{"id":403518,"date":"2024-10-20T05:06:27","date_gmt":"2024-10-20T05:06:27","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-22-30455865-dc-2022\/"},"modified":"2024-10-26T09:06:47","modified_gmt":"2024-10-26T09:06:47","slug":"bsi-22-30455865-dc-2022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-22-30455865-dc-2022\/","title":{"rendered":"BSI 22\/30455865 DC 2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
3<\/td>\nHORIZONTAL_STD
FUNCTION_EMC
FUNCTION_ENV
FUNCTION_QUA
FUNCTION_SAFETY <\/td>\n<\/tr>\n
5<\/td>\nB.2.4 19BSecurity lighting <\/td>\n<\/tr>\n
7<\/td>\nFOREWORD <\/td>\n<\/tr>\n
8<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
10<\/td>\n3 Definitions and abbreviations
3.1 Definitions <\/td>\n<\/tr>\n
12<\/td>\n3.2 Abbreviations <\/td>\n<\/tr>\n
13<\/td>\n4 Conformance
5 Principles
5.1 General
5.2 Relationship with ISO\/IEC 27000 series
5.3 Risk assessment concepts
5.3.1 General <\/td>\n<\/tr>\n
14<\/td>\n5.3.2 Information sensitivity levels
5.4 Defence in depth
5.4.1 General <\/td>\n<\/tr>\n
15<\/td>\n5.4.2 Public perimeter
5.4.3 Organizational perimeter <\/td>\n<\/tr>\n
16<\/td>\n5.4.4 Equipment\/distributor room
5.4.5 Rack\/cabinet
5.4.6 Cabling component containment <\/td>\n<\/tr>\n
17<\/td>\n5.4.7 Cabling component
5.5 Network infrastructure
5.6 Controlling access
5.7 Physical access to cabling should be minimized to avoid threats. Perimeters and spaces
5.7.1 General
5.7.2 Area and room relationships
5.7.2.1 General <\/td>\n<\/tr>\n
18<\/td>\n5.7.2.2 Example: solution one
5.7.2.3 Example: solution two <\/td>\n<\/tr>\n
19<\/td>\n5.7.2.4 Example: solution three <\/td>\n<\/tr>\n
20<\/td>\n5.7.3 Unauthorized observation
5.7.4 Security treatments and controls <\/td>\n<\/tr>\n
21<\/td>\n5.8 Threat <\/td>\n<\/tr>\n
22<\/td>\n6 Public perimeter
6.1 General
6.2 Spaces and structures
6.2.1 Access control
6.2.1.1 Requirements
6.2.1.1.1 Open
6.2.1.1.2 Restricted
6.2.1.1.3 Secure
6.2.1.1.4 Highly secure
6.2.1.2 Recommendations
6.2.1.2.1 Open
6.2.1.2.2 Restricted
6.2.1.2.3 Secure
6.2.1.2.4 Highly secure
6.2.2 Intrusion resistance
6.2.2.1 Requirements
6.2.2.1.1 Open
6.2.2.1.2 Restricted
6.2.2.1.3 Secure
6.2.2.1.4 Highly secure
6.2.2.2 Recommendations
6.2.2.2.1 Open
6.2.2.2.2 Restricted
6.2.2.2.3 Secure
6.2.2.2.4 Highly secure
6.2.3 Monitoring
6.2.3.1 Requirements
6.2.3.1.1 Open
6.2.3.1.2 Restricted
6.2.3.1.3 Secure <\/td>\n<\/tr>\n
23<\/td>\n6.2.3.1.4 Highly secure
6.2.3.2 Recommendations
6.2.3.2.1 Open
6.2.3.2.2 Restricted
6.2.3.2.3 Secure
6.2.3.2.4 Highly secure
6.3 Pathways
6.3.1 Access control
6.3.1.1 Requirements
6.3.1.1.1 Open
6.3.1.1.2 Restricted
6.3.1.1.3 Secure
6.3.1.1.4 Highly secure
6.3.1.2 Recommendations
6.3.1.2.1 Open
6.3.1.2.2 Restricted
6.3.1.2.3 Secure
6.3.1.2.4 Highly secure
6.3.2 Intrusion resistance
6.3.2.1 Requirements
6.3.2.1.1 Open
6.3.2.1.2 Restricted
6.3.2.1.3 Secure
6.3.2.1.4 Highly secure
6.3.2.2 Recommendations
6.3.2.2.1 Open
6.3.2.2.2 Restricted
6.3.2.2.3 Secure
6.3.2.2.4 Highly secure
6.3.3 Monitoring
6.3.3.1 Requirements <\/td>\n<\/tr>\n
24<\/td>\n6.3.3.1.1 Open
6.3.3.1.2 Restricted
6.3.3.1.3 Secure
6.3.3.1.4 Highly secure
6.3.3.2 Recommendations
6.3.3.2.1 Open
6.3.3.2.2 Restricted
6.3.3.2.3 Secure
6.3.3.2.4 Highly secure
6.4 Infrastructure components
6.4.1 Access control
6.4.1.1 Requirements
6.4.1.1.1 Open
6.4.1.1.2 Restricted
6.4.1.1.3 Secure
6.4.1.1.4 Highly secure
6.4.1.2 Recommendations
6.4.1.2.1 Open
6.4.1.2.2 Restricted
6.4.1.2.3 Secure
6.4.1.2.4 Highly secure
6.4.2 Intrusion resistance
6.4.2.1 Requirements
6.4.2.1.1 Open
6.4.2.1.2 Restricted
6.4.2.1.3 Secure
6.4.2.1.4 Highly secure
6.4.2.2 Recommendations
6.4.2.2.1 Open
6.4.2.2.2 Restricted
6.4.2.2.3 Secure
6.4.2.2.4 Highly secure
6.4.3 Monitoring
6.4.3.1 Requirements <\/td>\n<\/tr>\n
25<\/td>\n6.4.3.1.1 Open
6.4.3.1.2 Restricted
6.4.3.1.3 Secure
6.4.3.1.4 Highly secure
6.4.3.2 Recommendations
6.4.3.2.1 Open
6.4.3.2.2 Restricted
6.4.3.2.3 Secure
6.4.3.2.4 Highly secure
7 Building perimeter
7.1 Spaces and structures
7.1.1 Access control
7.1.1.1 Requirements
7.1.1.1.1 Open
7.1.1.1.2 Restricted <\/td>\n<\/tr>\n
26<\/td>\n7.1.1.1.3 Secure <\/td>\n<\/tr>\n
28<\/td>\n7.1.1.1.4 Highly secure <\/td>\n<\/tr>\n
29<\/td>\n7.1.1.2 Recommendations
7.1.1.2.1 Open
7.1.1.2.2 Restricted
7.1.1.2.3 Secure
7.1.1.2.4 Highly secure
7.1.2 Intrusion resistance
7.1.2.1 Requirements
7.1.2.1.1 Open
7.1.2.1.2 Restricted
7.1.2.1.3 Secure
7.1.2.1.4 Highly secure
7.1.2.2 Recommendations
7.1.2.2.1 Open
7.1.2.2.2 Restricted
7.1.2.2.3 Secure
7.1.2.2.4 Highly secure
7.1.3 Monitoring
7.1.3.1 Requirements <\/td>\n<\/tr>\n
30<\/td>\n7.1.3.1.1 Open
7.1.3.1.2 Restricted
7.1.3.1.3 Secure
7.1.3.1.4 Highly secure
7.1.3.2 Recommendations
7.1.3.2.1 Open
7.1.3.2.2 Restricted
7.1.3.2.3 Secure
7.1.3.2.4 Highly secure
7.2 Pathways
7.2.1 Access control
7.2.1.1 Requirements
7.2.1.1.1 Open
7.2.1.1.2 Restricted
7.2.1.1.3 Secure
7.2.1.1.4 Highly secure <\/td>\n<\/tr>\n
31<\/td>\n7.2.1.2 Recommendations
7.2.1.2.1 Open
7.2.1.2.2 Restricted
7.2.1.2.3 Secure
7.2.1.2.4 Highly secure
7.2.2 Intrusion resistance
7.2.2.1 Requirements
7.2.2.1.1 Open
7.2.2.1.2 Restricted
7.2.2.1.3 Secure
7.2.2.1.4 Highly secure
7.2.2.2 Recommendations
7.2.2.2.1 Open
7.2.2.2.2 Restricted
7.2.2.2.3 Secure
7.2.2.2.4 Highly secure
7.2.3 Monitoring
7.2.3.1 Requirements
7.2.3.1.1 Open
7.2.3.1.2 Restricted
7.2.3.1.3 Secure
7.2.3.1.4 Highly secure
7.2.3.2 Recommendations
7.2.3.2.1 Open
7.2.3.2.2 Restricted
7.2.3.2.3 Secure
7.2.3.2.4 Highly secure
7.3 Infrastructure components
7.3.1 Access control
7.3.1.1 Requirements <\/td>\n<\/tr>\n
32<\/td>\n7.3.1.1.1 Open
7.3.1.1.2 Restricted
7.3.1.1.3 Secure
7.3.1.1.4 Highly secure
7.3.1.2 Recommendations
7.3.1.2.1 Open
7.3.1.2.2 Restricted
7.3.1.2.3 Secure
7.3.1.2.4 Highly secure
7.3.2 Intrusion resistance
7.3.2.1 Requirements
7.3.2.1.1 Open
7.3.2.1.2 Restricted
7.3.2.1.3 Secure
7.3.2.1.4 Highly secure
7.3.2.2 Recommendations
7.3.2.2.1 Open
7.3.2.2.2 Restricted
7.3.2.2.3 Secure
7.3.2.2.4 Highly secure
7.3.3 Monitoring
7.3.3.1 Requirements
7.3.3.1.1 Open
7.3.3.1.2 Restricted
7.3.3.1.3 Secure
7.3.3.1.4 Highly secure
7.3.3.2 Recommendations
7.3.3.2.1 Open
7.3.3.2.2 Restricted
7.3.3.2.3 Secure
7.3.3.2.4 Highly secure
8 Equipment\/distributor room
8.1 Spaces and structures <\/td>\n<\/tr>\n
33<\/td>\n8.1.1 Access control
8.1.1.1 General
8.1.1.2 Emergency access
8.1.1.3 Requirements
8.1.1.3.1 Open
Access control: Mechanical lock
8.1.1.3.2 Restricted <\/td>\n<\/tr>\n
34<\/td>\nWall: Solid from permanent floor to permanent ceiling with physical barrier that permits airflow but restricts physical access only as required above ceiling or under access floor for air circulation.
Ceiling: Solid plywood ceiling where no panel can be lifted.
Floor: Slab. If raised poor is utilised, then metal grill shall be installed between the wall and slab; metal grill to be secured with security screws.
Windows: No windows.
Door: Single leaf, solid core door equivalent to LPS 1175 SR3.
Access control: Single factor authentication access-controlled (proximity card reader) entrance \/ exit into the physical space.
Wall: Dual steel panel(internal) construction. This shall extend between secure floor to secure ceiling. This can extend slab to slab, or ceiling to raised floor, or any combination.
Ceiling: A metal mesh shall be provided either: <\/td>\n<\/tr>\n
35<\/td>\nFloor: No mandatory treatments if the floor is a concrete slab. If raised flooring is utilised, then metal grill shall be installed between the wall and slab. The metal grill shall be welded to the steel panel in the wall.
Door: Single leaf, solid core door equivalent to LPS 1175 SR4.
8.1.1.3.3 Secure
Secure equipment room wall construction shall meet the same requirements of Secure area perimeter walls and extend from permanent floor to permanent ceiling.
Floor: No mandatory treatments if the floor is a concrete slab.
Windows: No windows.
Door: Single leaf, solid core door equivalent to LPS 1175 SR4.
Access control: Single factor authentication access-controlled (proximity card reader) entrance \/ exit into the physical space. <\/td>\n<\/tr>\n
36<\/td>\nWall: Dual steel panel(internal) construction. This shall extend between secure floor to secure ceiling. This can extend slab to slab, or ceiling to raised floor, or any combination.
Access control: Dual factor authentication access-controlled (e.g. proximity card reader plus biometrics) entrance \/ exit into the physical space.
8.1.1.3.4 Highly secure
Highly Secure equipment room wall construction shall meet the same requirements of Highly Secure area perimeter walls and extend from permanent floor to permanent ceiling.
Floor: No mandatory treatments if the floor is a concrete slab or equivalent intrusion resistance.
Windows: No windows.
Door: Single leaf, solid core door equivalent to LPS 1175 SR4.
Access control: Dual factor authentication access-controlled (e.g. proximity card reader plus biometrics) entrance \/ exit into the physical space. <\/td>\n<\/tr>\n
37<\/td>\nWall: Additional single steel panel(internal) construction. This shall extend between secure floor to secure ceiling. This can extend slab to slab, or ceiling to raised floor, or any combination.
Door: Second single leaf, solid core door equivalent to LPS 1175 SR4.
8.1.1.4 Recommendations
8.1.1.4.1 Open
8.1.1.4.2 Restricted
8.1.1.4.3 Secure
8.1.1.4.4 Highly secure
8.1.2 Intrusion resistance
8.1.2.1 Requirements
8.1.2.1.1 Open
8.1.2.1.2 Restricted
Provide an intrusion detection system with a volumetric detection alarm system at the entrance.
8.1.2.1.3 Secure
Provide an intrusion detection system with a volumetric detection alarm system for high threat areas. Alarm notification shall be continuously monitored and encrypted with a keep-alive feature.
8.1.2.1.4 Highly secure
Provide an intrusion detection system with alarm switches on each door and window, and volumetric detector covering all possible access areas. Provide volumetric detectors covering all transit areas, data and electronic equipment working and storage areas, and outside walls. Provide volumetric detectors for over raised ceiling and under raised floors. Alarm notification shall be continuously monitored and encrypted with a keep-alive feature. Intrusion detection and alarm systems shall have backup power for a minimum of 8 hours with a redundant wired or wireless connection.
8.1.2.2 Recommendations <\/td>\n<\/tr>\n
38<\/td>\n8.1.2.2.1 Open
8.1.2.2.2 Restricted
8.1.2.2.3 Secure
8.1.2.2.4 Highly secure
8.1.3 Monitoring
8.1.3.1 Requirements
8.1.3.1.1 Open
8.1.3.1.2 Restricted
8.1.3.1.3 Secure
Video surveillance: Surveillance at all portals entering into the equipment room, equivalent to highly secure equipment room.
8.1.3.1.4 Highly secure
Video surveillance: Surveillance at all portals entering into highly secure space.
8.1.3.2 Recommendations
8.1.3.2.1 Open
8.1.3.2.2 Restricted
8.1.3.2.3 Secure
8.1.3.2.4 Highly secure
8.2 Pathways
8.2.1 Access control
8.2.1.1 Requirements
8.2.1.1.1 Open
8.2.1.1.2 Restricted
8.2.1.1.3 Secure
8.2.1.1.4 Highly secure
8.2.1.2 Recommendations
8.2.1.2.1 Open
8.2.1.2.2 Restricted
8.2.1.2.3 Secure
8.2.1.2.4 Highly secure
8.2.2 Intrusion resistance
8.2.2.1 Requirements
8.2.2.1.1 Open
8.2.2.1.2 Restricted
8.2.2.1.3 Secure
8.2.2.1.4 Highly secure
8.2.2.2 Recommendations <\/td>\n<\/tr>\n
39<\/td>\n8.2.2.2.1 Open
8.2.2.2.2 Restricted
8.2.2.2.3 Secure
8.2.2.2.4 Highly secure
8.2.3 Monitoring
8.2.3.1 Requirements
8.2.3.1.1 Open
8.2.3.1.2 Restricted
8.2.3.1.3 Secure
8.2.3.1.4 Highly secure
8.2.3.2 Recommendations
8.2.3.2.1 Open
8.2.3.2.2 Restricted
8.2.3.2.3 Secure
8.2.3.2.4 Highly secure
8.3 Infrastructure components
8.3.1 Access control
8.3.1.1 Requirements
8.3.1.1.1 Open
8.3.1.1.2 Restricted
8.3.1.1.3 Secure
8.3.1.1.4 Highly secure
8.3.1.2 Recommendations
8.3.1.2.1 Open
8.3.1.2.2 Restricted
8.3.1.2.3 Secure
8.3.1.2.4 Highly secure
8.3.2 Intrusion resistance
8.3.2.1 Requirements
8.3.2.1.1 Open
8.3.2.1.2 Restricted
8.3.2.1.3 Secure
8.3.2.1.4 Highly secure
8.3.2.2 Recommendations
8.3.2.2.1 Open
8.3.2.2.2 Restricted
8.3.2.2.3 Secure
8.3.2.2.4 Highly secure
8.3.3 Monitoring
8.3.3.1 Requirements <\/td>\n<\/tr>\n
40<\/td>\n8.3.3.1.1 Open
8.3.3.1.2 Restricted
8.3.3.1.3 Secure
8.3.3.1.4 Highly secure
8.3.3.2 Recommendations
8.3.3.2.1 Open
8.3.3.2.2 Restricted
8.3.3.2.3 Secure
8.3.3.2.4 Highly secure
9 Rack\/cabinet
9.1 Spaces and structures
9.1.1 General
9.1.2 Access control
9.1.2.1 General
9.1.2.2 Requirements
9.1.2.2.1 Open
9.1.2.2.2 Restricted <\/td>\n<\/tr>\n
41<\/td>\n9.1.2.2.3 Secure
9.1.2.2.4 Highly secure
9.1.2.3 Recommendations
9.1.2.3.1 Open
9.1.2.3.2 Restricted
9.1.2.3.3 Secure
9.1.2.3.4 Highly secure
9.1.3 Intrusion resistance
9.1.3.1 Requirements
9.1.3.1.1 Open
9.1.3.1.2 Restricted
9.1.3.1.3 Secure
9.1.3.1.4 Highly secure
9.1.3.2 Recommendations
9.1.3.2.1 Open
9.1.3.2.2 Restricted
9.1.3.2.3 Secure
9.1.3.2.4 Highly secure
9.1.4 Monitoring
9.1.4.1 Requirements
9.1.4.1.1 Open
9.1.4.1.2 Restricted
9.1.4.1.3 Secure
9.1.4.1.4 Highly secure
9.1.4.2 Recommendations <\/td>\n<\/tr>\n
42<\/td>\n9.1.4.2.1 Open
9.1.4.2.2 Restricted
9.1.4.2.3 Secure
9.1.4.2.4 Highly secure
9.2 Pathways
9.2.1 Access control
9.2.1.1 General
9.2.1.2 Requirements
9.2.1.2.1 Open
9.2.1.2.2 Restricted
9.2.1.2.3 Secure
9.2.1.2.4 Highly secure
9.2.1.3 Recommendations
9.2.1.3.1 Open
9.2.1.3.2 Restricted
9.2.1.3.3 Secure
9.2.1.3.4 Highly secure
9.2.2 Intrusion resistance
9.2.2.1 Requirements
9.2.2.1.1 Open
9.2.2.1.2 Restricted
9.2.2.1.3 Secure
9.2.2.1.4 Highly secure
9.2.2.2 Recommendations
9.2.2.2.1 Open
9.2.2.2.2 Restricted
9.2.2.2.3 Secure
9.2.2.2.4 Highly secure
9.2.3 Monitoring
9.2.3.1 Requirements <\/td>\n<\/tr>\n
43<\/td>\n9.2.3.1.1 Open
9.2.3.1.2 Restricted
9.2.3.1.3 Secure
9.2.3.1.4 Highly secure
9.2.3.2 Recommendations
9.2.3.2.1 Open
9.2.3.2.2 Restricted
9.2.3.2.3 Secure
9.2.3.2.4 Highly secure
9.3 Infrastructure components
9.3.1 Access control
9.3.1.1 General
9.3.1.2 Terminating in cabinets
9.3.1.3 Patch panel separation
9.3.1.4 Highly Secure ports shall be exclusively located in their own cabinets, frames, or racks. Patch cord installation
9.3.1.5 Patch panel terminations
9.3.1.6 External cabinets <\/td>\n<\/tr>\n
44<\/td>\n9.3.1.7 Inter-rack relationship
9.3.1.8 Requirements
9.3.1.8.1 Open
9.3.1.8.2 Restricted
9.3.1.8.3 Secure
9.3.1.8.4 Highly secure <\/td>\n<\/tr>\n
45<\/td>\n9.3.1.9 Recommendations
9.3.1.9.1 Open
9.3.1.9.2 Restricted
9.3.1.9.3 Secure
9.3.1.9.4 Highly secure
9.3.2 Intrusion resistance
9.3.2.1 Requirements
9.3.2.1.1 Open
9.3.2.1.2 Restricted
9.3.2.1.3 Secure
9.3.2.1.4 Highly secure
9.3.2.2 Recommendations
9.3.2.2.1 Open
9.3.2.2.2 Restricted
9.3.2.2.3 Secure
9.3.2.2.4 Highly secure
9.3.3 Monitoring
9.3.3.1 Requirements
9.3.3.1.1 Open
9.3.3.1.2 Restricted
9.3.3.1.3 Secure
9.3.3.1.4 Highly secure
9.3.3.2 Recommendations
9.3.3.2.1 Open
9.3.3.2.2 Restricted
9.3.3.2.3 Secure
9.3.3.2.4 Highly secure
10 Cabling component containment
10.1 Spaces and structures
10.1.1 Access control
10.1.1.1 Requirements
10.1.1.1.1 Open
10.1.1.1.2 Restricted
10.1.1.1.3 Secure
10.1.1.1.4 Highly secure
10.1.1.2 Recommendations
10.1.1.2.1 Open
10.1.1.2.2 Restricted
10.1.1.2.3 Secure
10.1.1.2.4 Highly secure
10.1.2 Intrusion resistance
10.1.2.1 Requirements <\/td>\n<\/tr>\n
46<\/td>\n10.1.2.1.1 Open
10.1.2.1.2 Restricted
10.1.2.1.3 Secure
10.1.2.1.4 Highly secure
10.1.2.2 Recommendations
10.1.2.2.1 Open
10.1.2.2.2 Restricted
10.1.2.2.3 Secure
10.1.2.2.4 Highly secure
10.1.3 Monitoring
10.1.3.1 Requirements
10.1.3.1.1 Open
10.1.3.1.2 Restricted
10.1.3.1.3 Secure
10.1.3.1.4 Highly secure
10.1.3.2 Recommendations
10.1.3.2.1 Open
10.1.3.2.2 Restricted
10.1.3.2.3 Secure
10.1.3.2.4 Highly secure
10.2 Pathways
10.2.1 Access control
10.2.1.1 General
10.2.1.2 Security conduit
10.2.1.2.1 General <\/td>\n<\/tr>\n
47<\/td>\n10.2.1.2.2 Security conduit – optical fibre
10.2.1.2.3 Fibre-optic cable pathways
10.2.1.2.4 Protected Pathway System (PPS)
10.2.1.2.4.1 General <\/td>\n<\/tr>\n
48<\/td>\n10.2.1.2.4.2 Outside outlets
10.2.1.2.4.3 Application
10.2.1.2.4.4 Level 1 PPS requirements
Level 1 PPS conduit <\/td>\n<\/tr>\n
49<\/td>\nLevel 1 PPS tray
Level 1 PPS installation
Level 1 PPS pull boxes
Level 1 PPS enclosures
Level 1 suspended PPS
Level 1 direct buried PPS <\/td>\n<\/tr>\n
50<\/td>\nLevel 1 underground PPS
Level 1 PPS monitoring
10.2.1.2.4.5 Level 2 PPS requirements
Level 2 PPS conduit
Level 2 PPS installation
Level 2 PPS pull boxes
Level 2 PPS enclosures
Level 2 suspended PPS <\/td>\n<\/tr>\n
51<\/td>\nLevel 2 direct buried PPS
Level 2 underground PPS <\/td>\n<\/tr>\n
52<\/td>\nLevel 2 PPS monitoring <\/td>\n<\/tr>\n
53<\/td>\n10.2.1.2.5 Alarmed cable
10.2.1.2.6 Continuously viewed carrier
10.2.1.2.7 PPS distribution general
10.2.1.2.8 PPS outlet closures general
10.2.1.2.9 Wall finish
10.2.1.2.10 Wall penetrations
10.2.1.2.11 PPS termination
10.2.1.3 Cables in walls <\/td>\n<\/tr>\n
54<\/td>\n10.2.1.4 Cables in shared walls
10.2.1.5 Wall penetrations
10.2.1.6 Pathway systems
10.2.1.6.1 General
10.2.1.6.2 Common pathway system
10.2.1.6.3 Enclosed pathway systems for multiorganizational facilities <\/td>\n<\/tr>\n
55<\/td>\n10.2.1.7 Sealing PPS systems
10.2.1.8 Cable inspection
10.2.1.9 Security seals
10.2.1.10 Outside plant
10.2.1.10.1 Access pits <\/td>\n<\/tr>\n
56<\/td>\n10.2.1.10.2 Building lead-in
10.2.1.10.3 Inter-building conduit
10.2.1.11 Requirements
10.2.1.11.1 Open
10.2.1.11.2 Restricted
10.2.1.11.3 Secure
10.2.1.11.4 Highly secure
10.2.1.12 Recommendations <\/td>\n<\/tr>\n
57<\/td>\n10.2.1.12.1 Open
10.2.1.12.2 Restricted
10.2.1.12.3 Secure
10.2.1.12.4 Highly secure
10.2.2 Intrusion resistance
10.2.2.1 Requirements
10.2.2.1.1 Open
10.2.2.1.2 Restricted
10.2.2.1.3 Secure
10.2.2.1.4 Highly secure
10.2.2.2 Recommendations
10.2.2.2.1 Open
10.2.2.2.2 Restricted
10.2.2.2.3 Secure
10.2.2.2.4 Highly secure
10.2.3 Monitoring
10.2.3.1 Requirements
10.2.3.1.1 Open
10.2.3.1.2 Restricted
10.2.3.1.3 Secure
10.2.3.1.4 Highly secure
10.2.3.2 Recommendations
10.2.3.2.1 Open
10.2.3.2.2 Restricted
10.2.3.2.3 Secure
10.2.3.2.4 Highly secure
10.3 Infrastructure components
10.3.1 Access control
10.3.1.1 Requirements
10.3.1.1.1 Open
10.3.1.1.2 Restricted
10.3.1.1.3 Secure
10.3.1.1.4 Highly secure
10.3.1.2 Recommendations
10.3.1.2.1 Open
10.3.1.2.2 Restricted
10.3.1.2.3 Secure
10.3.1.2.4 Highly secure
10.3.2 Intrusion resistance
10.3.2.1 Requirements <\/td>\n<\/tr>\n
58<\/td>\n10.3.2.1.1 Open
10.3.2.1.2 Restricted
10.3.2.1.3 Secure
10.3.2.1.4 Highly secure
10.3.2.2 Recommendations
10.3.2.2.1 Open
10.3.2.2.2 Restricted
10.3.2.2.3 Secure
10.3.2.2.4 Highly secure
10.3.3 Monitoring
10.3.3.1 Requirements
10.3.3.1.1 Open
10.3.3.1.2 Restricted
10.3.3.1.3 Secure
10.3.3.1.4 Highly secure
10.3.3.2 Recommendations
10.3.3.2.1 Open
10.3.3.2.2 Restricted
10.3.3.2.3 Secure
10.3.3.2.4 Highly secure
11 Cabling component
11.1 Spaces and structures
11.1.1 Access control
11.1.1.1 Requirements
11.1.1.1.1 Open
11.1.1.1.2 Restricted
11.1.1.1.3 Secure
11.1.1.1.4 Highly secure
11.1.1.2 Recommendations
11.1.1.2.1 Open
11.1.1.2.2 Restricted
11.1.1.2.3 Secure
11.1.1.2.4 Highly secure
11.1.2 Intrusion resistance
11.1.2.1 Requirements
11.1.2.1.1 Open
11.1.2.1.2 Restricted
11.1.2.1.3 Secure
11.1.2.1.4 Highly secure
11.1.2.2 Recommendations <\/td>\n<\/tr>\n
59<\/td>\n11.1.2.2.1 Open
11.1.2.2.2 Restricted
11.1.2.2.3 Secure
11.1.2.2.4 Highly secure
11.1.3 Monitoring
11.1.3.1 Requirements
11.1.3.1.1 Open
11.1.3.1.2 Restricted
11.1.3.1.3 Secure
11.1.3.1.4 Highly secure
11.1.3.2 Recommendations
11.1.3.2.1 Open
11.1.3.2.2 Restricted
11.1.3.2.3 Secure
11.1.3.2.4 Highly secure
11.2 Pathways
11.2.1 Access control
11.2.1.1 Requirements
11.2.1.1.1 Open
11.2.1.1.2 Restricted
11.2.1.1.3 Secure
11.2.1.1.4 Highly secure
11.2.1.2 Recommendations
11.2.1.2.1 Open
11.2.1.2.2 Restricted
11.2.1.2.3 Secure
11.2.1.2.4 Highly secure
11.2.2 Intrusion resistance
11.2.2.1 Requirements
11.2.2.1.1 Open
11.2.2.1.2 Restricted
11.2.2.1.3 Secure
11.2.2.1.4 Highly secure
11.2.2.2 Recommendations
11.2.2.2.1 Open
11.2.2.2.2 Restricted
11.2.2.2.3 Secure
11.2.2.2.4 Highly secure
11.2.3 Monitoring
11.2.3.1 Requirements <\/td>\n<\/tr>\n
60<\/td>\n11.2.3.1.1 Open
11.2.3.1.2 Restricted
11.2.3.1.3 Secure
11.2.3.1.4 Highly secure
11.2.3.2 Recommendations
11.2.3.2.1 Open
11.2.3.2.2 Restricted
11.2.3.2.3 Secure
11.2.3.2.4 Highly secure
11.3 Infrastructure components
11.3.1 Access control
11.3.1.1 General
11.3.1.2 Cable colours
11.3.1.3 Banding <\/td>\n<\/tr>\n
61<\/td>\n11.3.1.4 Optical fibre cables
11.3.1.5 Telecommunications outlet box
11.3.1.6 Telecommunications outlet box colours
11.3.1.7 Telecommunications outlet box covers
11.3.1.8 Equipment cord installation
11.3.1.9 Cable patching <\/td>\n<\/tr>\n
62<\/td>\n11.3.1.10 Requirements
11.3.1.10.1.1 General
Telecommunications outlet security. To minimise the impact of erroneous manipulation of connecting cables. As a minimum, the following port security shall be adopted:
11.3.1.10.1.2 Open
11.3.1.10.1.3 Restricted
11.3.1.10.1.4 Secure
11.3.1.10.1.5 Highly secure
11.3.1.11 Recommendations
11.3.1.11.1 Open
11.3.1.11.2 Restricted
11.3.1.11.3 Secure
11.3.1.11.4 Highly secure
11.3.2 Intrusion resistance
11.3.2.1 Requirements
11.3.2.1.1 Open
11.3.2.1.2 Restricted
11.3.2.1.3 Secure
11.3.2.1.4 Highly secure
11.3.2.2 Recommendations
11.3.2.2.1 Open
11.3.2.2.2 Restricted
11.3.2.2.3 Secure
11.3.2.2.4 Highly secure
11.3.3 Monitoring
11.3.3.1 Requirements
11.3.3.1.1 Open
11.3.3.1.2 Restricted
11.3.3.1.3 Secure
11.3.3.1.4 Highly secure
11.3.3.2 Recommendations <\/td>\n<\/tr>\n
63<\/td>\n11.3.3.2.1 Open
11.3.3.2.2 Restricted
11.3.3.2.3 Secure
11.3.3.2.4 Highly secure
12 Administration
12.1 Reporting of cyber security incidents
12.2 Labelling
12.2.1 Conduit
12.2.2 Telecommunications outlet boxes
12.2.3 Cables
12.3 Documentation <\/td>\n<\/tr>\n
64<\/td>\n12.4 Cable auditing <\/td>\n<\/tr>\n
65<\/td>\n12.5 Monitor the system
12.6 Security documentation
12.6.1 General
12.6.2 System security plan
12.6.3 Incident response plan <\/td>\n<\/tr>\n
66<\/td>\n12.7 Security assessment report
12.8 Training
12.9 Security clearances
12.10 Access requirements <\/td>\n<\/tr>\n
67<\/td>\n13 Evolution of security systems <\/td>\n<\/tr>\n
68<\/td>\nAnnex\u00a0A (normative)Free standing barriers <\/td>\n<\/tr>\n
69<\/td>\nAnnex\u00a0B (normative)Video surveillance
B.1 Requirements
B.1.1 Cabling, pathways and spaces
B.1.2 Cameras
B.1.3 1Monitoring
B.2 Recommendations
B.2.1 1Pathways
B.2.2 Cameras <\/td>\n<\/tr>\n
70<\/td>\nB.2.3 19BMonitoring <\/td>\n<\/tr>\n
71<\/td>\nAnnex\u00a0C (normative)Intrusion detection
C.1 Requirements
C.1.1 Cabling, pathways and spaces
C.1.2 2Deployment
C.1.2.1 System independence
C.1.2.2 Power supply
C.1.2.3 Sensors and keypads <\/td>\n<\/tr>\n
72<\/td>\nC.1.2.4 39BAlarmed carrier cable systems
C.1.3 BMonitoring
C.1.4 2Documentation
C.1.5 2Operation
D.1.2.1 System independence <\/td>\n<\/tr>\n
73<\/td>\nAnnex\u00a0D (normative)Access control
D.1 Requirements
D.1.1 Cabling, pathways and spaces
D.1.2 Deployment
D.1.2.2 Power supply
D.1.2.3 System components
D.1.2.3.1 General <\/td>\n<\/tr>\n
74<\/td>\nD.1.2.3.2 Request-to-exit devices
D.1.2.3.3 Door contacts
D.1.2.3.4 Electric strike or latch
D.1.2.3.5 Dialler units
D.2 Recommendations
D.2.1 Planning
D.2.2 Pathways <\/td>\n<\/tr>\n
75<\/td>\nAnnex\u00a0E (normative)Management of personnel
E.1 Requirements
E.1.1 3Employees and other authorized personnel
E.1.2 Staffed guarding <\/td>\n<\/tr>\n
76<\/td>\nE.1.3 Visitors
E.1.4 Deliveries
E.2 Recommendations
E.2.1 Visitors
E.2.2 Deliveries <\/td>\n<\/tr>\n
77<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS ISO\/IEC 24383. Information technology. Physical network security for the accommodation of customer premises cabling infrastructure and information technology equipment<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n77<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":403526,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-403518","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/403518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/403526"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=403518"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=403518"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=403518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}