ISM-0505

Cryptographic equipment is stored in a room that meets the requirements for a server room based on the sensitivity or classification of the data the cryptographic equipment processes.

Topic
Storing cryptographic equipment
Applicable to
all

History

Priority
should
Dec 2021
Removed
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
2017
Cryptographic equipment should be stored in a room that meets the requirements for a serverroom of an appropriate level, based on the sensitivity or classification of the information thecryptographic system processes.
Control Text Changed. No public explaination.
2015
Cryptographic equipment should be stored in a room that meets the requirements for aserver room of an appropriate level based on the sensitivity or classification of informationthe cryptographic system processes.
2010
Cryptographic equipment should be stored in a room that meets the requirements for a server room ofan appropriate level based on the classification of information the cryptographic system processes.
2008
Cryptographic system equipment should be stored in a room that meets the requirements for a server room of an appropriate level based on the classification of information the system processes.