance
B.1 Requirements
B.1.1 Cabling, pathways and spaces
B.1.2 Cameras
B.1.3 1Monitoring
B.2 Recommendations
B.2.1 1Pathways
B.2.2 Cameras
70 B.2.3 19BMonitoring
71 Annex C (normative)Intrusion detection
C.1 Requirements
C.1.1 Cabling, pathways and spaces
C.1.2 2Deployment
C.1.2.1 System independence
C.1.2.2 Power supply
C.1.2.3 Sensors and keypads
72 C.1.2.4 39BAlarmed carrier cable systems
C.1.3 BMonitoring
C.1.4 2Documentation
C.1.5 2Operation
D.1.2.1 System independence
73 Annex D (normative)Access control
D.1 Requirements
D.1.1 Cabling, pathways and spaces
D.1.2 Deployment
D.1.2.2 Power supply
D.1.2.3 System components
D.1.2.3.1 General
74 D.1.2.3.2 Request-to-exit devices
D.1.2.3.3 Door contacts
D.1.2.3.4 Electric strike or latch
D.1.2.3.5 Dialler units
D.2 Recommendations
D.2.1 Planning
D.2.2 Pathways
75 Annex E (normative)Management of personnel
E.1 Requirements
E.1.1 3Employees and other authorized personnel
E.1.2 Staffed guarding
76 E.1.3 Visitors
E.1.4 Deliveries
E.2 Recommendations
E.2.1 Visitors
E.2.2 Deliveries
77 Bibliography
BSI 22/30455865 DC 2022
$13.70