PUBLIC DSM Part 2.31 - Department of Defence

UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
Defence Security Manual
DSM Part
2:31 Off-Site Work
Version
4
Publication date July 2015
Amendment list
23
Optimised for Screen; Print; Screen Reader
Releasable to Public
ic
Defence personnel are, and external service providers subject to the terms and conditions of their
Compliance
Requirements contract may be, bound by security policy contained in the DSM and Information Security Manual
(ISM). Failure to comply with the mandatory requirements of the DSM and ISM may result in
action under the relevant contract provision or legislation including, but not limited to; the Defence
Force Discipline Act 1982, the Public Service Act 1999, and the Crimes Act 1914.
bl
Mandatory requirements in the DSM and ISM are identified through the use of the terms must /
must not and should / should not. Compliance with these requirements is mandatory unless
the appropriate authority, if applicable, has considered the justification for non-compliance and
accepted the associated risk through the granting of a dispensation.
The terms ‘recommend’ and ‘may’ are used to denote a sensible security practice and noncompliance need not be approved or documented.
Note: Non-compliance with a sensible security practice ought to be informed by
sound risk management principles.
Pu
The DSM compliance regime, including the authority to approve non-compliance with mandatory
requirements, the use of dispensation indicators, and how to apply for a dispensation is detailed
in DSM Part 2:1 Dispensations.
Copyright
© Commonwealth of Australia 2010
This work is copyright. Apart from any use as permitted under the Copyright Act 1968,
no part may be reproduced by any process without prior written permission from the
Department of Defence. Requests and inquiries concerning reproduction and rights should be
addressed to Defence Publishing Services, Department of Defence.
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED
UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
Introduction
1.
Defence personnel and external service providers may need to undertake duties outside their office or
usual workplace. Working off-site, however, brings with it additional protective security risks that cannot be
managed in the same way as work undertaken in the office.
2.
The purpose of Defence Security Manual (DSM) Part 2:31 is to reduce the security risk associated
with off-site work by defining the security policy regarding off-site work and the additional security measures
required.
Policy
ic
3.
Defence will ensure that where there is a requirement for individuals to perform off-site work, the
necessary security measures and practices will be in place to ensure official information is protected in a
manner that prevents unauthorised access by, or disclosure to, those who do not have the appropriate
security clearance and/or a need to know.
Process
Approvals
bl
4.
Off-site-work must not [Auth:None] be conducted prior to approval by an appropriate delegate in
accordance with the roles and responsibilities section of this DSM Part.
5.
Commanders, managers or contract managers that are either approving or processing an approval to
a higher authority must [Auth:None] ensure that:
any individual that is approved to engage in off-site work has read this DSM part and any
applicable referenced material and acknowledges their understanding of their responsibilities;
and
Pu
a.
b.
there is a home-based work agreement established for:
(1)
home-based work; or
(2)
any work-from-home arrangement involving the physical storage of information with a
‘handle-as’ classification PROTECTED or above.
Protecting Official Information
6.
When engaged in off-site work, including remote access, Defence personnel and external service
providers must not [Auth:None] allow people who are not appropriately cleared or do not have a need to
know to view, overhear or otherwise access any official information which has not been authorised for public
release.
7.
To guard against unauthorised access, including that which is accidental or unintentional, the
information must not [Auth:None] be accessed, read or discussed while in any public site in which uncleared
people can see or hear the information.
8.
Access is permitted, where it is reasonable to assume that uncleared people cannot see, hear or
record the information, to:
a.
UNCLASSIFIED DLM marked information via remote access or in hardcopy; and
DSM Part 2:31 Page 2 of 15
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED
UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
b.
information classified PROTECTED and above in softcopy only via an accredited remote access
system such as DREAMS, or via a device that has a ‘handle-as’ classification of For Official Use
Only (FOUO) or lower.
Example:
It is acceptable to work on a Defence laptop using the DREAMS accessing up to
PROTECTED content at home or in a hotel room when uncleared people cannot see the information.
9.
Hard copy documents and ICT equipment and media with a ‘handle as’ classification of PROTECTED
or above must not be accessed in a public site.
Example:
Printed PROTECTED documents, unencrypted SECRET CDs or other devices that
do not implement Australian Signals Directorate (ASD) approved encryption to reduce the ‘handle as’
classification to UNCLASSIFIED or FOUO cannot be used or accessed in a public site. They are to
remain secured in accordance with DSM Part 2:33 Physical Transfer of Classified Information and
Security-Protected Assets at all times in such locations.
ic
Note:
Overnight carriage of classified information is covered in DSM Part 2:33 Physical Transfer of
Classified Information and Security-Protected Assets. Access to this material is not permitted while in
transit between secure locations. It is to remain secured in a tamper evident enclosure in accordance
with the aforementioned DSM part.
10. Hard copy documents and ICT equipment and media with a ‘handle as’ classification of PROTECTED
or above must not be accessed at home without a home based work agreement. Access to this material
under an ad hoc work from home arrangement is not permissible. Access always requires a home based
work agreement.
bl
Note:
There are no circumstances where you can ‘informally’ remove PROTECTED and above
hard copy material or unencrypted devices in order to conduct off-site work. This applies regardless of
any remote access approvals in effect. In these circumstances secure storage is required.
Example:
A user has been supplied a SECRET Personal Digital Assistant (PDA) with ASD
approved encryption allowing remote access from home or other locations. The user cannot remove a
SECRET document or unencrypted SECRET laptop or CD as they cannot secure them at home.
Pu
Protecting Classified Conversations
11. It is easier to record a classified conversation than it is to mount a camera to record a laptop's screen
or a document being read. The risk of conducting classified conversations is therefore much higher than
reading an email or typing a document. Secure mobile phones with ASD approved encryption are a
particular risk because they are issued in order to allow the user to make classified calls from unsecured
areas.
12. Classified conversations are to be protected from being overheard or recorded when being conducted
off-site. The following measures are designed to reduce the threat of classified conversations being
overheard or recorded:
a.
Classified conversations, including telephone calls and mobile video conferences, must not
[Auth: None] be held in hire cars, hotel rooms, or conference rooms that are themselves not
audio secured as approved by the Australian Government. These areas are at high risk of audio
surveillance, particularly when travelling overseas.
b.
Holding classified conversations in other closed public spaces, while sitting or standing in one
place, easily allows the conversation to be overheard or recorded. Classified conversations
must not [Auth: None] be held in closed public spaces including, but not limited to, public
aircraft, airport lounges, while at the local cafe etc.
Note:
Hire cars are at increased risk as modern vehicles now come with an imbedded internet
connected mobile phone that can be remotely activated without the occupant’s knowledge.
DSM Part 2:31 Page 3 of 15
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED
UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
c.
Where no secure facility is available and a classified conversation/telephone call is essential to
Defence business it is recommended to find an open public place such as a park or other open
area and conduct the conversation while walking, being careful to ensure the conversation is
not overheard by casual observers. Parks and open areas offer the greatest protection from
both casual and deliberate audio surveillance.
Note:
If you or your companions are carrying a private phone and a secure phone, the private
phone may be targeted in order to intercept a secure phone call. Therefore leave private phones
behind, or turn them off completely by removing the battery, when engaged in classified discussions.
Smart phones are computers connected to the Internet and a smart phone’s microphone and camera
can be turned on at anytime without a user’s knowledge.
The risk of audio interception is greatly increased when travelling overseas. It is therefore
recommended that wherever possible classified information including conversations/telephone
calls is accessed within secured facilities. Allied secure facilities are acceptable, provided they
are accredited to the appropriate level. Do not discuss Australian Eyes Only (AUSTEO)
material.
e.
Where classified conversations need to be conducted at home, e.g. on a secure phone,
particular attention needs to be paid to the presence of uncleared adults, young adults and
children. Children over the age of 10 years generally have a well-developed long term memory,
a good ability to comprehend information, and a strong sense of curiosity. Exposing them to
classified information therefore represents a significant security risk. Where there is an
expectation that classified discussions will occur regularly at home, advice on audio security
countermeasures must be sought from the Defence Security and Vetting Service (DS&VS) as
there may be an increased risk of targeting by Foreign Intelligence Services.
bl
ic
d.
Geolocation Security
13. In the rare event that your location or out of office trip is itself classified then you must protect your
location data. In order to do this:
do not use your private mobile (its unique ID/SIM card can be used to track you, especially
overseas);
Pu
a.
b.
remember to turn off your GPS;
c.
disable any application location services;
d.
do not log into to your social networks; and
e.
do not take tourist photos.
Note:
Geolocation security may apply to operations and operational areas, where this is the case
this will be covered in an Operational Security instruction.
Physical Storage Requirements for Off-Site Work
14. Defence personnel and external service providers conducting off-site work are required to comply with
the procedures for handling and protecting official information during use, storage, transfer and transmission
as outlined in the DSM Part 2:60 Physical Security.
Note:
Special requirements exist for the overnight carriage of information classified PROTECTED
or above (see DSM Part 2:33 Physical Transfer of Classified Information and Security-Protected
Assets).
15. Physical storage measures for ICT equipment may be reduced by using ASD approved encryption
that reduces the 'handle-as' classification of electronic devices and media to a lower classification.
DSM Part 2:31 Page 4 of 15
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED
UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
16. Accredited remote access systems and products that implement ASD approved encryption reduce the
‘handle-as’ classification when the encryption is active. These protection measures don’t work if the
encryption is not activated. Depending on the device this could occur if the device is in standby power mode,
therefore users must follow the device’s Standard Operating Procedures (SOP) to ensure that it is placed in
a secure state if the device is to be left unattended.
Example:
A High Grade Silicon Data Vault (HGSDV) encrypted laptop uses ASD approved
encryption to reduce the device's classification from SECRET to UNCLASSIFIED. A safe is not
required to store the device when powered off, but the device still needs to be protected from theft.
17. Whenever any information with a 'handle-as' classification of PROTECTED or above needs to be
stored at home, a home-based work agreement is required.
Disposal of Official Information
ic
18. Defence personnel or external service providers working off-site are required to dispose of classified
waste in accordance with DSM Part 2:30 Classification and Protection of Official Information. If classified
waste generated off-site cannot be disposed of appropriately, it must [Auth:None] be securely stored until it
can be securely transferred to a facility that can properly dispose of the waste.
Reporting of Security Incidents or Change in Security Circumstances
bl
19. When Defence personnel or external service providers working off-site become aware of any incident
that may indicate or suggest that security classified material has been compromised, tampered with or
stolen, they are to immediately report this in accordance with the DSM Part 2:12 Security Incidents and
Investigations.
Note:
Early reporting in accordance with DSM Part 2:12 Security Incidents and Investigations may
prevent further compromise and minimise the extent of damage of the security incident.
Remote Access
Pu
20. Defence permits remote access to some of its ICT networks via accredited remote access solutions. In
some circumstances it may also supply users with a stand alone device such as a laptop to conduct off-site
work. Remote access permits authorised users to conduct off-site work on a variety of devices. Approvals for
remote access are conducted when the account/device is requested and remain in effect until the
account/device is surrendered or the user changes positions.
Note:
The granting of a remote access approval does not permit the removal of hardcopy
information classified PROTECTED or above. Whenever information with a 'handle-as' classification of
PROTECTED or above needs to be stored at home, a home-based work agreement is required.
Remote Access Approvals
21. Before granting remote access to a user, the area provisioning the capability must [Auth:None] gain
the approval of an appropriate delegate in accordance with the roles and responsibilities section of this DSM
Part.
Remote Access Processing Restrictions applicable to Systems Administrators
22. The risk of compromise to networks increases greatly when remote access solutions are used to
undertake systems administration activities from beyond the network boundary.
23. In accordance with ISM Control 0985 or ISM Control 0709 (dependent on the classification of the
system being remotely accessed) remote privileged access must not [Auth:Sec, No Delegate] be
undertaken unless the remote access system has been accredited specifically for this purpose and has been
DSM Part 2:31 Page 5 of 15
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED
UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
granted a dispensation against these ISM controls. This includes logging onto the remote access system
with user level privileges, then escalating to privileged access within the session.
Restrictions on ICT Equipment used for Off-Site Work And Remote Access
24. Public devices are extremely vulnerable to exploitation and are assumed to be compromised and
actively collecting information including by hardware and software techniques such as keyboard logging,
screen scraping or remnant data access from memory. These techniques are widespread and are often used
to collect valuable commercial information from public computers. These techniques are used to capture
encrypted information when it is displayed or entered in unencrypted form.
25. As a result of the increased risk of using public devices the Australian Government has directed within
the Protective Security Policy Framework (PSPF) that the use of these devices is to be prohibited. Therefore,
Defence personnel and external service providers must not [Auth:None] use public devices to access any
official information that has not already been authorised for public release or to perform remote access to
Defence systems.
ic
Note:
This restriction includes all forms of access including using remote access systems from
public computers or reading material on a CD, encrypted thumb drive or other removable media from
these devices.
bl
Example:
Defence personnel or external service providers may log in to an airport lounge
terminal to view the Defence external (Internet) home page to read a published report. However,
Defence personnel or external service providers may not use the terminal to log into DREAMS or to
read official information that has not been approved for public release, regardless of whether it is
stored on an encrypted flash drive.
26. Defence personnel and external service providers must not [Auth:None] use privately owned devices
to process any official information that has not been authorised for public release.
Exclusion:
In accordance with the ISM Control 0693, privately owned devices may be used for
remote access to Defence networks up to PROTECTED via accredited remote access solutions.
Pu
Exclusion:
Access is also permitted to information that is hosted via an accredited solution from
a privately owned device.
Example:
You can use DREAMS from your home computer or own phone because DREAMS
is accredited and the endpoints are privately owned devices.
Example:
You can use the self service functions of PMKEYS, CAMPUS etc offered over the
internet via the Defence gateway from your own computer. The gateway solution that offers the
information is accredited and the endpoint is a privately owned device.
Example:
You cannot email your work to your own device, read or access Defence material on
a CD, encrypted thumb drive or other removable media from a privately owned device. In this instance
there are no protections in place for the information.
27. In accordance with ISM Control 0694, privately owned devices must not [Auth:Sec, No Delegate] be
used for remote access to information and systems classified CONFIDENTIAL and above.
28. Users with a requirement for CONFIDENTIAL and above remote access must [Auth: None] use an
accredited Defence-controlled remote access device and receive approval by an appropriate delegate in
accordance with the roles and responsibilities section of this DSM part.
29.
Remote access devices used to process information CONFIDENTIAL or above must [Auth:None]:
a.
use ASD approved encryption to reduce the 'handle-as' classification to UNCLASSIFIED, or
FOUO; or
b.
handle and store the device in accordance with its actual classification.
DSM Part 2:31 Page 6 of 15
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED
UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
Work-from-Home
30. Defence employees may work from home on an irregular and casual basis with a commander or
manager’s approval. This includes the use of a remote access solution such as DREAMS.
31. Employees may take home hardcopy UNCLASSIFIED DLM marked material such as a FOUO
document, provided that it is stored from casual unauthorised access while at home using a locked
commercial filing cabinet or locked secure briefcase, over which the employee maintains positive control.
32. There are no circumstances where an employee can ‘informally’ remove PROTECTED and above
hardcopy material in order to take it home. Whenever information with a 'handle-as' classification of
PROTECTED or above needs to be stored at home, a home-based work agreement is required (see
paragraph 34.b).
Home-Based Work
ic
Example:
Even where an employee has a DREAMS account and can use this to work from
home on up to PROTECTED softcopy material the employee can not take a hardcopy of
PROTECTED or above documents home, even if it is only overnight.
33. The Australian Government encourages flexible working arrangements. While home-based work is not
an individual's right, security considerations in and of themselves do not prevent Defence employees from
conducting home-based work.
A Defence employee must [Auth:None] enter into a home-based work agreement:
a.
where Defence has agreed to flexible working arrangements that permit the conduct of regular
working hours from home as part of the employees conditions of employment; or
b.
whenever information with a 'handle-as' classification of PROTECTED or above needs to be
stored at home.
Pu
34.
bl
Approval
Note:
Sites not under the sole control of the Australian Government are treated as Zone One for
physical security purposes. See DSM Part 2:60 Physical Security for further information.
Example:
A Defence employee who is working at an alternate location such as a shared office
may not be able to exercise complete control over alarms and may therefore require a home-based
work agreement.
35.
Commanders and managers must not [Auth:None] allow home-based work to occur unless:
a.
a home-based work agreement is in place which is approved by an appropriate delegate in
accordance with the roles and responsibilities section of this DSM part;
b.
the home and any ICT systems in use have been accredited to handle the highest classification
of work to be conducted in accordance with DSM Part 2:4 Facilities and ICT Systems Security
Accreditation;
c.
SOP for the transfer, handling, storage and destruction of official information at the home-based
site has been developed; and
d.
the home-based employee has been briefed by their security officer on the policies contained in
this DSM Part and the agreed SOP.
DSM Part 2:31 Page 7 of 15
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED
UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
36. Commanders and managers are responsible for the security aftercare of their employees in
accordance with DSM Part 2:20 Personal Security Clearance Processes. Staff who are working away from
the office, particularly in remote locations, for example, when accompanying a spouse on a posting, may
become disconnected from regular support mechanisms. Therefore commanders and managers need to pay
particular attention to personnel security aftercare in these circumstances.
37. Commanders and managers are responsible for ensuring that their home-based employees comply
with SOP. If the commander or manager has evidence that a home-based employee has failed to comply
with their security responsibilities and they have not responded to counselling and performance management
processes they should cancel the agreement and revert to standard working arrangements.
Home-Based Work Agreement
The agreement must include:
a.
b.
the maximum classification of work to be conducted by the employee including:
(1)
classification of discussions;
(2)
classification of information processed on ICT systems; and
(3)
classification of information stored;
bl
39.
ic
38. The home-based work agreement details the conditions of the home-based work and sets out the
obligations for the home-based employee to protect any official information at the home-based site. It is
developed by the commander or manager with the assistance of the security officer. It includes the
resources that Defence (or in the case of an external service provider the employer) may supply in order to
meet security requirements.
a completed security risk assessment;
Note:
The assessment is to address both security (including physical security) and any safety
concerns that may arise from employment.
Pu
Example:
A redeployment case worker could have an increased risk to their personal safety
arising from frequent contact with disgruntled staff in addition to regular work health and safety
matters, these may dictate additional physical security measures such as a duress alarm.
c.
the equipment that is to be supplied by either party or shared in order to perform the duties;
d.
any restrictions on equipment usage;
Example:
A requirement for family members not to use a Defence supplied computer
e.
if ICT or physical accreditation is required, a copy of the accreditation certificate(s);
f.
Defence’s right to conduct compliance checks in order to determine how official resources are
protected at the home-based site;
g.
procedures for the secure storage of official information, including the provision of security
containers suitable to store the maximum classification of information;
h.
procedures for the disposal or return of classified waste;
i.
a requirement to report any security related incidents at the premises to DS&VS; and
j.
procedures for the transfer of classified material to and from the home-based site.
DSM Part 2:31 Page 8 of 15
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED
UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
Accreditation
40. For accreditation purposes, a home-based site is considered the same as any other Defence facility
and may require accreditation. To determine if accreditation is required refer to the DSM Part 2:4 Facilities
and ICT Systems Security Accreditation.
41.
Physical accreditation of a home-based site is not required where information is only:
a.
accessed in electronic form up to PROTECTED, and the access device is protected by a ASD
approved encryption that reduces the 'handle-as' classification to UNCLASSIFIED or FOUO
when not in use; and
b.
UNCLASSIFIED and DLM material is accessed in hardcopy form.
Reporting of Security Incidents and Concerns
ic
42. Defence personnel or external service providers must [Auth: None] immediately report to DS&VS any
activity that could threaten the security of official information, regardless of whether information compromise
has occurred.
Example:
A failed break and enter at a home-based work property may require additional
security measures to be implemented even though there is no evidence of Defence material being
targeted.
Any recommended remedial action arising from an incident must then be taken by the employee.
Costs
bl
43.
44. For Defence employees the cost of any modification to the private residence to meet the standards of
any physical and information systems security requirements are subject to negotiation between the
employee and the relevant Group or Service.
Pu
Compliance Checks
45. Regular compliance checks of a home-based work agreement may be conducted in accordance with
the terms and conditions outlined within DI(G) PERS 49-4 or the DECA.
Protecting Official Information at Events such as Conferences and Workshops
46. It is recommended that a risk assessment be completed for events handling UNCLASSIFIED DLM
marked material as exposure of this material in an event context is likely to have increased reputation
impacts.
47.
A risk assessment must be carried out for events:
a.
involving classified information or classified equipment and in the case of conferences involving
CODEWORD material the agreement of the relevant compartment controller must be gained;
and
b.
public or family open days to Defence or DISP accredited facilities.
48. Security instructions must be developed before any event is held in a public venue or Zone One area
involving classified information, classified assets or other official information that has not been approved for
public release.
Example:
facility.
When organising a workshop involving classified material that is held in an off-site
DSM Part 2:31 Page 9 of 15
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED
UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
49.
It is recommended that instructions are developed for other situations not meeting the above criteria.
50. Security instructions can be simple but need to be tailored to the event. Depending of the nature of the
event, they need to consider:
entry and access control, including identification of staff and visitors, escort requirements, ratio
of visitors to escorts;
b.
the carriage of official information to and from the venue;
c.
security clearances of facilitators, venue staff, escorts;
d.
the storage and handling of official information that is not for public release, including disposal
and reproduction;
e.
access control procedures;
f.
the reporting of security incidents;
g.
security of equipment on display or in attendance;
h.
safety of attendees, including any requirement for an emergency service presence;
i.
possibility of protest action or Foreign Intelligence Service collection activity (advice on these
matters may be sought from DS&VS); and
j.
where the event is held on a base or Defence facility contingency plans for any increase in
SABEASE alert levels that may affect the event.
bl
ic
a.
Pu
51. If classified information is to be discussed in non-accredited areas, advice must be obtained from
either the DS&VS or in the case of CODEWORD information, compartment controllers as technical
surveillance countermeasures (TSCM) may be required (see DSM Part 2:65 Audiovisual Security for
Classified Activities).
Note:
TSCM measures may also be required after events depending on the level of access that
has been granted to audio secure and PED prohibited areas.
52. If classified information or assets need to be stored in a Zone One or Two event site, for example
overnight storage, advice should be obtained from the DS&VS regional office (see DSM Part 2:60 Physical
Security).
Note:
For more general guidance on event security see DSM Part 2:2 Security Risk Management
and Planning Annex A.
Roles and Responsibilities
Deputy Secretary Intelligence and Security
53.
for:
Deputy Secretary Intelligence and Security (DEPSEC I&S) is responsible for approving off-site work
a.
information that is classified TOP SECRET or carries a CODEWORD; and
b.
remote access to TOP SECRET and CODEWORD information and networks.
Note:
In accordance with the PSPF the removal of TOP SECRET and CODEWORD information in
order to work-from-home is not permitted without prior authorisation.
DSM Part 2:31 Page 10 of 15
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED
UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
54.
These responsibilities may be delegated no lower than SES Band 1/O7.
Group Heads and Service Chiefs
55.
Group Heads and Service Chiefs are responsible for approving off-site work that involves:
a.
the physical storage of classified information with a ‘handle-as’ classification of PROTECTED,
CONFIDENTIAL and SECRET information, excluding CODEWORD information; and
Example:
b.
56.
Use of unencrypted laptops, storage of physical documents etc.
remote access for CONFIDENTIAL and SECRET systems, excluding CODEWORD systems.
These responsibilities may be delegated no lower than SES Band 1/O7.
CODEWORD Compartment Controllers
ic
Compartment controllers are responsible for:
a.
in respect to compartments managed on behalf of external agencies, liaising with those
agencies on matters of shared security risk; and
b.
providing advice to DEPSEC I&S with regard to the approval, or otherwise, of off-site work
involving official information that carries any CODEWORD for which they have a compartment
control responsibility.
bl
57.
First Assistant Secretary Security and Vetting Service
58. The First Assistant Secretary Security and Vetting Service (FAS S&VS) sets Defence protective
security policies associated with off-site work.
Pu
59. FAS S&VS is responsible for assessing the security arrangements and managing the accreditation for
home-based work arrangements for Defence personnel and external service providers employed in joint
service, Defence civilian units and DISP facilities.
Service Security Authorities
60. The Service Security Authorities (SSA) are responsible for assessing the security arrangements and
managing the accreditation for home-based work arrangements for Defence personnel and external service
providers employed in single-service units.
Commanders, Managers and Contract Managers
61.
Commanders, managers and contract managers are responsible for the approval of off-site work:
a.
where physical storage is required for UNCLASSIFIED Dissemination Limiting Marker (DLM)marked information;
Note:
Commanders, managers and/or contract managers cannot approve off-site work that
requires physical storage of information with a ‘handle-as’ classification of PROTECTED or above.
b.
for remote access to systems up to PROTECTED; and
Example:
c.
An encrypted Defence laptop used for DREAMS access.
for the conduct of work in Defence-supplied accommodation (whether in barracks, on exercise
or deployment).
DSM Part 2:31 Page 11 of 15
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED
UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
Note:
In the majority of cases, Defence-supplied accommodation is not suitable for the conduct of
classified work.
62. Commanders, managers and contract managers are responsible for staffing all other requests to
DEPSEC I&S or the relevant Group Head or Service Chief.
Security Officers
Security officers are responsible for:
a.
assisting the commander, manager or contract manager to develop the security elements of a
home-based work agreement;
b.
briefing the home-based employee on the policies contained in this part of the DSM and any
agreed SOP; and
c.
briefing staff on any other off-site work security obligations.
External Service Provider Managers
ic
63.
64. External service provider managers are responsible for gaining the approval for off-site work for any
affected staff from or through the relevant Defence contract manager before permitting work from home to be
conducted using Defence information.
bl
Defence Personnel and External Service Providers
65. Defence personnel and external service providers are responsible for complying with this DSM part
and any other applicable instructions relating to any off-site work in which they engage. They are responsible
for ensuring there is no unauthorised access by others to the official information that they access as part of
the off-site work.
Pu
Key Definitions
66. Off-site work. Work undertaken in any location that would not be recognised as a usual workplace or
one where Defence would not normally conduct day-to-day official business. Examples of this type of work
may include work undertaken at home, during travel, in a hotel or conference centre, or by a Defence
employee at a Defence contractor’s premises. It does not include work conducted on operations and
exercises (with the exception of approval processes for the conduct of classified work in accommodation
areas such as barracks). Off-site work includes:
a.
Home-based work. A subset of off-site work that includes the regular performance of ordinary
hours of duty at home performed at a home-based site.
b.
Work-from-home. A subset of off-site work that includes the occasional, irregular and nonongoing performance of duties conducted at a home that has not been accredited and has not
been approved as a home-based site. Work-from-home is an ad hoc arrangement between a
supervisor and an employee that allows the employee to temporarily perform duties from their
home.
c.
Remote access. Access to a Defence stand alone computer or network from outside of either
the normal office environment or a home-based site. Remote access is characterised by:
(1)
Example:
the provision of a ICT device that implements ASD approved encryption in order to permit
offline work on official information that is not for public release; or
Laptop supplied for home use.
DSM Part 2:31 Page 12 of 15
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED
UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
(2)
accessing a system or desktop session of any classification from a external network via
an accredited gateway.
Example:
Defence Remote Electronic Access and Mobility Services (DREAMS) access to the
Defence Restricted Network (DRN).
Exclusion:
Remote access does not cover Defence ICT support to Australian Defence Force
(ADF) deployments or exercises, this is considered normal business.
67. Home. A private dwelling, Defence supplied accommodation including service accommodation in
barracks and on exercise or an approved alternative place of work.
Exclusion:
For industry where the private dwelling is the primary place of business it is
considered as a facility and accredited in accordance with DSM Part 2:4 Facilities and ICT Systems
Security Accreditation.
68. Home-based site. A security accredited private dwelling or other location that has been agreed
between Defence and an employee as regular place of work.
Home-based employee. An employee working at a home-based site.
ic
69.
70. Home-based work agreement. A formal agreement between an employee and Defence documenting
the conditions of home-based work. Agreements for:
ADF members are conducted in accordance with DI(G) PERS 49-4;
b.
APS employees are conducted in accordance with the Defence Enterprise Collective
Agreement (DECA); and
c.
External service providers will be documented via specific contract provisions.
bl
a.
71. Public site. Any place where neither the employee nor Defence can exert physical control over the
local environment.
Hotel conference rooms, public transport, airport lounges etc.
Pu
Example:
72. Defence Controlled Device. A device is under Defence control if it is owned by Defence or is subject
to any agreement that legally binds the owner of the device to comply with all DSM and ISM security policies.
Defence controlled devices include security classified assets owned by Defence Industry Security Program
(DISP) members.
Example:
A DISP member supplies their own computer to process SECRET information. DISP
membership contractually obliges the company to comply with all Commonwealth policies and the
DSM therefore the device is under Defence control.
73. Privately Owned Device and Public Devices. Home computers, PED, laptops, phones and
removable media or any other form of computing device that is owned by an individual or a company and is
not subject to Defence control.
a.
Privately Owned Device. Is a device where the end user has administrative control,
responsibility and legal authority over the devices configuration. End users can exert control
over these devices.
Example:
software.
b.
A home computer or personal mobile phone. The end user can install virus detection
Public Device. A subset of Privately Owned Devices where the end user has no administrative
control over the device, they are not responsible for, and have no legal authority over, the
configuration of the device.
DSM Part 2:31 Page 13 of 15
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED
UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
Example:
Internet kiosks and shared computers in hotels.
74. Australian Signals Directorate approved encryption. Any cryptographic functionality that is
implemented in accordance with all of the relevant requirements of the ISM Cryptography Section (including
any product specific advice or in the Australian Communications-Electronic Security Instructions (ACSI)
series publications) in order to reduce the handling and storage requirements of the device.
75. Actual and ‘handle-as’ security classifications for encrypted devices and media. Where ASD
approved encryption is applied to a device/media, that device/media has two different classifications. These
are:
a.
the actual classification: the highest classification of information stored on or processed by the
device/media, regardless of whether encryption has been applied;
Note:
This classification also applies whenever the device/media is in a keyed state, i.e. where the
classified information is accessible in an unencrypted form.
the ‘handle-as’ classification: the classification of the device/media when the classified
information it contains is fully protected by encryption;
ic
b.
76. Note:
This classification enables the device to be stored and physically transferred at a reduced
classification due to the protection provided to stored information through the application of suitable ASD
approved encryption technology.
If ASD approved encryption is not used, the actual and ‘handle-as' classifications are the same,
ie, the highest classification of data stored or processed on the device/media.
bl
a.
77. Exclusion: Some ASD approved technologies such as remote access solutions (eg, DREAMS) have
been evaluated to ensure that information is not recoverable from the hosting device once the session ends.
In these instances the product’s evaluation documentation will advise of the levels of protection offered.
Further Definitions
Further definitions for common DSM terms can be found in the Glossary.
Pu
78.
DSM Part 2:31 Page 14 of 15
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED
UNCLASSIFIED
UNCONTROLLED-IF-PRINTED
Annexes and Attachments
This part currently has no annexes or attachments.
Pu
bl
ic
N/A
DSM Part 2:31 Page 15 of 15
UNCONTROLLED-IF-PRINTED
UNCLASSIFIED