Queensland Government Information Security Controls Standard
Queensland Government Information Security Controls Standard
Queensland Government Information Security Controls Standard
PUBLIC
Document details
Security classification PUBLIC
Acknowledgements
This version of the Queensland Government Information Security Controls Standard was
developed and updated by the ICT Policy and Coordination Office.
Feedback was also received from a number of agencies, including members of the Information
Security Reference Group, which was greatly appreciated.
Copyright
Queensland Government Information Security Controls Standard
Copyright © The State of Queensland (Department of Public Works) 2010
Licence
Information security
This document has been security classified using the Queensland Government Information
Security Classification Framework (QGISCF) as PUBLIC and will be managed according to the
requirements of the QGISCF.
Contents
1 Introduction............................................................................................................................ 1
1.1 Purpose .......................................................................................................................... 1
1.2 Audience ........................................................................................................................ 1
1.3 Scope ............................................................................................................................. 1
Tables
Table 1: Manual transmission requirements ..................................................................................... 6
Table 2: Data transmission requirements ......................................................................................... 6
Table 3: Description of security areas............................................................................................. 10
Table 4: Minimum security container requirements ........................................................................ 11
Table 5: Security container definitions ............................................................................................ 11
Table 6: Secure room definitions .................................................................................................... 11
Table 7: Levels of auditing required for classified information assets............................................. 13
Table 8: Facsimile transmission measures..................................................................................... 13
Table 9: PSM standard file colours ................................................................................................. 15
1 Introduction
1.1 Purpose
This standard specifies the controls that must be applied to Queensland Government
information assets. It complements the Queensland Government Information Security
Classification Framework (QGISCF), and is also related to the Network Transmission
Security Assurance Framework (NTSAF) which provides greater detail on the controls
required to transmit security classified information assets.
1.2 Audience
This document is primarily intended for agency staff who:
handle information assets
develop information security policy and procedures.
1.3 Scope
The controls outlined in this document apply to information assets held by Queensland
Government agencies. Where information assets have been classified using alternative
classification schemes (such as the national security classification approach), the controls
specified by those schemes take precedence and should be applied.
Where there is a mismatch between advice provided by various documents, the most
stringent control should be applied.
2 General controls
As well as the specific controls contained in the QGISCF, the following controls need to be
applied to all information assets, regardless of their security classification.
2.1 Need-to-know
The need-to-know principle requires that information assets held by an agency should only
be available to those who need to use or access them to do their work. However, the need-
to-know principle must not inhibit access to information assets under legislation such as the
Right to Information Act 2009.
The dissemination of information assets must be no wider than is required for the efficient
conduct of business and it is the personal responsibility of all those who use or access
information assets, including unclassified assets, to apply the need-to-know principle to
their duties. It is the responsibilities of agencies to determine need-to-know designations for
staff. Personal information is also subject to legislative constraints and any confidentiality
provisions that apply to individual agencies.
Agencies typically implement a need-to-know approach to information asset access through
a combination of access control on applications and the implementation of both individual
and work-unit based security mechanisms for file servers.
Generic Queensland Government coloured and printed folders have been sourced by some
agencies and are therefore available for purchase. Where agencies have other
requirements that preclude the use of the standard colour file covers, agencies should
ensure that an appropriate standard is adopted within the agency. File cover sheets should
also be used for all physical files, and standard cover sheets have been developed in
support of this framework.
The Australian Government Protective Security Policy Framework (PSPF) (which as
superseded the Australian Government Protective Security Manual) recommends that the
security classification should be in capital letters, in bold text, and of a minimum height of
5mm, preferably at the centre of the top and bottom of each page. Additionally where
possible it is preferable for the markings to be in red (ARIAL, 20 point, bold and red is an
appropriate format). Page numbering of the form ‘Page n of x’ is desirable for all
classifications and mandatory for HIGHLY PROTECTED.
Markings for PUBLIC and UNCLASSIFIED documents should also be in capitals, bold and
red, but may be in a smaller size font if required. Because of the possibility of confusion
with information assets that have yet to be information security classified, acceptable
markings for UNCLASSIFIED documents are:
UNCLASSIFIED
INTERNAL-USE-ONLY or
a combination UNCLASSIFIED–INTERNAL-USE-ONLY.
A domain can also be added if this is appropriate and would assist such as ‘AGENCY-
INTERNAL-USE-ONLY’ or ‘GOVERNMENT-INTERNAL-USE-ONLY’.
Methods of destruction
Security classified material may be disposed of by:
pulping: transforming used paper into a moist, slightly cohering mass, from which new
paper products will be made
burning: (in accordance with relevant environment protection restrictions)
pulverisation: using hammermills with rotating steel hammers to pulverise the material
disintegration: using blades to cut and gradually reduce the waste particle to a given
size determined by a removable screen
shredding: using cross-cut shredders. Where the disposal method is shredding,
classified material should be destroyed using a cross-cut shredder that reduces waste
to a particle size of 2.3mm x 25mm or less (B Class Shredder).
1
unless the information asset is subject to recordkeeping requirements as outlined in sections 2.6.
Table 2 summarises the protocols for data transmission of security classified information
assets. See the NTSAF for further guidance.
UNCLASSIFIED May use internal or external networks including the internet with controls
as specified by the NTSAF.
HIGHLY PROTECTED May be passed over appropriately classified internal networks as defined
in the NTSAF.
Must be encrypted when being sent between agencies using
cryptographic protocols 2 as specified by the NTSAF.
to-know and that the risk of compromise of these assets is minimised by ensuring seating
arrangements preclude the possibility of the information assets be viewed without proper
authority.
Where meetings are held, the security classification of the information asset should be
notified to the audience and the audience reminded of their responsibility to maintain
confidentiality.
Visual aids such as slides and overhead transparencies should include the appropriate
security classification markings and should be removed at the conclusion of the meeting,
including deleting the presentation from corporate resources such as laptops. This includes
deleting documents from the Recent Documents list, deleting any HTML pages from the
browser history and emptying the Recycle bin.
Any security classified information assets placed on whiteboards should be erased with a
suitable cleaner prior to the room being vacated.
additional distribution should be provided and the owner should indicate the appropriate
copy numbers.
Copiers and printers should not be left unattended if classified information assets are being
reproduced unless there are suitable physical access controls to prevent unauthorised
persons (including those without a need-to-know) from both entering the area around the
copier or printer, and viewing the material being printed.
2
In the context of this framework, media is the component of computer hardware that is used to store information.
Secure Area
A Secure Area is one that provides the highest integrity of access to, and audit of, security
classified information assets to ensure restricted distribution and to assist in subsequent
investigation if there is unauthorised disclosure or loss of information assets. The essential
physical security features of a Secure Area include:
appropriately secured points of entry and other openings
tamper-evident barriers, highly resistant to covert entry
an effective means of providing access control during both operational and non-
operational hours all persons to wear passes
all visitors escorted at all times
during non-operational hours a monitored security alarm system, providing coverage
for all areas where security classified information assets are stored
an approved means of limiting entry to authorised persons.
An effective means of providing access control during both Yes Yes Yes
operational and non-operational hours
The standard and combination of the measures should be in keeping with the highest level
of security classified information assets protected in the area. The measures must ensure
that the less effort and time required to gain access to the information asset, the quicker the
detection and response must be to the security incident. Conversely, the better the physical
security barriers protecting the information asset, the greater the time can be allowed for
the detection and response to the security incident.
3
Such barriers provide containment in all directions. They have enough resistance to covert entry to provide some
assurance that a person attempting to gain unauthorised entry and exit without being apprehended would have to
damage or modify the barriers so that it was obvious that a security incident had occurred.
4
The Australian Government specifies appropriate containers in its Security Equipment Catalogue (SEC) which is
managed by the Australian Security Intelligence Organisation (ASIO).
Class A secure room A room constructed and secured in accordance with ASIO
specifications – note that doors are fitted with two endorsed
combination locks; for further information, refer to the Security
Equipment Catalogue.
Class B secure room A room constructed and secured in accordance with ASIO
specifications – note that doors are fitted with one endorsed
combination lock; for further information, refer to the Security
Equipment Catalogue.
Class C secure room A room constructed and secured in accordance with ASIO
specifications and locked using one lock endorsed for the protection of
national security classification information; for further information, refer
to the Security Equipment Catalogue.
5
A lockable container with a Security Construction & Equipment Committee (SCEC) endorsed lock is also acceptable.
CONFIDENTIAL Green