PSPF Policy15 Physical Security For Entity Resources
PSPF Policy15 Physical Security For Entity Resources
A. Purpose
1. This policy describes the physical protections required to safeguard people (consistent with the
requirements of the Work Health and Safety Act 2011), information and assets (including ICT equipment) to
minimise or remove security risk.
B. Requirements
B.1 Core requirement
Each entity must implement physical security measures that minimise or remove the risk
of:
a. harm to people, and
b. information and physical asset resources being made inoperable or inaccessible,
or being accessed, used or removed without appropriate authorisation.
i
Information compromise is defined in PSPF policy: Sensitive and classified information.
C. Guidance
C.1 Identifying resources
3. ‘Resources’ is the collective term for people, information and assets that entities use in their operations.
PSPF policy: Security planning and risk management requires entities to identify the people, information
and assets that are critical to the ongoing operation of the entity and the national interest and apply
appropriate protections to support core government business.
C.1.1 People
4. An entity’s personnel, including contractors, are central to its operations, and require protection. The WHS
Act provides the framework to safeguard the health and safety of workers and workplaces.
5. Protective security elements of the WHS Act framework and other appropriate legislative frameworks
include:
a. identifying, protecting and supporting employees under threat of violence, based on a threat and
risk assessment of specific situations
b. reporting incidents to management, human resources, security and law enforcement authorities, is
encouraged as appropriate
c. providing information, training and counselling to employees
d. maintaining thorough records and statements on reported incidents.
6. To support compliance with the WHS Act, the Department of Home Affairs recommends entities
implement appropriate physical security measures to ensure the personal security of their personnel, while
working in the office and away from the office. Refer to PSPF policy: Entity facilities.
C.1.2 Information
7. Information is a valuable resource and requires protection. PSPF policy: Sensitive and classified information
details policy and guidance on classification and handling arrangements for protecting information
resources.
b. Classified - the asset is classified in its own right or is classified due to the confidentiality
requirements of the information held on the asset, for example ICT equipment
c. Important - the significance of the asset’s integrity or availability for the entity’s operations
d. Attractive - the asset is not necessarily valuable but is desired, for example an iPad
e. Significant - the asset has cultural or national significance, regardless of monetary value
f. Dangerous - the asset’s likelihood to inflict harm, for example weapons or chemical, biological,
radiological and nuclear hazards.
10. The protections required for, and that can effectively be applied to, different physical assets will be
affected by the category of asset and the business impact level of the compromise, loss or damage of the
asset, as described below.
16. Once the entity has assessed the business impact level of the compromise, loss or damage of identified
resources, entities establish the commensurate security measures required to achieve effective protection
by considering the type, quantity and size of the resources to be protected. When determining the physical
security measures required to protect entity resources, the Department of Home Affairs recommends that
entities also consider that the cost of the security measures is proportionate to the mitigation of the
identified risks within the entity’s agreed risk tolerance.
C.2.1 Determining the level of physical security measures for the protection of physical
assets
17. Categorising physical assets can support entities to identify and consider factors that are relevant to
assessing the business impact level of the compromise, loss or damage of the asset—factors that could
influence that assessment might include, for example, the desirability of the asset or its level of
classification. In turn, this will assist in determining the level and types of protection to apply.
18. Table 2 describes the categories of assets and provides a number of factors to consider when assessing and
determining the business impact level of the compromise, loss or damage of those types of asset.
Table 2 Categories of assets and factors to consider when assessing and determining business impact levels
Asset category Factors to consider when assessing and determining business impact levels
Valuable assets a. The financial viability and lead-time to replace or repair the asset.
b. The capability of the entity to operate without the asset or with partial functionality of the asset.
c. The percentage of overall capability to which the asset contributes.
Classified a. The level of classification of the asset.
assets b. The mobility and accessibility of the classified asset, for example, heavy military equipment.
c. For assets classified due to the confidentiality requirements of information they hold, see the PSPF
policy: Sensitive and classified information, business impact level tool that provides examples of
potential damage due to compromise of information.
Important a. The integrity of the asset, for example, data with no classification such as human resources data or
assets geographical data for aviation.
b. The availability of the asset for example a ground transport fleet or firefighting equipment.
Attractive a. The desirability of the asset related to its function, for example a physical asset holding
assets information that may be attractive to a foreign adversary.
b. Portable assets that are desirable, regardless of the information stored on them, for example an
iPad.
Significant a. The intrinsic value to the national identity.
assets b. The negative reputational effect of the loss or damage of the asset.
Dangerous a. The bulk stores of weapons, such as firearms, explosives and ammunition.
assets b. The quantities of hazardous materials that could be weaponised or used to cause harm.
19. The Department of Home Affairs recommends that entities determine the business impact level of the
compromise, loss or damage of the asset in accordance with Table 2 and adopts the necessary security
1
Prior versions of the PSPF included the business impact level of ‘significant business impact’. For reference, this level (3A) is
provided at Annex A.
measures to protect the asset for the highest assessed business impact level noting that any Business
Impact Level for confidentiality will require application of a security classification.
20. By way of an example, in considering a human resources database, an entity may determine that the
information it holds does not warrant classification as the business impact level of the compromise of its
confidentiality is assessed as medium. However, the information the database holds is essential to the
business operations of the entity which indicates that the most relevant categorisation of the database may
be as an important asset. By considering the factors relevant to important assets and the integrity and
availability of the asset, the entity may determine that the business impact level in relation to compromise
of its integrity and availability would be extreme. In this instance the information within the database
would be marked and handled as Official: Sensitive. However, due to the higher business impact level of
the database, it would have greater protections applied to ensure integrity of the information and
availability of the database.
26. SCEC only considers the security aspects of products when evaluating suitability for use in government.
Other aspects like the products or safety features, are not considered by SCEC. The Department of Home
Affairs recommends that entities consider safety requirements prior to product selection.
33. Safes and vaults can be fire resistant (to protect documents or data), burglar resistant or a combination of
the two. The Department of Home Affairs recommends entities seek advice from qualified locksmiths or
manufacturers when deciding the criteria to apply to select commercial safes and vaults. Guidance is also
available in Australian Standard 3809 Safes and strongrooms and ASIO-T4 Security Equipment Guide SEG-
022 Safes—Protection of Assets from the protective security policy community on GovTEAMS (for
Australian Government security personnel only).
34. Table 3 sets out the minimum commercial safe and vault requirements in the applicable zones based on
the business impact level of the compromise, loss or damage to physical assets that are not classified or do
not hold any classified information.
Table 3 Selecting commercial safes and vaults to protect physical assets, other than classified assets
Business impact 1 Low business 2 Low to medium 3 High business 4 Extreme 5 Catastrophic
level impact business impact impact business impact business impact
Zone One Determined by an Determined by an AS 3809 AS 3809 high Not to be held
entity risk entity risk commercial safe security safe or unless
assessment, assessment, or vault. vault. unavoidable.
locked commercial safe
commercial or vault
container recommended.
recommended.
Zone Two Determined by an Determined by an Commercial safe AS 3809 medium Not to be held
entity risk entity risk or vault. security safe or unless
assessment, assessment. vault unavoidable.
locked recommended.
commercial
container
recommended.
Zone Three Determined by an Determined by an Determined by an AS 3809 AS 3809 high or
entity risk entity risk entity risk commercial safe very high security
assessment. assessment. assessment, or vault safe or vault
commercial safe recommended. recommended.
or vault
recommended.
Zone Four Determined by an Determined by an Determined by an Commercial safe AS 3809 medium
entity risk entity risk entity risk or vault or high security
assessment. assessment. assessment. recommended. safe or vault
recommended.
Zone Five Determined by an Determined by an Determined by an Commercial safe AS 3809 medium
entity risk entity risk entity risk or vault or high security
assessment. assessment. assessment recommended. safe or vault
recommended.
35. The Department of Home Affairs recommends that entities implement other physical controls that give the
same level of intrusion resistance and delay where physical assets cannot be secured in commercial safes
and vaults. These physical controls may include individual item alarms, alarm circuits or additional out-of-
hours guarding.
48. To provide protection for sensitive or classified discussions, it is necessary for the sound created within the
room to be unintelligible to a person or device located outside that room. Appropriate and effective sound
insulation is critical to achieving the required level of security for sensitive and classified discussions as it is
extremely difficult for an entity to ensure that only low-volume voice levels are used for sensitive and
classified discussions or that background noise will always exist in the receiving area.
49. When designing an audio secure room suitable for security classified discussions, the Department of Home
Affairs recommends entities consider a number of factors that may influence the specification and
construction techniques used. These include:
a. the sensitivity and classification of information being discussed
b. the regularity of discussions.
50. Consistent with the core PSPF requirement for entity facilities, the Department of Home Affairs
recommends entities consider the need to conduct sensitive or classified discussions throughout the
process of planning, selecting, designing and modifying their facilities, to ensure the required physical
security measures can be accommodated with the facilities. For guidance see the ASIO Technical Note 1/15
– Physical Security of Zones, Section 16: Audio Security.
51. It may be operationally critical to hold security classified conversations where an audio secure room is not
available. The Department of Home Affairs recommends that these conversations are not held in public
places or where the conversation may be overheard, for example hire cars, hotel rooms, airport lounges,
aeroplanes or cafes.
58. The PSPF policy: Entity facilities includes requirements and guidance on the location, certification and
accreditation of ICT facilities to achieve the appropriate level of protection commensurate with the
business impact level of the loss, compromise or damage of the information and ICT equipment housed in
an entity’s ICT facilities.
C.5.1.2 Security of ICT equipment that cannot be kept in ICT facilities, security containers or secure rooms
when not in use
62. Where an entity is unable to secure ICT equipment (eg desktops computers, printers and multifunctional
devices) in an ICT facility, container or secure room when not in use or unattended, the Department of
Home Affairs recommends:
a. storage of removable non-volatile media (hard drives) in an appropriate security container
b. storage of ICT equipment where the non-volatile media cannot be removed in an appropriate
security zone
c. seek advice from the Australian Signals Directorate (ASD) about additional logical or technological
solutions available to lower the risk of compromise of ICT equipment and its information.
63. Table 5 sets out the recommended physical security zones for ICT equipment that cannot be held in a
security container or secure room when not in use or unattended. Recommended security zones are based
on the identified business impact level of the compromise of the information available on the ICT
equipment.
Table 4 Business Impact Level and zone requirement for ICT equipment when not in use that cannot be held in a security container or
security room
Business impact 1 Low business 2 Low to medium 3 High business 4 Extreme 5 Catastrophic
level of impact business impact impact business impact business impact
aggregated
electronic
information
Minimum Zone Two or as Zone Two or as Zone Three or as Zone Three or Zone Five unless
security zone determined by an determined by an determined by an above unless additional logical
required entity risk entity risk entity risk additional logical controls are
assessment. assessment. assessment. controls are applied to lower
applied to lower the risks to a level
the risks to a level acceptable to the
acceptable to the originating entity
entity. of the
information.
be lowered in accordance with the Australian Government Information Security Manual (ISM). For
information on protection of network infrastructure see the PSPF policy: Robust ICT systems.
67. Tampering of network infrastructure is a security risk. The Department of Home Affairs recommends
entities secure network infrastructure equipment, such as patch panels, fibre distribution panels and
structured wiring enclosures in containers and secure rooms. Where this is not possible it is recommended
that entities meet system encryption requirements set out in the ISM.
76. It may not be possible to apply suitable physical security measures to satisfy a higher security zone
requirement for mobile computing and communications. Entities may need to rely on administrative and
ICT logical security controls to protect their information and assets. Refer to the ISM for logical controls.
C.8.2 Teleworking
77. Teleworking allows personnel to work away from the office facilities and from alternate locations.
Teleworking requires using remote ICT systems in fixed locations such as:
a. working from personal residences on a regular basis, and
b. working from an alternative office space:
i. within entity facilities in another location—for example regional sites
ii. located in another Australian, state or territory government entity’s facilities
iii. provided to the entity in premises where the entity has some capability to provide protective
security, for example offices operated by an entity’s client or by a service provider contracted
by the entity.
78. Without significant modifications to the teleworking site many teleworking locations will meet Zone Two
physical security requirements.
C.8.3.1 Physical security of official information in facilities not managed by the entity
82. It may be difficult to secure entity information when the working environment is not controlled or
managed by the entity. For example the work environment is:
a. located inside commercial facilities or in private client facilities for which the entity is providing
services
b. the private residence of the entity’s personnel
c. the facility of an industry providing services to the entity to collect, use and/or store official
information or other security protected Commonwealth resources.
83. The Department of Home Affairs recommends entities treat any non-Australian Government facilities as
Zone One areas for storage and/or use of Commonwealth information and assets unless the entity has:
a. full control over the work space occupied by their personnel in commercial and client facilities
b. confirmed appropriate physical and procedural security measures are in place for a higher level
zone.