528/2005 Sb.
The DECREE
of 14 June. December 2005
about the physical safety and certification of technical resources
Modified: 19/2008 Sb.
Change: 454/2011 Sb.
The National Security Office shall, pursuant to section 33 and section 53 (a). and (c))), (d)),
(f)), and (j)) of law No 412/2005 Coll., on the protection of classified information and on the
security, (hereinafter referred to as "the Act"):
§ 1
The subject of the edit
This Decree lays down the scoring of the individual measures of physical
safety ^ 1), the lowest level of security of the secure area ^ 2) and
in the rules area ^ 3), the basic method of risk assessment, additional requirements
measures of physical security and technical certification requirements
resource.
§ 2
Definition of terms
For the purposes of this Ordinance means
and building or other object) enclosed space, in which the general rule
are secure or in the rules area,
(b) the boundary of the object server) building, the physical barrier (fence) or otherwise
clearly defined boundaries,
(c) secure the area or boundary) rules the area structurally or otherwise
clearly bounded space
d) entering the secure area of the object, or the rules area instead
designed for the entry and exit of persons and place of intended for entry and exit
means of transport,
e) means of transport by land, water, air and underground resources
designed for the transport of persons, objects and materials,
(f) the threat of disclosure or option) the misuse of classified information when
disruption of physical security,
g) risk the probability that a threat is carried out,
h) emergency status, which is imminent, the
disclosure or misuse of classified information,
I) technical means of security element whose use is
prevents, impairs, or security violation records Announces
Protection object, secure area or in the rules area, and destroys the
classified information,
j) úschovným object to a safe or other safe provided for
in Appendix 1 of this Decree,
the military material and technical equipment) ^ 5), in particular, electronic,
fototechnická, chemical, physico-chemical, radiotechnická, optical and
mechanical military equipment and military equipment, which includes
classified information.
§ 3
Object security and secure area
(1) the boundary of the object or the secure area, the classification of the object or
secure area into the appropriate category ^ 6) and secure
the area to the appropriate class provides the person responsible or responsible for
the person.
(2) the security of the object or the secure area is covered by the
a combination of physical security measures in accordance with paragraphs 3 to 10 and section 6 to
9.
(3) the object is supported, depending on the category of the object with respect
on the character of the border of the object and, depending on the risk assessment of these
technical means
and for the category Reserved)-mechanical anti-theft devices,
(b)) for the category of Confidential and secret-mechanical anti-theft devices and
electrical security signalization,
(c)) for the category of top secret-mechanical anti-theft devices,
electrical security signalization and special tv
systems. Special television systems must not impair the protection of classified
the information.
(4) Secure the area is provided by depending on its category,
class, and the evaluation of the risks these technical resources
and for the category Reserved)-mechanical anti-theft devices,
(b)) for the category of confidential-mechanical anti-theft devices and equipment
electrical security signalization,
(c)) for the category of secret and top secret-mechanical anti-theft devices,
systems for the control of inputs, equipment, electrical safety
alarm, special television systems, equipment, electric fire
signaling. Special television systems can replace the emergency
systems. When you use the special television systems may not be impaired
the protection of classified information.
(5) point values minimum degree of security of the secure areas are
set out in annex 1 of this order.
(6) the Objects and secure Confidential and higher category, in which the
ensure a permanent presence of persons employed, to ensure
mechanical zábrannými resources.
(7) to the security of the secure area to use certified or
non-certified technical resources. Non-certified technical
the funds can be used only under the conditions laid down in annex 1 to this
the Decree.
(8) the Secret information is stored in a secure area of the relevant
category or higher, or in the úschovném object, if his point
the value applied in the project physical security for the
secure area.
(9) in the object with the physical destruction of the equipment racks, places information
According to annex No 1 of this order.
(10) in the event that the boundaries of the object is the same as the limit of secure
the area is the scope of application of the measures of physical security requirements specified
on the category of the secure area.
§ 4
The security meeting areas
(1) Border rules area provides the person responsible or responsible for
the person.
(2) the security rules of the area is provided by a combination of measures
physical security pursuant to paragraphs 3 to 8 and sections 6 to 9.
(3) the scope of application of the measures of physical security to security rules
the area shall be determined depending on the degree of classified information, which
are regularly discussed in the rules area, and to assess the risks.
(4) the rules of the field for the regular discussion of classified information
degrees of secrecy secret and top secret to ensure the mechanical
zábrannými resources, systems for the control of inputs, equipment
electrical security signalization, special television systems,
electric fire alarm devices, and passive devices
Active interception of classified information.
(5) the Special television systems in paragraph 4 may be replaced by emergency
systems. Special television systems must not impair the protection of classified
the information.
(6) the point values of the lowest degree of security rules area are
set out in annex 1 of this order.
(7) the provisions of annex 1 of this Decree concerning security
secure area security apply mutatis mutandis the rules area,
If it is not in the annex No. 1 of this Decree provides otherwise.
(8) to secure the meeting areas are used certified or
non-certified technical resources. Non-certified technical
the funds can be used only under the conditions laid down in annex 1 to this
the Decree.
(9) in the event that the boundaries of the object is the same as the limit of the rules area,
is the scope of application of the measures of physical security requirements designed to
security rules the area.
§ 5
Technical security equipment
(1) the technical equipment is secured by measures of physical security
in accordance with section 3, 6 to 10 or pursuant to paragraphs 2 to 4.
(2) the scope of application of režimových measures and technical means to
technical security shall determine the responsible person or her
the designated person, depending on the risk assessment.
(3) the Security of the stored equipment containing classified
information classification
and top secret) ensures the type 5 according to annex No 1 of this order,
(b) ensure at least) type 4 according to annex No 1 to this
the Decree,
(c) confidential ensures at least) type 3 according to annex No 1 to this
the Decree,
d) Dedicated to ensure within the limits set by the responsible person or
the person responsible for her.
(4) the scope of application of the measures of physical security to security
technical equipment shall be determined in the project physical security. The content and
form of the physical security of the project shall apply mutatis mutandis.
§ 6
Regime measures
(1) lifestyle changes measures are
and determination of the people and permissions) means of transport for access to
the object, determination of the persons permission to enter the secure area and
in the rules area, and how to control these permissions,
(b)) control measures when entering the object, secure and meeting
areas and the way to control these measures,
(c)) the conditions and the way to control the movement of persons in the object, secure
area and area, and the method of checking and passing classified
information from the object, secure the area and meeting area,
(d)) mode key handling and means of identification, in particular
the method of marking, allocation and registration, custody,
e) mode handling of technical resources and their use,
(f)) mode of movement of classified information in the object, secure the area and
in the rules area.
(2) point values režimových measures are laid down in annex No. 1.
of this order.
section 7 of the
The mode of movement of people and means of transport
(1) Permission to enter the secure area of the object, or the rules
the area issued by the responsible person or authorised person. Permission to
entry into the secure area or the rules set out the categories of
may be issued to a person who is aware of and is the holder of a notice of compliance
conditions for access to EU classified information to the level of classification of the reserved
or natural person certificate for the corresponding or higher degree
confidentiality. List of people with permission to access the object category
Confidential, secret or top secret, to secure the area and to the rules
the area and the means of transport authorised to enter into the
the category of Confidential, secret or top secret, to secure the area and to the
in the rules area stores for the responsible person or authorised person.
(2) a person may, without permission to enter into the category of confidential
Secret or top secret, secure area or in the rules area
enter only accompanied by the person authorised to enter into the appropriate
object, secure area or in the rules area, provided that the
the input is necessary and will not undermine the protection of classified information.
(3) On the entry into the category of Confidential, secret or top secret, the
the inspection of the entry and for persons without authorization to enter into an object is
led the register data and the compulsory scheme visits with escorts.
On entering the secure area of the reserved category, which is located
in the object category Reserved, shall be carried out to check the entry.
(4) upon the entry of persons without permission to enter into the category of Strictly
the secret is done checking device used to search
dangerous substances or articles.
§ 8
The mode of handling keys and identification devices
(1) the scheme for handling key and specifies the means of identification system
and the method of marking, allocation and presentation, their custody and
registration, deposit of duplicates and the method of their use.
(2) keys and identification devices to the rules area, and further to
the secure area and the úschovnému object, which stores the secret
information classification of Confidential or higher, must be identified
they are stored in a way that allows you to control their use, and their
the supply is subject to registration. The key has a person responsible or
the designated person.
(3) the scheme for handling keys and identification devices to secure
area, and to úschovnému, where the object is stored classified information
classification provides a dedicated, responsible person.
(4) Secure the area and the area at the time of absence shall be
persons are allowed access to this secure area or the rules
the area locked down. Storage object must be in the absence of the persons
having access to classified information ^ 7) stored in it, is locked.
The person with the key and the means of identification of the secured
areas, meeting areas and úschovných objects is stored in the object
If the other place save determines the person responsible or responsible for
the person.
(5) the loss of keys and identification devices, shall be immediately
the person responsible is notified or authorised person shall ensure that the axle.
§ 9
Security guard
The point values of each type of security for the object are laid down in
Annex No 1 of this order.
§ 10
Measures of physical security and authentication risk assessment
(1) verify that each of the physical security measures applied and
evaluation of the risks of the project correspond to physical safety and legal
the legislation on the protection of classified information, performs responsible
person or authorised person continuously, but at least every 12 months.
(2) condition for verification referred to in paragraph 1 in the case of technical
the resources referred to in section 30, paragraph. 1 of the Act is to perform functional tests
According to annex No 1 of this order.
(3) the risk assessment shall be carried out
and) degrees of classified information and the findings of the quantity
classified information, which is in the object or will be
occur, in particular in terms of the consequences of their disclosure or misuse,
(b) the description and evaluation of threats), which are classified information
exposed,
(c) the description and evaluation of the vulnerability of the) classified information against
These threats,
(d)) by setting risk, such as "small", "medium" or "large",
the basis of the assessment of the threat and the vulnerability of classified information.
(4) in the case of changes to the measures of physical security of the person responsible, or
to her, the designated person shall ensure compliance with the project immediately to the physical
the safety.
(5) the structure of the project, physical security is laid down in annex No. 1.
of this order.
§ 11
Particulars of the application for certification of the technical resource
(1) an application for the certification of technical resource contains
and the identification of the applicant)
1. trade name, or the name, registered office and identification number,
If the applicant is a legal person,
2. the trade name or name and last name, or distinguishing
Appendix, permanent residents and a place of business, if different from the Permanent
of residence, date of birth and identification number, if the applicant is a natural
a person who is an entrepreneur, or
3. name, registered office and identification number, name and surname of the responsible
persons, if the authority of the State,
(b) enumeration and marking) technical resources and a list of submitted
the documentation.
(2) the application referred to in paragraph 1 shall be accompanied by the documentation
and the technical specification and description) of the resource
(b)) Declaration of conformity certificates or technical resource ^ 8),
(c))-the certificate of conformity for a single technical resource is not
required,
(d)) under section 46, the opinion paragraph. 14 of the Act.
§ 12
Period of validity of the certificate of the Office, and for a maximum period of validity of the
the report referred to in section 46 paragraph. 14 of the Act.
section 13
The model of the certificate of technical resource is given in annex 2 to this
the Decree.
§ 14
Technical resources according to § 30 paragraph. 1 of the law may be after the expiration of
the validity period of the certificates used in the manner and under the conditions,
which are listed in annex 1 of this order.
§ 15
Particulars of the application for conclusion of a contract of reinsurance activities
The application for conclusion of a contract of reinsurance activities ^ 9) contains the
and the identification of the applicant), pursuant to section 11 (1). 1 (a). and)
(b)) name and surname of contact the worker applicant and contact
connection,
(c) identification of the competent vocational Department) of the applicant (the subject of the
the activities and location of workplace pověřovaného detailed specification, name
and the last name of the contact and the contact link),
(d)) to specify the actions to be carried out in accordance with the Treaty on the
ensure the activities,
e) extract from the trade register or the register of trades and
a certified copy of a valid decision or certification:
1. The decision on the grant of authorization, in which a range of activities in
conformity assessment includes technical means (technical means)
referred to in section 30, paragraph. 1 of the Act, issued by the Office of technical
Standardization, metrology and State testing ^ 10),
2. the certificate of accreditation, including the annex, in which the subject of accreditation
includes certification of technical (technical means)
referred to in section 30, paragraph. 1 of the Act, issued by the Czech Institute for
accreditation ^ 11), or
3. a certificate of accreditation, including the annex, in which the subject of accreditation
involves testing the technical (technical resource
resources) referred to in section 30, paragraph. 1 of the Act, issued by the Czech
the Institute for accreditation of ^ 11).
section 16 of the
The effectiveness of the
This Decree shall take effect on 1 January 2005. January 1, 2006.
Director:
Mgr. Mares in the r.
Annex 1
1.
THE STORAGE OBJECTS AND THEIR LOCKS
1.1. The STORAGE OBJECTS
---------------------------------------------------------------
1.1.1. the Storage object type 4:
SS1 = 4 points
---------------------------------------------------------------
Storage object type 4 is certified by the national security authority
(hereinafter referred to as "the authority") and meets the requirements of safety class II or higher
According to ČSN EN 1143-1 + A1 Safety requirements, the storage objects
classification and test methods for resistance to burglary-part 1:
Cabinet safes, safes safes door and Chamber.
In accordance with ČSN EN 1143-1 + A1 shall be equipped with a storage object type 4
the lock at least class and according to ČSN EN 1300 + A1 Safety storage
objects-locks with a high security Classification due to their
resistance against unauthorised opening (lock type 2, point 1.2.3.
of the annex).
In the case that it is in the úschovném object of type 4 stored cryptographic
the material must be equipped with this storage object kombinačním
Mechanical lock, at least třípolohovým.
---------------------------------------------------------------
1.1.2. the Storage object type 3:
SS1 = 3 points
---------------------------------------------------------------
Storage object of type 3 is certified by the Office and meets the requirements of
safety class I according to ČSN EN 1143-1 + A1. In accordance with ČSN EN
1143-1 + A1 storage object must be of type 3 fitted with a lock at least class
And according to ČSN EN 1300 + A1 (lock type 2, point 1.2.3. of the annex).
In the case that it is in the úschovném object of type 3 stored cryptographic
the material must be equipped with this storage object kombinačním
Mechanical lock, at least třípolohovým.
---------------------------------------------------------------
1.1.3. the Storage object type 2:
SS1 = 2 points
---------------------------------------------------------------
Storage object type 2 is certified by the Office and meets the requirements of
safety class 0 according to ČSN EN 1143-1 + A1.
In accordance with ČSN EN 1143-1 + A1 shall be equipped with a storage object type 2
the lock at least class and according to ČSN EN 1300 + A1 (lock type 2, point 1.2.3.
of the annex).
---------------------------------------------------------------
1.1.4. the Storage object type 1:
SS1 = 1 point
---------------------------------------------------------------
Úschovným an object of type 1 is a non-separable solid steel Cabinet
the structure, its door seal is affixed to the trilogue perch
the mechanism and and is guarded at. The door latch is self-locking in the closed state.
Storage object type 1 is not certified by the Office. Match properties
These úschovných objects with the above requirements shall consider responsible
person or authorised person. The registration of a conformity assessment is included in the
the project of physical security.
---------------------------------------------------------------
1.1.5. the type of Storage object 1A:
SS1 = 1 point
---------------------------------------------------------------
Storage object type 1A is a certified the Office and meets, including the
the locking system, the requirements of safety class M1 according to ČSN 91 6012
Security storage objects-requirements, classification and methods of
testing of resistance to burglary-Safes with basic security.
---------------------------------------------------------------
1.1.6. the Storage object type 1B:
SS1 = 2 points
---------------------------------------------------------------
Storage object type 1B is a certified the Office and meets, including the
the locking system, the requirements of safety class Z2 according to ČSN 91 6012.
---------------------------------------------------------------
1.1.7. Storage object type 1 c:
SS1 = 3 points
---------------------------------------------------------------
Storage object of type 1 c is a certified the Office and meets, including the
the locking system, the requirements of safety class Z3 according to ČSN 91 6012.
---------------------------------------------------------------
1.1.8. Storage object type 0:
SS1 = not rated (N)
---------------------------------------------------------------
Storage object type 0 is a fixed structure (e.g., Clipboard, desktop
furniture) and is equipped with a lock, which is and is guarded at. Should not show such
signs of damage or wear, that would make it impossible to identify
unauthorized entry attempts. Storage object type 0 is not certified
By the authority.
Match the properties of the úschovných object with the above requirements
the responsible person or the person in charge of the project to her physical safety.
1.2. The LOCKS OBJECT ÚSCHOVNÝCH
---------------------------------------------------------------
1.2.1. The lock type 4:
SS2 = 4 points
---------------------------------------------------------------
Lock type 4 is certified by the Office in the framework of the certification of úschovného
object, and meets the requirements of safety class C according to ČSN EN 1300 + A1.
---------------------------------------------------------------
1.2.2. Type 3 Lock:
SS2 = 3 points
---------------------------------------------------------------
Lock type 3 is certified by the Office in the framework of the certification of úschovného
object, and meets the requirements of safety class B according to ČSN EN 1300 + A1.
---------------------------------------------------------------
1.2.3. The lock type 2:
SS2 = 2 points
---------------------------------------------------------------
Lock type 2 is certified by the Office in the framework of the certification of úschovného
object, and meets the requirements of safety class and according to ČSN EN 1300 + A1.
Note to point 1.:
Score conversion table object úschovného
---------------------------------------------------------------
The type of classification for which Point Point
úschovného was approved the eligibility of value
the object is listed in the words of the SS1 SS2
to 31.12.1999
---------------------------------------------------------------
Type 4 TOP SECRET 4 points 2 points
Type 3 SECRET 3 points 2 points
Type 2 CONFIDENTIAL 2 points 2 points
---------------------------------------------------------------
2.
SECURE THE AREA AND THEIR LOCKING SYSTEMS
Mechanical zábrannými resources in this chapter means in particular
locks, doors, grates, foil, glass and other safety components and
building elements with the exception of úschovných objects (point 1.).
By mechanical means to ensure zábrannými manholes,
that allows the passage of a template on the following dimensions:
-----------------------------------------------
Průlezný Hole Size
-----------------------------------------------
a rectangle of 400 mm x 250 mm
400 mm x 300 mm oval
circle Diameter 350 mm
-----------------------------------------------
If the průlezný hole secured by mechanical means with zábranným
one or more openings (e.g. Grill), these holes allow passage
the templates in the shape of an ellipse with dimensions of 250 mm x 150 mm and a thickness of 20 mm.
2.1. SECURE AREA
Determine the type of the secure area is given by the least durable element in its
the boundaries.
---------------------------------------------------------------
2.1.1. Secure area type 4:
SS3 = 4 points
---------------------------------------------------------------
The walls, floors and ceilings, construction must have the following:
and) masonry (brick or limestone-cement blocks, aerated concrete blocks)
greater than 300 mm in thickness, or
(b)) of reinforced concrete thickness greater than 150 mm.
The scores of the other mechanical barrier devices must
meet the value of SS3 = 4. Mechanical anti-theft devices cannot
to report such signs of damage or wear, that would make it impossible to
identify unauthorized entry attempts.
Windows, doors and other fastenings must satisfy the requirements of safety class
RC 4 or class RC 5 according to ČSN EN 1627 Windows, doors, shutters-Resistance
against the violent intrusion-requirements and classifications.
---------------------------------------------------------------
2.1.2. Secure area type 3:
SS3 = 3 points
---------------------------------------------------------------
The walls, floors and ceilings, construction must have the following:
and) masonry (brick or limestone-cement blocks, aerated concrete blocks)
thickness greater than 150 mm, or
(b)) of reinforced concrete thickness of greater than 100 mm.
The scores of the other mechanical barrier devices must
meet the minimum value of the SS3 = 3. Mechanical anti-theft devices
may not present such signs of damage or wear, that would
make it impossible to identify unauthorized attempts to access.
Windows, doors and closures shall meet the requirements of safety class RC 3
According to the standard EN 1627.
---------------------------------------------------------------
2.1.3. type of secure area 2:
SS3 = 2 points
---------------------------------------------------------------
The walls, floors and ceilings, construction must have the following:
and) masonry (brick or limestone-cement blocks, aerated concrete blocks)
a thickness of 100 to 150 mm, or
(b)) of reinforced concrete thickness up to 100 mm.
The floors and ceilings can be of a different material thicknesses greater than 150
mm (e.g. wooden sandwich beam structure).
The scores of the other mechanical barrier devices must
meet the minimum value of the SS3 = 2.
Windows, doors and closures shall meet the requirements of safety class RC 2
According to the standard EN 1627.
Manholes may not be secured by certified mechanical
zábrannými means, if the lower edge of the průlezného opening meets
the following requirements:
and is located at least) 5.5 m above the ground,
(b)) could not be simply for him to penetrate from the roof or for help
lightning conductors, eaves, window sills, other construction elements, landscaping
inequalities, trees or other structures.
Mechanical anti-theft devices must not exhibit damage such characters
or wear and tear, which would make it impossible to identify unauthorized attempts to
input.
---------------------------------------------------------------
2.1.4. Secure area type 1:
SS3 = 1 point
---------------------------------------------------------------
The walls, floors and ceilings are light building construction materials such as
for example:
-plasterboard,
-light masonry structures,
-wood, particle board,
-plastic hardened materials,
-profiled or corrugated sheet,
-glass.
Manholes shall be secured by mechanical zábrannými
resources that provide the same degree of resistance as the remaining
part of the boundaries of the secure area, type 1, or are protected by
Certified devices electrical security signalization (ESS),
the installation of a minimum value corresponds to the SS92 = 3.
Manholes may not be secured by these mechanical zábrannými
resources, if the bottom edge of the hole průlezného meets the following
requirements:
and is located at least) 5.5 m above the ground,
(b)) could not be simply for him to penetrate from the roof or for help
lightning conductors, eaves, window sills, other construction elements, landscaping
inequalities, trees or other structures.
Mechanical anti-theft devices must be of solid construction and must not
to report such signs of damage or wear, that would make it impossible to
to identify unauthorized attempts to access and compliance with the following requirements
assessing the person responsible or designated person.
The registration of a conformity assessment is becoming part of the physical security of the project.
---------------------------------------------------------------
2.1.5. Secure area type 0:
SS3 = not rated (N)
---------------------------------------------------------------
Průlezných security holes must be able to control the movement of persons and
vehicles.
Mechanical anti-theft devices must not exhibit damage such characters
or wear and tear, which would make it impossible to identify unauthorized attempts to
input.
Compliance with the above requirements confirms the person responsible or
responsible for the physical security of the person in the project.
2.2. The LOCKING SYSTEMS are intended to LOCK the SECURE AREA
---------------------------------------------------------------
2.2.1. Locking system type 4:
Ss4 = 4 points
---------------------------------------------------------------
The locking system of the type 4 is certified by the Office.
Locking system and its components must comply with the requirements of the security
RC class 5 according to ČSN EN 1627.
---------------------------------------------------------------
2.2.2. Locking system type 3:
Ss4 = 3 points
---------------------------------------------------------------
The locking system of the type 3 is certified by the Office.
Locking system and its components must comply with the requirements of the security
RC 4 class according to CSN EN 1627.
---------------------------------------------------------------
2.2.3. the type of locking system 2:
Ss4 = 2 points
---------------------------------------------------------------
The locking system of the type 2 is certified by the Office.
Locking system and its components must comply with the requirements of the security
RC class 3 according to EN 1627.
---------------------------------------------------------------
2.2.4. Locking system type 1:
Ss4 = 1 point
---------------------------------------------------------------
The locking system of the type 1 is certified by the Office.
Locking system and its components must comply with the requirements of the security
RC class 2 according to EN 1627.
---------------------------------------------------------------
2.2.5. The locking system of the type 0:
Ss4 = not rated (N)
---------------------------------------------------------------
Locking system of the type 0 is not certified by the Office.
Note to point 2:
If a secure area to form the Chamber may not be safe entry into the
a solid vault in that part of the boundaries of the secure area, which is
at the border of the object. Point rating S2 in this case is equal to
0.
3.
THE BORDER OBJECT
When you specify the type of object it is critical that part of the border of the object that
has the lowest resistance. In the event that the boundaries of the object is in its full length
the same as the limit of a secure area, the only secure
the area and the scores of the object (S3 = 0); visits to the object mode
in this case, the rank (SS7 = N).
A special case of the boundaries of the object's perimeter (fence, etc.) on the
across the border and access points is carried out surveillance of the type 5. In
this case can be the value of the S3 to replace product scores SS10
(physical barrier type 2 and above) and SS11. Points from the SS10 and SS11 items,
that were used in the value of the S3 is no longer counted in the calculation of
the value of S6, but is reported in table scatter evaluation for information.
A special case is the boundary of the object as defined by the boundary of the perimeter (fence
etc.). In this case, as the boundaries of the object shall be assessed in addition coat
building and reallocated to the values of the S3.
---------------------------------------------------------------
3.1. the object of type 4:
S3 = 4 points
---------------------------------------------------------------
The walls, floors and ceilings shall be increased or fixed construction
construction (eg. reinforced concrete structure). An object of type 4 has
the minimum number of doors, Windows and other openings, which must průlezných
be secured by mechanical means and zábrannými are the same
the degree of resistance against the intruders as the other parts of the border object
Type 4.
---------------------------------------------------------------
3.2. An object of type 3:
S3 = 3 points
---------------------------------------------------------------
The walls, floors and ceilings must have a fixed building of brick construction
or block, or used building technology using
prefabricated and assembled panels, etc. Manholes shall be
secured by mechanical means zábrannými, which provide the same
the degree of resistance against the intruders as the other parts of the border object
Type 3.
Manholes may not be secured by these mechanical zábrannými
resources, if the bottom edge of the hole průlezného meets the following
requirements:
and is located at least) 5.5 m above the ground,
(b)) could not be simply for him to penetrate from the roof or for help
lightning conductors, eaves, window sills, other construction elements, landscaping
inequalities, trees or other structures.
---------------------------------------------------------------
3.3. An object of type 2:
S3 = 2 points
---------------------------------------------------------------
The object is to light the building structure. Manholes shall be
secured by mechanical means or technical zábrannými
at least with the installation of INTRUSION DETECTION resources SS92 = 1. This condition shall not apply,
If the bottom edge of the hole průlezného meets the following requirements:
and is located at least) 5.5 m above the ground,
(b)) could not be simply for him to penetrate from the roof or for help
lightning conductors, eaves, window sills, other construction elements, landscaping
inequalities, trees or other structures.
---------------------------------------------------------------
3.4. An object of type 1:
S3 = 1 point
---------------------------------------------------------------
The object is a lightweight prefabricated structure that protects a person,
material and equipment from the weather.
---------------------------------------------------------------
3.5. Object type 0:
S3 = not rated (N)
---------------------------------------------------------------
The object has a visibly defined the border, within which there is the possibility of
control of individual persons and vehicles. The border object provides the responsible
the person or the person in charge of the project to her physical safety.
4.
THE SYSTEM CHECKS THE ENTRY INTO THE SECURE AREA OR OBJECT AND MODE
VISITS
4.1. the system CHECKS the ENTRY into the SECURE AREA or OBJECT
The system checks the entry is evaluated for the condition of its implementation on the
all entrances to the building or secure areas.
---------------------------------------------------------------
4.1.1. the system checks the entry type 4:
SS6 = 4 points
---------------------------------------------------------------
The system checks the entry type 4 must be certified by the Office and meets the
the requirements of ČSN EN 50133-1 alarm systems-control systems
inputs for use in security applications-part 1: System
the requirements for class B and class access identification 3
and PIN identification and control),
(b)), biometrics and PIN, or
(c) identification and biometrics) element.
The system checks the entry type 4 must be accompanied by an access barrier
preventing the repeated access and ensuring one transaction mode-
one pass ".
Access control is implemented on all entrances to the building or
secure area.
Reporting from the system checks the entry type 4 must be taken on a permanent
Habitat of the surveillance.
---------------------------------------------------------------
4.1.2. the system checks the input type 3:
SS6 = 3 points
---------------------------------------------------------------
The system checks the input type 3 must be certified by the Office and meets the
the requirements of ČSN EN 50133-1. Alarm systems-control systems
inputs for use in security applications-part 1: System
the requirements for class B and class access identification 3
and PIN identification and control),
(b)), biometrics and PIN, or
(c) identification and biometrics) element.
Access control is implemented on all entrances to the building or
secure area.
Reporting from the system checks the input type 3 must be taken on a permanent
Habitat of the surveillance.
---------------------------------------------------------------
4.1.3. the system checks the entry type 2:
SS6 = 2 points
---------------------------------------------------------------
The system checks the entry type 2 must be certified by the Office and meets the
the requirements of ČSN EN 50133-1 alarm systems-control systems
inputs for use in security applications-part 1: System
the requirements for class B and class identification Access 2
the identification element),
b) PIN, or
c) biometrics.
Access control is implemented on all entrances to the building or
secure area.
Reporting from the system checks the entry type 2 must be taken on a permanent
Habitat of the surveillance.
The system checks the entry of type 2, you can replace the control input, which
continuously conducts surveillance of members of the armed forces or
the armed forces, and at all entrances to the building or secure
area.
---------------------------------------------------------------
4.1.4. the system checks the entry type 1:
SS6 = 1 point
---------------------------------------------------------------
The system checks the entry type 1 consists of a lockable mechanical barrier to
the entry.
Access control is implemented on all entrances to the building or on the
all entrances into the secure area.
Note: to section 4.1.
The system checks the entry of type 1 can only be used on entry into the secure
the category of confidential or Reserved.
When you check the entry into the secure area of an object or category
Top secret facilities are used for searching dangerous
substances or articles.
The system checks the entry, in accordance with section 5.2.8 EN 50133-1 Alarm
systems-control systems with inputs for use in the safety
applications-part 1: System requirements for class B, the access must
to report an unauthorized attempt to access or open space itself or
the expiry of the authorized period after lawful access to open space. Reporting
must take place within 10 seconds.
4.2. RANDOM inbound and outbound TOURS
---------------------------------------------------------------
4.2.1. Random inspection
SS12 = 1 point
---------------------------------------------------------------
Random Tours provides the authority of the State, legal or business
natural person and are carried out randomly at the entrance, the entrance, exit and
the exit of the object. Random inspections are intended as a deterrent
element against the protection of classified information.
4.3. MODE of VISITS in the object
---------------------------------------------------------------
4.3.1. Visits with accompaniment:
SS7 = 3 points
---------------------------------------------------------------
Visits must be accompanied throughout their stay in the object.
Must be a registered data on the visits, which includes personal
identifying information visits, accompanying persons and time data about
When the visit was done.
---------------------------------------------------------------
4.3.2. unaccompanied Visit:
SS7 = 1 point
---------------------------------------------------------------
The visits, which have allowed unaccompanied must be visibly
marked. In this case, must be clearly identified and all custom
staff.
Must be a registered data on the visits, which includes personal
identifying information visits and time data about when to visit
enforced.
---------------------------------------------------------------
4.3.3. The visits without control:
SS7 = not rated (N)
---------------------------------------------------------------
Visits to enter without inspection and escort.
5.
SURVEILLANCE EQUIPMENT AND ELECTRIC SECURITY SIGNALIZATION (ESS)
5.1. SECURITY
---------------------------------------------------------------
5.1.1. Surveillance of the type 5:
SS8 = 5 points
---------------------------------------------------------------
Surveillance of the type 5 ensure only members of the armed forces or
the armed forces and is carried out by way of irregular beats.
Surveillance carried out on patrol after a randomly selected routes at random
intervals of not more than 2 hours.
In the course of surveillance, including patrol, must be at the
the permanent surveillance of the constantly presence of at least one person designated for performance
the security guard.
---------------------------------------------------------------
5.1.2. Surveillance of the type 4:
SS8 = 4 points
---------------------------------------------------------------
Surveillance of the type 4 ensure only members of the armed forces or
the armed forces and is carried out by way of irregular beats.
Security patrols carried out at an interval of not more than 6 hours.
At night and on weekends, the frequency of beats increases.
In the course of surveillance, including patrol, must be at the
the permanent surveillance of the constantly presence of at least one person designated for performance
the security guard.
---------------------------------------------------------------
5.1.3. Surveillance of the type 3:
SS8 = 3 points
---------------------------------------------------------------
Surveillance of the type 3 provide the staff of the authority of the State, legal persons
or entrepreneurial natural persons whose object goes, members
the armed forces or of the armed forces, or employees of the security
protective services.
Beats of intervals are dependent on the internal operation and the extent
the assumed risk.
In the course of surveillance, including patrol, must be at the
the permanent surveillance of the constantly presence of at least one person designated for performance
the security guard.
---------------------------------------------------------------
5.1.4. Surveillance of the type 2:
SS8 = 2 points
---------------------------------------------------------------
Surveillance of the type 2 provide the staff of the authority of the State, legal persons
or entrepreneurial natural persons whose object goes, members
the armed forces or of the armed forces, or employees of the security
protective services.
For surveillance of type 2 are not required on patrol.
---------------------------------------------------------------
5.1.5. Surveillance of the type 1:
SS8 = 1 point
---------------------------------------------------------------
Security type 1 corresponds to the guarding object connection to the supervisory and
alarm receiving centre, allowing for rapid intervention.
Note to point 5.1.:
The rules for the performance of the surveillance is necessary in the case of the object, in which the
the area is secure, Confidential, secret or category of the top secret
or the rules of the area set out in a written form.
Surveillance of secure zones in which to store the classified
the European Union classification of information Confidential and higher, secures the
security type 2 and higher, the beats of frequency must be determined
at intervals of not more than 2 hours. First beat the security guard with the
executes immediately after the end of the work time.
The permanent surveillance of the station is located from the secure area category
Top secret and Secret as far as 500 m, or if the distance unit
the permanent surveillance of more than 500 m must be carried out in a surveillance action 5
minutes from the receipt of the alarm or emergency signal from an object
secure area or in the rules area.
Surveillance of the type 1 can be used only for objects of the category of confidential or
Reserved.
Surveillance must be equipped with means enabling the connection when the beat
the unit for the permanent surveillance of the performance. Response time of the surveillance on the alarm
or distress signal must be verified by the responsible person or the
an authorised person.
5.2. ELECTRICAL SECURITY SIGNALIZATION
---------------------------------------------------------------
5.2.1. Electrical security signalization type 4:
SS91 = 4 points
---------------------------------------------------------------
Electrical security signalization type 4 must be
certified the Office and meets the requirements according to EN 50131 1 ed. 2
Alarm systems-Alarm security and emergency systems-for
security level 4-high risk. Panic system fulfils the following
the requirements of the ČSN EN 50134-1 alarm systems-Systems calling
help.
---------------------------------------------------------------
5.2.2. Electric security signalization type 3:
SS91 = 3 points
---------------------------------------------------------------
Device type 3 electrical security alarm systems must be
certified the Office and meets the requirements according to EN 50131 1 ed. 2 for
security level 3-medium to high risk. Panic system meets the
on the requirements of the ČSN EN 50134-1.
---------------------------------------------------------------
5.2.3. the electrical security signalization type 2:
SS91 = 2 points
---------------------------------------------------------------
Electrical security signalization type 2 must be
certified the Office and meets the requirements according to EN 50131 1 ed. 2 for
security level 2-low to medium risk. Panic system meets the
on the requirements of the ČSN EN 50134-1.
---------------------------------------------------------------
5.2.4. The equipment of electric security signalization type 1:
SS91 = 1 point
---------------------------------------------------------------
Electrical security signalization of type 1 are not
certified by the Office.
Note to section 5.2.:
Subject of certification of electrical security signalization
they are:
and the control panel electrical security alarm systems),
b) detectors, electrical security signalization
c) perimeter detection systems,
(d) the emergency systems).
Table assign categories to the types of technical means of INTRUSION DETECTION
---------------------------------------------------------------
The type of classification for which was approved by the Point
technical competence is listed words or the value of the
the displayed shortcut resource
EZS to 31.12. 1999 from 1.1. 2000
---------------------------------------------------------------
4-type "PT" 4 points
Type 3 "top secret", "T" 3 points
2 type "confidential" "D" 2 points
---------------------------------------------------------------
---------------------------------------------------------------
5.2.5. The installation of electric security signalization
Type 4:
SS92 = 4 points
---------------------------------------------------------------
4 installation type is implemented in a secure area within the range:
and spatial protection)
(b)) the jacket protection
c) distress system
(d)) the shock detectors or special television scanning system
24 manholes secure area.
---------------------------------------------------------------
5.2.6. The installation of electric security signalization
Type 3
SS92 = 3 points
---------------------------------------------------------------
Installation type 3 is implemented in a secure area within the range:
and spatial protection)
(b)) the jacket protection
c) distress system or special television scanning system continuously
manholes of the secure area.
---------------------------------------------------------------
5.2.7. The installation of electric security signalization
Type 2
SS92 = 2 points
---------------------------------------------------------------
Installation type 2 is implemented in a secure area within the range:
and spatial protection)
(b)) the jacket protection.
Manholes in the secure area of the border in the event of installation
electrical security signalization type 2 may not be
protected by a sheath of protection elements, if their bottom edge meets the
the following terms and conditions:
and is located at least) 5.5 m above the ground,
(b)) could not be simply for him to penetrate from the roof or for help
lightning conductors, eaves, window sills, other construction elements, landscaping
inequalities, trees or other structures.
---------------------------------------------------------------
5.2.8. The installation of electric security signalization
Type 1
SS92 = 1 point
---------------------------------------------------------------
Type 1 installation is realized in the scope of spatial protection
secure area.
Note to 5.2.5 to 5.2.8.:
Installation of electric security alarm systems shall comply with the
requirements according to the standards ČSN EN (CLC/TS) 50131 in Alarm
Security and emergency systems.
The output of the device reporting the electrical security alarm systems and
special television system must be escorted to the designated
for the permanent surveillance of the performance.
Control device of electric security alarm systems in a secure
the area must be independent of the control device, electric
security alarm systems in other secure areas or
other areas.
Installation of electric security alarm systems must be
verified by functional test by TNI 334591-3. The range of functional tests
is determined at least every 12 months in table A1 (grade 1). Functional
the test must be recorded in a book or on the operational Protocol
the test, which will be deposited with responsible persons or authorised persons.
5.2.9. The calculation of the SS9 by scoring SS91 and SS92
SS9 = (SS91 + SS 92)/2 x SS92/CLO
The value of mathematically rounded to SS9 is a whole number.
The maximum value of the SS9 may be 4.
OBL is a point value designated secure area categories:
-------------------------------------
Category point value
secure OBL
area
-----------------------------------
Top secret 4 points
Secret 3 points
Confidential 2 points
Reserved 1 point
------------------------------------
If it is in a secure area, ensure the permanent presence of at least 1
person is not necessary to install the device security
the alarm; in this case, the value of the SS9 = 4.
The resulting point rating level of device security
the alarm is given by the point rating used technical
the lowest resource type.
5.3. SPECIAL TELEVISION SYSTEMS
Special television systems used to capture, transmit and display
the movement of people and means of transport. Special television systems are not
certified by the Office.
Installation of special television systems must comply with the requirements of the standards
the series EN 50132-Alarm transmission systems and equipment-CCTV
tracking systems for use in security applications.
6.
PERIMETER PROTECTION
The border perimeter is formed around the perimeter of a physical barrier.
6.1. the PHYSICAL BARRIER
Physical barriers are required around the perimeter of the border object there,
where it allows her character. The design of access points (input
Bran) must be on the same security level as the physical structure
barriers (fences). All access points must be secured
the same standard of control of entry.
---------------------------------------------------------------
6.1.1. The physical barrier type 4:
Ss10 = 4 points
---------------------------------------------------------------
The physical barrier type 4 allows the observation of the adjacent terrain. If that is the
possible, it must be left around the protected object's 25-metre free
space. The minimum height of the vertical section of the barrier is 2.15 meter. Must
be designed and constructed so as to provide the greatest obstacle
against penetration of the breakthrough. The upper part of the barrier must ensure the protection of the
overcoming a two-sided against climbing-sloping Struts protruding out and
inward at an angle of 45 ° with a minimum length of 40 cm, which is across the
the length of the attached barbed wire. The physical barrier type 4 must be accompanied by
perimetrickým of the detection system.
---------------------------------------------------------------
6.1.2. The physical barrier type 3:
Ss10 = 3 points
---------------------------------------------------------------
The physical barrier type 3 allows the observation of the adjacent terrain. If that is the
possible, it must be left around the protected object's 25-metre free
space. The minimum height of the vertical section of the barrier is 2.15 meter. Must
be designed and constructed so as to provide the greatest obstacle
against penetration of the breakthrough. The upper part of the barrier must ensure the protection of the
overcome-climbing against unilateral diagonal Struts jutting out under the
an angle of 45 ° with a minimum length of 40 cm, which is after the whole length of the attached
barbed wire.
---------------------------------------------------------------
6.1.3. Physical barrier type 2:
Ss10 = 2 points
---------------------------------------------------------------
The physical barrier type 2 must provide a barrier against attempting to
overcome by climbing and against penetration of the breakthrough. The minimum height of the vertical
parts of the barrier is 2.15 meter.
---------------------------------------------------------------
6.1.4. The physical barrier type 1:
Ss10 = 1 point
---------------------------------------------------------------
The physical barrier type 1 corresponds to the fence without special security
of the requirements. The purpose of this fence is to indicate the borders and to ensure
the minimum level of deterrence or resistance. The physical barrier type 1 can
be made up of any type of material.
---------------------------------------------------------------
6.2. checking the entry in all the perimeter access points
SS11 = 1 point
---------------------------------------------------------------
6.3. Perimeter detection system (PDS)
---------------------------------------------------------------
6.3.1. Perimeter detection system (PDS)-certified:
SS13 = 2 points
---------------------------------------------------------------
Perimeter detection system is certified by the authority, and subject to the
It requirements set out in point 5.2. Annex.
---------------------------------------------------------------
6.3.2. Perimeter detection system (PDS)-necertifikovaný:
SS13 = 1 point
---------------------------------------------------------------
Perimeter detection system certified by the authority and is not subject to the
It requirements set out in point 5.2. Annex.
---------------------------------------------------------------
6.4. safety lighting of the perimeter:
Ss14 = 2 points
---------------------------------------------------------------
Requirements for the installation of security lighting, for example, result from the
the requirements of a special television system on the perimeter.
---------------------------------------------------------------
6.5. Special television system on the perimeter:
SS15 = 2 points
---------------------------------------------------------------
Special television system is certified by the Office.
The installation of a special television system must meet the requirements of the standards
the series EN 50132-Alarm transmission systems and equipment-CCTV
tracking systems for use in security applications.
7.
DEVICE ELECTRIC FIRE ALARM
Fire detectors must be connected to the control panel electrical fire
the alarm, or to switch the electrical security signalization. In
both cases must be the signal of the alarm led on the unit specified
for the permanent surveillance of the performance.
Device electric fire alarm system must comply with the requirements of the standards
the series EN 54-fire alarm.
Electric fire alarm devices are not certified by the Office.
8. the DEVICE USED to search for DANGEROUS SUBSTANCES or ARTICLES
A device used to search for dangerous substances or articles are
used on entry to an object or to a secure area of the category
Top secret, or in the rules area, which regularly discuss
classified information top secret classification.
A device used to search for dangerous substances or articles are not
certified by the Office. The report shall be used in the range:
1. Walk-through metal detector, with manual
detector of metal objects.
2. X-ray machine for checking luggage, documented the positive
Decision of the State Office for nuclear safety of the type approval
sources of ionizing radiation in accordance with Act No. 18/1997 Coll. on peaceful
the use of nuclear energy and ionising radiation and amending and supplementing
certain acts, as amended.
9.
DEVICE PHYSICAL DESTRUCTION OF INFORMATION OR DATA CARRIERS
------------------------------------------------------------------
9.1. the physical destruction of the means of delivery of information or data type 4:
without a point rating
------------------------------------------------------------------
Device physical destruction of the means of delivery of information or data of type 4 are intended
for the destruction of classified information classification of top secret or
lower. Device physical destruction of the means of delivery of information or data is
certified by the Office.
-----------------------------------------------------------------------
Information or data carrier the size of the waste particles
-----------------------------------------------------------------------
paper, polyester film with width = 0.8 mm particle <
the information in the original size,
metal, plastic, identification
cards, magnetic tapes, hard
disks, floppy disks, compact disks and
a similar carrier; length = 13.0 mm particle <
-----------------------------------------------------------------------
film of polyester with the imposition of the particle surface area = < 0.2 mm2
information in a reduced size as
microfilm, smart cards, memory
chips and similar media;
-----------------------------------------------------------------------
Device physical destruction of the means of delivery of information or data of type 4 are intended
also for the destruction of classified information to a foreign power classification Strictly
secret or lower.
---------------------------------------------------------------
9.2. the physical destruction of the means of delivery of information or data type 3:
without a point rating
---------------------------------------------------------------
Device physical destruction of information or data carriers of type 3 are intended
for the destruction of classified information classification of Secret or lower.
Device physical destruction of information or data carriers is certified
By the authority.
-------------------------------------------------------------------
Information or data carrier the size of the waste particles
-------------------------------------------------------------------
paper, polyester film with width = 2.0 mm particle <
saving information
in original size, metal,
plastic identification particle length = < 15.0 mm
card, floppy disk, compact
discs and similar media;
------------------------------------------------------------------
film of polyester with the imposition of the particle surface area = < 0.5 mm2
information in miniature
size as the microfilm,
smart cards and similar carriers
-------------------------------------------------------------------
Device physical destruction of information or data carriers of type 3 are intended
also for the destruction of classified information to a foreign power classification Strictly
secret or below only if the width of the waste particles up
1.5 mm.
---------------------------------------------------------------
9.3. the physical destruction of the means of delivery of information or data type 2:
without the scoring
---------------------------------------------------------------
Device physical destruction of information or data carriers of type 2 are intended
for the destruction of classified information confidential or a lower grade.
Device physical destruction of information or data carriers is certified
By the authority.
Information or data carrier the size of the waste particles
-----------------------------------------------------------------------------
paper, film cross-cut particles width = < 4.0 mm
of polyester with the imposition of a length = 80.0 mm particle <
the information in the original
size, metal, floppy disks,
compact discs and
a similar carrier; direct cut the width of the bar = < 2,0 mm
length of the bar = < 297,0 mm
the area of the particles = < 320,0 mm2
-----------------------------------------------------------------------------
plastic, etc. the width of the particles = < 4.0 mm
identification cards
length = 80.0 mm particle <
-----------------------------------------------------------------------------
the film particle surface area = < 1.0 mm2 of polyester with saving information in a reduced size as microfilm, smart cards, and similar carriers-----------------------------------------------------------------------------Note: applies only to the mass of the device with the power of > = 500 kg/h
Device physical destruction of information or data carriers of type 2 are intended
also for the destruction of classified information to a foreign power classification Confidential
and lower only if the width of the waste particles up to 3 mm and
maximum length of 25 mm. Surface treatment of the particulates must not exceed 60 mm2
with the exception of the means of delivery of information or data, where is a fixed area of the particles = <
1.0 mm.
---------------------------------------------------------------
5.8. the physical destruction of the means of delivery of information or data type 1:
without the scoring
---------------------------------------------------------------
Device physical destruction of the means of delivery of information or data of type 1 are intended
for the destruction of classified information classification Reserved. Device
the physical destruction of the means of delivery of information or data is certified by the Office.
--------------------------------------------------------------------------
The carrier of the information or the size of the waste particles
data
--------------------------------------------------------------------------
paper, film straight cut width = 6.0 mm bar <
of polyester with the
saving information bar length unlimited
in the original
size, metal,
floppy disk, compact surface particles = < 320.0 mm2
drives and similar
carriers;
--------------------------------------------------------------------------
Note:
* Applies only to the mass device with an output of 500 kg/h.
9.5. the physical destruction of information or data media type 0: no
the score
Device physical destruction of the means of delivery of information or data type 0 are intended
for the destruction of classified information classification of top secret or
lower. The destruction is used burning or melting down, taking the temperature,
that will be exposed, and the period of its operation, must lead to their
total destruction. The responsible person or the designated person, who carries out the
decommissioning of classified information shall ensure that the use of the method of burning
or melt, completely destroying the carriers and the impossibility of recovery
the classified information.
10.
THE DEVICE AGAINST PASSIVE AND ACTIVE EAVESDROPPING OF CLASSIFIED INFORMATION
In the rules area for the regular discussion of classified information degrees
the confidentiality of secret and top secret is protected by technical means
against passive and active eavesdropping classified information. This
the Office does not certify equipment.
Requirements to ensure the rules of the area against passive and active
interception:
against passive eavesdropping) must be provided in the rules area
sufficiently soundproofed walls, doors, floor and ceiling,
(b)) Windows, vents or air conditioning vents must be protected
technical means, certified by the authority. In the rules area must be
protected against the lip of the sites located outside the meeting area,
(c)) in the rules area must not be placed any furniture or
any device, if you have not undergone scrutiny, whether in the rules area
There is no illegal use of the technical means intended for
getting information (hereinafter referred to as "tour"). Furniture and equipment
the rules must be registered (including type, where appropriate, the serial and
the inventory number), including the history of the movement,
(d)) position the appliance in the area of telephone rules is not desirable. If
their installation is absolutely necessary, must be equipped with a circuit breaker
or disconnect them manually before the hearing,
(e)) in the rules area cannot be brought into mobile phones, any
recording equipment, broadcasting equipment, any testing, measuring and
diagnostic equipment, and other electronic devices (this does not apply in
If it is a device used in the defence performed
tours with the knowledge of the responsible person or authorised person),
(f)) for the reference area shall be processed by the rules for the registration and movement
people and equipment.
According to § 26 paragraph. 1 the law is obliged to request the Office of the person responsible for the
the implementation of the defence. The defense will be verified during inspection
deploy technical means against passive and active eavesdropping
the classified information.
Defence tour meeting areas are carried out within the time limits referred to in section 10
paragraph. 1 of this Decree, and further it is necessary to carry out the Defense always tour
after unauthorized entry or suspicion on him and after the departure of workers
carrying out maintenance or adjustments in the rules area.
Request for execution of the defence of the tour includes:
and the business name, the name), where appropriate, the name and surname if the applicant is
the entrepreneur or the name of the authority of the State, including identification numbers, if
It was allocated, the
(b) the address where the rules area),
(c)) of the assessment floor area and the height of the ceilings,
(d) the period of time envisaged the implementation of defence) tours,
(e) implementation of the defensive tour) the reason (e.g. due to tween furniture
or suspected unauthorized access),
(f)) name and surname of contact the worker and the contact link,
(g) the signature of the responsible person).
The requirements for the implementation of Defense inspections:
and the natural person conducting the defence) of the tour must be in possession of
valid certificate of physical persons for classification of Secret or higher,
(b)) on the progress of the defence of the tour should be a report containing:
1. the data about the authority of the State, that carries out the defensive tour
2. name of the company if the applicant is an entrepreneur or the name of the authority of the State
including identification numbers, if assigned, which uses
referred to in the rules area,
3. the address of the location in the rules area,
4. the date and time the defence examination,
5. a description of the rules area (controlled area), including the
photodocumentation,
6. the acts performed,
7. used the inspection, measuring and test equipment,
8. the results of the measurements,
9. the result of the (guest) defence of the tour.
Report on the progress of Defense inspections must be attached to the project
physical security.
11.
CONDITIONS FOR THE USE OF CERTIFIED TECHNICAL RESOURCES AFTER THE EXPIRY OF THE
THE PERIOD OF VALIDITY OF THE CERTIFICATE
Technical means for the protection of classified information must be newly
taken at the time of validity of the certificate.
After the expiry of the period of validity of the certificate may be a technical resource
for the protection of classified information used or deployed under the condition that
It is fully functional. This must be verified by the functional test. Time
the intervals are set out in section 10 of this Ordinance.
The mechanical barrier devices and the equipment for the physical destruction of the means of delivery
information and data, the functional test shall demonstrate writing signed by the responsible
person or authorised person. For other technical resources
functional test showing a test protocol (e.g., revision, a record in the
opening the book). The result of the tests shall be deposited with the person responsible
or authorised person.
12.
THE POINT VALUES OF THE LOWEST DEGREE OF SECURITY, PHYSICAL SECURITY
12.1. the table POINT VALUES MINIMUM EXTENT SECURITY SECURE
AREA
---------------------------------------------------------
The SECURE AREA of the level of risk
CATEGORY
Top Secret----------------------------
small medium large
---------------------------------------------------------
Mandatory: (S1) + (S2) + (S3) 10 11 13
Mandatory: (S4) + (S5) 6 7 7
Optional: (S6) 4 5 5
---------------------------------------------------------
The overall result of 20 23 25
---------------------------------------------------------
---------------------------------------------------------
The SECURE AREA of the level of risk
CATEGORY
Secret
---------------------------------------------------------
small medium large
---------------------------------------------------------
Mandatory: (S1) + (S2) + (S3) 8 9 10
Mandatory: (S4) + (S5) * 4 5 5
Optional: (S6) 4 5 5
---------------------------------------------------------
The overall result of 16 19 20
---------------------------------------------------------
The SECURE AREA of the level of risk
CATEGORY
Confidential
small medium large
---------------------------------------------------------
Mandatory: (S1) + (S2) + (S3) 6 8 9
Mandatory: (S4) + (S5) 2 3 3
Optional: (S6) 3 3 4
---------------------------------------------------------
The overall result of 11 14 16
---------------------------------------------------------
---------------------------------------------------------
SECURE AREA CATEGORY
Reserved
for storing classified information in
the components of an information system or
kryptografickém or resource that requires
Special arrangements for waste management
---------------------------------------------------------
Mandatory: (S1) + (S2) + (S3) 2
Optional: (S4) + (S5) (S6) + 1
---------------------------------------------------------
The overall result 3
---------------------------------------------------------
Note:
-Value (S5) must reach at least 5 points.
*-Value (S5) must reach at least 4 points.
Only one of the values (S1) (S2) or (S3) can be equal to 0.
Fixed object, secure area can make use of the business
related to the protection of classified information, only one authority of the State,
a legal entity or a natural person-entrepreneur.
Table point values for secure area Reserved category,
not used for storage of EU classified information in the components of the information
system or in the kryptografickém resource or not requiring special
the mode of loading, it is not necessary to handle. In this case, only one of the
values (S1) (S2) or (S3) may not be realized.
In a secure area Dedicated to storing
classified information in the components of the information system, is the point
the value of the lowest degree of security established as the minimum. Spot
the guest can be increased on the basis of the certification report information
system located in the secure area.
7.6. the table POINT VALUES of the LOWEST DEGREE of SECURITY RULES AREA
--------------------------------------------------------------------------
In the RULES AREA of the level of risk
for regular consultation
classified information degree classification
Top Secret
--------------------------------------------------------------------------
small střednívelká
--------------------------------------------------------------------------
Mandatory: (S2) + (S3) 6 6 7
Mandatory: (S4) + (S5) 6 7 7
Optional: (S6) 4 5 5
--------------------------------------------------------------------------
The overall result of 16 18 19
--------------------------------------------------------------------------
In the RULES AREA of the level of risk
for regular consultation
classified information degree classification
Secret
--------------------------------------------------------------------------
small střednívelká
--------------------------------------------------------------------------
Mandatory: (S2) + (S3) 5 5 6
Mandatory: (S4) + (S5) * 4 5 5
Optional: (S6) 4 5 5
--------------------------------------------------------------------------
The overall result of 13 15 16
--------------------------------------------------------------------------
Note:
-Value (S5) must reach at least 5 points.
*-Value (S5) must reach at least 4 points.
Value (S2) must be equal to 0.
Provided for in the rules area may benefit from the related activities
the protection of classified information, only one authority of the State, legal or
entrepreneurial natural person.
13.
PHYSICAL SECURITY OF INFORMATION SYSTEMS (IS)
If you are in a secure area or such part of the found object
the information system, which may include classified information, views
on this part of the information system as the security equivalent of
úschovného object (SS1). The identification together with the authorisation of the user
form the security equivalent of the lock object úschovného (SS2). The value of the
SS1 and SS2 you can use the table to the point values of the lowest degree of
security secure and rules area (point 12). In
justified cases, when the minimum required sum cannot be achieved
the values S1, S2 and S3 must be the component information system
secured certified electrical safety devices
the alarm, which corresponds to the setup type 4 in accordance with section 5.2.5.
Information systems that are used only for displaying, processing or
the transfer of classified information to the level of classification of the secret can be placed
inside the object outside the secured area or inside the object without
secure or in the rules area.
14.
THE STRUCTURE OF THE PROJECT, THE PHYSICAL SECURITY OF THE OBJECT CATEGORY TO BE CONFIDENTIAL AND
HIGHER
Content of the project physical safety is determined depending
on the category of the object or area in the range of staveném in section 32 of the Act in
paragraph. 1, 3, or 4.
14.1. RISK ASSESSMENT
Risk assessment includes:
and) specifications of assets-estimated the quantity of classified information
According to degrees of confidentiality,
(b) the determination of the various threats and) vulnerability and their evaluation,
(c) the determination of the overall risk level) as "small", "medium" or "large".
14.2. the DETERMINATION of CATEGORIES of OBJECT, SECURE AREAS and meeting
AREAS INCLUDING THEIR BOUNDARIES AND DETERMINATION OF CLASSES OF THE SECURE AREA
1. General introduction (address), a description of the premises/building (a description of the boundaries, the number of
buildings/number of storeys, inputs, or security), around (especially
objects, which could affect the safety of the foreign bodies in)
campus/building (number, where applicable, the name and focus of activities), the schema.
2. determination of the object and its type.
3. Determination of the boundaries of the object (in the area of location/building, the strength of the walls,
the inputs, the height of the window, the permanent surveillance of the unit).
4. A description of the object's security.
5. The border may want to object drawing parts of the technical documentation
physical security (section 14.3.2 where it.).
6. determination of the secure area, which is at an object,
their type, category and class. It is necessary to distinguish whether this is a
úložny classified information, workplace information system area
with a permanent presence here, working people, meeting room or
the combination of these types.
7. Determination of the borders secure and meeting areas (location in the
object, the strength of the walls, floors and ceilings, the inputs, the height of the lower edge of the
průlezných the holes above the surrounding terrain) and their depiction in the drawing
parts of the Technical documentation of the physical security (section 14.3.2 where it.).
8. For each of the secure area and process table scatter
assessment of physical security measures.
8.9. HOW to USE the MEASURES of PHYSICAL SECURITY
14.3.1. the table POINT EVALUATION MEASURES of PHYSICAL security in the
SECURE AND RULES AREA
The table header contains the following information:
and secure) the name (the rules) area
(b)) category and class of security
(c)) kind of rules depending on the area of classified information
are regularly discussed,
(d)) the purpose for which it has a secure area to serve.
--------------------------------------------- -------------------------- ----------------------
SECURITY MEASURES TYPBODOVÉ
VALUATION of the
--------------------------------------------- -------------------------- ----------------------
The storage objects * T 4-4 points the SS1 =
T 3-3 points
T 2-2 points
--------------------------------------------- -------------------------- ----------------------
Locks object úschovných * T 4-4 points SS2 =
T 3-3 points
T 2-2 points
--------------------------------------------- -------------------------- ----------------------
Storage object, including locking system * T 1-1 point S1 =
T-1A-1 point
T-1B-2 points
T-1 c-3 points
--------------------------------------------- -------------------------- ----------------------
Overall evaluation of the úschovného object and its S1 = S1 x = SS1 SS2
Castle
--------------------------------------------- -------------------------- ----------------------
Secure the T 4-4 points of SS3 =
T 3-3 points
T 2-2 points
* T 1-1 point
--------------------------------------------- -------------------------- ----------------------
Secure locking system the T 4-4 points SS4 =
T 3-3 points
T 2-2 points
* T 1-1 point
--------------------------------------------- -------------------------- ----------------------
The total valuation of the secure area and S2 = SS3 SS4 S2 = x
its locking system
--------------------------------------------- -------------------------- ----------------------
The object of T 4-4 points = S3
T 3-3 points
T 2-2 points
* T 1-1 point
--------------------------------------------- -------------------------- ----------------------
The system checks the entry of T 4-4 points
T 3-3 points = SS6
T 2-2 points
* T 1-1 point
--------------------------------------------- -------------------------- ----------------------
Visits in the object mode
and Visits to the accompaniment of) ad and)-3 point SS7 =
(b)) Visits unaccompanied * ad b)-1 point
(c)) Visits without checking the ad c)-not yet rated
--------------------------------------------- -------------------------- ----------------------
Overall evaluation of the control input S4 = SS6 SS7 + S4 =
--------------------------------------------- -------------------------- ----------------------
Surveillance * T 5-5bodů = SS8
T 4-4 points
T 3-3 points
T 2-2 points
* T 1-1 point
--------------------------------------------- -------------------------- ----------------------
Electrical security signalization * T 4-4 points
T 3-3 points
T 2-2 points = SS91
* T 1-1 point
--------------------------------------------- -------------------------- ----------------------
Installation of electric security * T 4-4 points = SS92
signaling * T 3-3 points
T 2-2 points
* T 1-1 point
--------------------------------------------- -------------------------- ----------------------
An intermediate result (SS 9) = SS9
--------------------------------------------- -------------------------- ----------------------
Overall evaluation of the surveillance of the S5 = + S5 = SS8 SS9
and the SEC.
--------------------------------------------- -------------------------- ----------------------
The physical barrier of T 4-4 points = SS10
T 3-3 points
T 2-2 points
* T 1-1 points
--------------------------------------------- -------------------------- ----------------------
Check the entry in the access points
perimeter = SS11
and the check is implemented) ad)-1 point
(b)) control is not implemented ad b)-0 points
--------------------------------------------- -------------------------- ----------------------
Random inbound and outbound tours
and inspection) are performed by the SS12 =
(b) inspection) are not carried out ad)-1 point
* ad b)-0 points
--------------------------------------------- -------------------------- ----------------------
Perimeter detection system (PDS) SS13 =
-Certified Office 2 points
-necertifikovaný Office 1 point
--------------------------------------------- -------------------------- ----------------------
Perimeter security lighting = SS14
2 points
--------------------------------------------- -------------------------- ----------------------
Special television system on the perimeter, 2 points
SS15 =
--------------------------------------------- -------------------------- ----------------------
Overall evaluation of protection perimeter S6 = (SS10 SS11 x) + SS12 +
SS13 SS14 SS15 S6 + + =
--------------------------------------------- -------------------------- ----------------------
The value of the variable S1 to S6 obtained by filling in the table
evaluation of measures of physical security in a secure area, it is necessary to
compare with point values minimum extent table security
secure and rules the area referred to in section 12. Annex
On the basis of this comparison it is necessary to determine whether the measures taken
physical security for a given level of risk, and the category secure
the area is sufficient.
On the basis of this comparison it is necessary to determine whether the measures taken
physical security for a given level of risk, and also on the degree of
classified information is regularly discussed in the rules area
sufficient.
Verify that each of the physical security measures applied and
evaluation of the risks of the project correspond to physical safety and legal
the legislation on the protection of classified information, performs responsible
person or authorised person.
Functional tests for electrical security systems shall be carried out according to the
TNI 3345 91-3. The range of functional tests and the time interval is set in the
table A1 (grade 1). Functional tests for other conditions
technical equipment provides the responsible person or authorised person.
Write about performing functional tests of the technical resources listed in
§ 30 paragraph. 1 of the Act shall be deposited with the person responsible or responsible for
of the person.
14.3.2 where it the TECHNICAL DOCUMENTATION the PHYSICAL SECURITY
This documentation is broken down into the following parts:
and) that contains the drawing documentation, in particular the designation of boundaries
object, each of the secure borders and meeting areas, and
the deployment of technical means intended for the protection of classified
the information in the object, and secure and meeting areas
(b) the Technical Documentation, resource) which provides, in particular,
1. enumeration of (name, number, and in the case of multiple types of one kind of technical
even the location of the resource)
2. a copy of the certificate and of the annex from the time of installation,
3. entries for the assessment of conformity of the time (specify the installation and specification
How to use).
8.9. OPERATING PROCEDURES
The operational order includes:
1. the rules for the movement of persons (including visitors) and transport
resources in the campus/building
2. the rules for the movement of persons (including visitors) and transport
in the resource object and secure areas
3. the rules for the movement of classified information in the object,
4. the rules for the treatment of operational technical documentation
resources containing guidelines for the use of technical means,
date of installation and fixing of the regular checks of technical functionality
resources (e.g. operational books, operating instructions EZS, special
tv system, EQ, EPS and equipment against passive and active
the interception, etc.),
5. rules for handling keys and identification devices from
the inputs to the object, and the secure area and with the keys from úschovných
objects. These rules shall address, in particular, the system and method of labelling,
allocation and presentation of these keys and identification devices,
their safekeeping and registration, how to lose, save for duplicates and
the rules for their use. In the event that the responsible person or the
the designated officer decided to store the key or identification resources
outside the object must keep a record of that fact and shall ensure
control of compliance with the rules of manipulation with the key or identification
resources outside the object. Similar rules should be laid down for
treatment with combinations of characters, used as a password zjednávající
access to secure areas or objects, úschovných objects,
6. Description of the measures for the protection of režimových meeting areas
7. the rules for establishing the number of members in the performance of security surveillance, how to
the performance of surveillance, in particular how to check persons and means of transport
When the input and output, method of implementation and the type of response the security guard stops
the alarm output report technical means; in the event that the
surveillance is exercised on the basis of the contractual relationship, it is necessary to attach
a copy of the contract.
14.5. the PLAN of the ZEBEZPEČENÍ OBJECT, SECURE AREAS and RULES AREA
IN CRISIS SITUATIONS
Description of the measures to minimize the threats and vulnerabilities that are described in the
Chapter evaluation of risks.
Guidelines for the protection of classified information in the event of an emergency
the situation.
15.
THE STRUCTURE OF THE PROJECT, THE PHYSICAL SECURITY OF THE OBJECT CATEGORY RESERVED
Content of the project physical security is fixed in the range
referred to in section 32, paragraph. 2 and 4 of the Act.
9.4. the determination of the OBJECT, SECURE AREAS, INCLUDING THEIR BOUNDARIES and classes
SECURE AREAS
1. Determination of the boundaries of the object (in the area of location/building, inputs, height
Windows, permanent surveillance of the unit).
2. Border may want to object to the drafting of Technical documentation
physical security (paragraph 15.2.1. of the annex).
3. determination of the secure area, which is at an object and
of their class. It is necessary to distinguish whether this is a úložny of classified
the information workplace information system, areas with permanent
the presence here of persons employed or a combination of these types.
4. determination of the boundaries of the secure area (the location of the object, the strength of the
the walls, floors and ceilings, the inputs, the height of the lower edge of the průlezných holes
above the surrounding terrain) and their depiction in the drafting of the technical
documentation of physical security (paragraph 15.2.1. of the annex).
9.4. HOW to USE the MEASURES of PHYSICAL SECURITY
How to use the measures of physical security describes:
and the way surveillance, performance)
(b) the measures taken by the regime), physical security (in particular the mode of movement
people, the movement of classified information and the rules for the handling of
keys).
15.2.1 the TECHNICAL DOCUMENTATION of the PHYSICAL SECURITY
This documentation is broken down into the following parts:
and) that contains the drawing documentation, in particular the designation of boundaries
object, each of the secure areas borders and layout
technical means intended for the protection of classified information in
the object and the secure areas.
(b) the Technical Documentation, resource) which provides, in particular,
1. enumeration of (name, number, and in the case of multiple types of one kind of technical
even the location of the resource)
2. a copy of the certificate and of the annex from the time of installation,
3. entries for the assessment of conformity of the time (specify the installation and specification
How to use)
.
In the secure area, where it stores the secret information classification
Dedicated in components of the information system or kryptografickém
the resource or that requires a special loading mode, further
processes referred to in section 14.3.1. table scatter evaluation measures
the physical security of the secure area.
Annex 2
THE NATIONAL SECURITY OFFICE
Post offices. bin. 49
Prague 150 06 56
------------------------------------------------------------------
National Security Authority issued pursuant to section 46 of the Act
No 412/2005 Coll., on the protection of classified information
and the security of the eligibility
CERTIFICATE
technical resource
Registration number:.. ...
...............................................
(Name and description of the technical resource)
Manufacturer:
Head Office/residence/place of business/address: IDENTIFICATION NUMBER/social security number
Holder:
Head Office/residence/place of business/address: IDENTIFICATION NUMBER/social security number
This certificate confirms validation of technical competence
resource type:
.....
The scores of the technical resource according to annex No 1
Decree No. 528/2005 Coll. on physical security
and certification of technical means:
.....
The certificate is valid until:
Date of issue of the certificate:
The imprint of the official stamp
Signature of authorized representative
Annex:
(Annex is an integral part of the certificate and can be reproduced
only).
1) section 27 of Act No. 412/2005 Coll., on the protection of classified information and on the
Security eligibility.
section 24, paragraph 2). 3 of law No 412/2005 Sb.
section 24, paragraph 3). 4 of law No 412/2005 Sb.
4) § 2 (b). (e)) of law No 412/2005 Sb.
5) § 2 (2). 7 of Act No. 219/1999 Coll., on the armed forces of the Czech
Republic, as amended.
6) § 25 paragraph. 1 of law No 412/2005 Coll. as amended by Act No. 255/2011 Sb.
7) section 6 (1). 1 and section 11 (1). 1 of law No 412/2005 Sb.
8) Law No. 22/1997 Coll., on technical requirements for products and amending
and additions to certain laws, as amended.
Act No. 102/2001 Coll., on general product safety and amending certain
laws (law on general product safety), as amended
regulations.
9) § 46 paragraph. 15 and section 52 of the Act No. 412/2005 Sb.
10) section 13 of Act No. 505/1990 Coll., on metrology, as amended
regulations.
11) section 14 of Act No. 22/1997 Coll.
Communication from the Ministry of industry and trade no. 272/1998 Coll.