Back

Run primary power lines and secondary power lines via diverse path feeds to organizational facilities, as necessary.


CONTROL ID
06696
CONTROL TYPE
Configuration
CLASSIFICATION
Preventive

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Install and maintain redundant power supplies for critical facilities., CC ID: 06355

There are no implementation support Controls.


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • Underground cables are usually used as lead-in wires for communication and power lines to a computer center. Even though conduits within the site of a computer center are usually installed by financial institutions, the lead-in cables are laid by telephone companies and power companies. Therefore, i… (F9.2. ¶ 1, FISC Security Guidelines on Computer Systems for Financial Institutions, Ninth Edition, Revised March 2020)
  • In order to ensure the security of a computer system, it is necessary to take measures to protect communication and power lines within the site of the computer center from breakage and the spread of fire, which could possibly be caused as a result of wires running over gas or water pipes, or by an i… (F9.1., FISC Security Guidelines on Computer Systems for Financial Institutions, Ninth Edition, Revised March 2020)
  • To protect the terminal devices and other fixtures against interference, it is necessary to install power cables directly from the distribution board, or to install the power cable properly so as not to be adversely affected by other equipment. (F107.1. ¶ 1, FISC Security Guidelines on Computer Systems for Financial Institutions, Ninth Edition, Revised March 2020)
  • Power cables to critical facilities (including locations that house computer systems, such as data centers, networks, telecommunication equipment, sensitive physical material, and other important assets) should be protected by concealed installation. (CF.19.02.01b, The Standard of Good Practice for Information Security)
  • Power cables to critical facilities (including locations that house computer systems, such as data centers, networks, telecommunication equipment, sensitive physical material, and other important assets) should be protected by concealed installation. (CF.19.02.01b, The Standard of Good Practice for Information Security, 2013)
  • Do the physical security and environmental controls present in the building / data centers that contain scoped systems and data include multiple power lines run through diverse path feeds? (§ F.1.2.22, Shared Assessments Standardized Information Gathering Questionnaire - F. Physical and Environmental, 7.0)
  • Does the data center that contains scoped systems and data include include multiple power lines run through diverse path feeds? (§ F.2.10, Shared Assessments Standardized Information Gathering Questionnaire - F. Physical and Environmental, 7.0)
  • The organization employs redundant power cabling paths that are physically separated by [Assignment: organization-defined distance]. (PE-9(1) ¶ 1 Moderate Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
  • The organization employs redundant power cabling paths that are physically separated by [Assignment: organization-defined distance]. (PE-9(1) ¶ 1 High Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
  • The organization employs redundant power cabling paths that are physically separated by {organizationally documented distance}. (PE-9(1), Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Deprecated, Revision 4, Deprecated)
  • The organization employs redundant power cabling paths that are physically separated by [Assignment: organization-defined distance]. (PE-9(1) ¶ 1, Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Revision 4)
  • Employ redundant power cabling paths that are physically separated by [Assignment: organization-defined distance]. (PE-9(1) ¶ 1, Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5)
  • Employ redundant power cabling paths that are physically separated by [Assignment: organization-defined distance]. (PE-9(1) ¶ 1, Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5.1.1)