Back

Encase network cabling in conduit or closed cable reticulation systems, as necessary.


CONTROL ID
08647
CONTROL TYPE
Physical and Environmental Protection
CLASSIFICATION
Preventive

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Establish, implement, and maintain a physical security program., CC ID: 11757

This Control has the following implementation support Control(s):
  • Install conduit on walls connecting to network cable outlet boxes, as necessary., CC ID: 08646
  • Seal data conduit couplings and data conduit fitting bodies., CC ID: 08629
  • Install cable reticulation systems as close to the network cabinets as possible., CC ID: 08642


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • To protect the lines against failure and crime and also interference from power cables and other cables, it is recommended to install the lines in a dedicated cabling space. (F83-1.1., FISC Security Guidelines on Computer Systems for Financial Institutions, Ninth Edition, Revised March 2020)
  • The wall outlet box colours in the following table are used. TOP SECRET Red; SECRET Salmon pink; PROTECTED Any colour (except red or salmon pink); OFFICIAL Any colour (except red or salmon pink). (Security Control: 1107; Revision: 4, Australian Government Information Security Manual, March 2021)
  • In shared government facilities, where wall penetrations exit into a lower classified space, cables are encased in conduit with all gaps between the conduit and the wall filled with an appropriate sealing compound. (Security Control: 1122; Revision: 1, Australian Government Information Security Manual, March 2021)
  • In shared non-government facilities, where wall penetrations exit into a lower classified space, cables are encased in conduit with all gaps between the conduit and the wall filled with an appropriate sealing compound. (Security Control: 1134; Revision: 1, Australian Government Information Security Manual, March 2021)
  • Cables from cable trays to wall outlet boxes are run in flexible or plastic conduit. (Control: ISM-1115; Revision: 4, Australian Government Information Security Manual, June 2023)
  • In shared facilities, cables are run in an enclosed cable reticulation system. (Control: ISM-1130; Revision: 4, Australian Government Information Security Manual, June 2023)
  • In shared facilities, conduits or the front covers of ducts, cable trays in floors and ceilings, and associated fittings are clear plastic. (Control: ISM-1164; Revision: 3, Australian Government Information Security Manual, June 2023)
  • If TOP SECRET fibre-optic fly leads exceeding five metres in length are used to connect wall outlet boxes to ICT equipment, they are run in a protective and easily inspected pathway that is clearly labelled at the ICT equipment end with the wall outlet box's identifier. (Control: ISM-0218; Revision: 6, Australian Government Information Security Manual, June 2023)
  • Where wall penetrations exit a TOP SECRET area into a lower classified area, TOP SECRET cables are encased in conduit with all gaps between the TOP SECRET conduit and the wall filled with an appropriate sealing compound. (Control: ISM-1122; Revision: 2, Australian Government Information Security Manual, June 2023)
  • Cables from cable trays to wall outlet boxes are run in flexible or plastic conduit. (Control: ISM-1115; Revision: 4, Australian Government Information Security Manual, September 2023)
  • In shared facilities, cables are run in an enclosed cable reticulation system. (Control: ISM-1130; Revision: 4, Australian Government Information Security Manual, September 2023)
  • In shared facilities, conduits or the front covers of ducts, cable trays in floors and ceilings, and associated fittings are clear plastic. (Control: ISM-1164; Revision: 3, Australian Government Information Security Manual, September 2023)
  • If TOP SECRET fibre-optic fly leads exceeding five metres in length are used to connect wall outlet boxes to ICT equipment, they are run in a protective and easily inspected pathway that is clearly labelled at the ICT equipment end with the wall outlet box's identifier. (Control: ISM-0218; Revision: 6, Australian Government Information Security Manual, September 2023)
  • Where wall penetrations exit a TOP SECRET area into a lower classified area, TOP SECRET cables are encased in conduit with all gaps between the TOP SECRET conduit and the wall filled with an appropriate sealing compound. (Control: ISM-1122; Revision: 2, Australian Government Information Security Manual, September 2023)
  • Cabling should be encased in conduit when it penetrates a wall that exits into a space at a lower classification level and all gaps between the conduit and the wall are filled with an appropriate sealing compound in facilities where the facility and personnel are cleared at different levels. (Control: 1122, Australian Government Information Security Manual: Controls)
  • Cabling should be run in enclosed cable reticulation systems in facilities where the facility is shared by government organizations and non-government organizations. (Control: 1130, Australian Government Information Security Manual: Controls)
  • Cabling must be run in an enclosed cable reticulation system in top secret areas in facilities where the facility is shared by government organizations and non-government organizations. (Control: 1131, Australian Government Information Security Manual: Controls)
  • The organization must use plastic conduit or flexible conduit to run the cabling in the walls from the cable trays to the wall outlets in facilities where the facility is shared by government organizations and non-government organizations. (Control: 1132, Australian Government Information Security Manual: Controls)
  • Top secret cabling must be encased in conduit when it penetrates a wall that exits into a space at a lower classification level and all gaps between the conduit and the wall are filled with an appropriate sealing compound in facilities where the facility is shared by government organizations and non… (Control: 1134, Australian Government Information Security Manual: Controls)