Nato Unclassified Document: Annex 1 Action Officer: R. Grumberg, NOS (Ext: 9182) Original: English
Nato Unclassified Document: Annex 1 Action Officer: R. Grumberg, NOS (Ext: 9182) Original: English
SECURITY COMMITTEE
1. At Annex is the third revision of the Directive on Physical Security which is published
in support of the Security Within the North Atlantic Treaty Organization, C-M(2002)49-REV1.
It is binding and mandatory in nature. This document replaces AC/35-D/2001-REV2 which
should be destroyed.
NATO UNCLASSIFIED
-1-
NHQD207445
NATO UNCLASSIFIED
ANNEX 1
AC/35-D/2001-REV3
INTRODUCTION 2
BASIC PRINCIPLES 2
GENERAL PHYSICAL SECURITY REQUIREMENTS 3
Security Areas 4
Administrative Zone 5
PUBLICLY DISCLOSED - PDN(2021)0002 - MIS EN LECTURE PUBLIQUE
NATO UNCLASSIFIED
1-1
NATO UNCLASSIFIED
ANNEX 1
AC/35-D/2001-REV3
INTRODUCTION
1. This Physical Security Directive is published by the Security Committee (AC/35) in support
of Enclosure D to the NATO Security Policy (C-M(2002)49). The Directive contains mandatory
provisions and also includes information which clarifies the meaning of those provisions.
This Directive addresses the following aspects:
(a) basic principles;
PUBLICLY DISCLOSED - PDN(2021)0002 - MIS EN LECTURE PUBLIQUE
BASIC PRINCIPLES
2. All premises, buildings, offices, rooms, and other areas in which NATO Classified
Information is stored, handled and/or discussed shall be protected by appropriate physical security
measures. In deciding what degree of physical security protection is necessary, account shall be
taken of all relevant factors, including:
(a) the level of security classification and category of information;
(b) the quantity and form of the classified information (hard copy, and/or electronic)
stored and/or handled;
(c) access control and enforcement of the need-to-know principle;
(d) the threat from hostile intelligence services which target NATO and/or NATO Nations,
and the locally-assessed threat of terrorism, espionage, subversion, sabotage, and
(organized) crime; and
(e) how the classified information will be stored (e.g. hard copy or electronic and
encrypted).
NATO UNCLASSIFIED
1-2
NATO UNCLASSIFIED
ANNEX 1
AC/35-D/2001-REV3
6. Physical security programmes shall be based on the principle of “defence in depth”, using
an appropriate combination of complementary physical security measures which provide a degree
of protection meeting the requirements associated with the criticality and vulnerability of
the organization and its information. Although physical security measures are site-specific, and
determined by a number of factors (e.g. locally-assessed threat, building construction and
architecture, environmental considerations, site location), the following general principles shall
apply:
(a) it is first necessary to identify the assets that require protection. This is followed by
the creation of layered security measures to provide “defence in depth” and delaying
factors;
(b) the outermost physical security measures shall define the protected area and deter
unauthorised access;
(c) the next layer of measures shall detect unauthorised or attempted access and alert
the guard force;
(d) the innermost layer of measures shall sufficiently delay intruders until they can be
detained by the guard force. Consequently, there is an interrelationship between
the reaction time of the guard force and the physical security measures designed
to delay intruders.
NATO UNCLASSIFIED
1-3
NATO UNCLASSIFIED
ANNEX 1
AC/35-D/2001-REV3
7. Equipment that provides physical security (e.g. CCTV, IDS, secure cabinets) shall be
regularly maintained to ensure that it operates at optimum performance. It is also necessary to
periodically re-evaluate the effectiveness of individual security measures as well as the complete
security system. This is particularly important if there is a change in use of the site or specific
elements of the security system. This can be achieved by regularly exercising incident response
plans (normally, on an annual basis).
8. The local security authority shall carefully assess the presence of any electronic systems
or mobile devices with recording and/or transmitting capabilities (e.g. mobile phones, smart phones
and/or watches, tablets, laptops, Internet of Things devices) in areas where NATO Classified
Information is stored, handled or discussed. The supporting document on the use of mobile devices
on NATO premises (AC/35-D/1042) can be used to develop security requirements and local
PUBLICLY DISCLOSED - PDN(2021)0002 - MIS EN LECTURE PUBLIQUE
Security Areas
9. Security Areas are areas in which information classified NATO CONFIDENTIAL (NC) and
above is stored, handled, or discussed. The provisions of the following paragraphs apply equally to
Security Areas of fixed and temporary nature, as appropriate. Such areas shall be organised and
structured so as to correspond to one of the following:
(a) NATO Class I Security Area: a particularly sensitive area in which information
classified NC and above is stored, handled, or discussed in such a way that entry into
the area constitutes, for all practical purposes, access to NATO Classified Information
and therefore unauthorised entry would constitute a security breach. Such areas may
include operations rooms, communications centres or archive facilities and require:
(i) a clearly defined and protected perimeter through which all entry and exit is
controlled;
(ii) an entry control system which grants access only to those individuals
appropriately cleared and specifically authorised1 to enter the area;
(iii) a determination of the level of security classification and the category of
the information (e.g. ATOMAL, BOHEMIA) normally stored in the area,
i.e. the information to which entry gives access; and
(iv) a clear indication that entrance into such areas requires specific authorisation
by the local security authority. This indication may include the level of security
classification and/or the sensitivity of the area.
(b) NATO Class II Security Area: an area in which information classified NC and above
is stored, handled, or discussed in such a way that it can be protected from access
by unauthorised individuals utilizing internally established controls. Such areas may
include working offices or meeting rooms where NATO Classified Information is
stored, handled or discussed. These areas require:
(i) a clearly defined and protected perimeter through which all entry and exit is
controlled;
1 Specifically authorised refers to those personnel who have been formally recognised as having
a need-to-know and access based on the nature of their employment responsibilities, and are
included on an access control list, as well as individuals who have been formally authorised by
the head of the organization in question on an ad hoc basis to perform a specific role or duty.
NATO UNCLASSIFIED
1-4
NATO UNCLASSIFIED
ANNEX 1
AC/35-D/2001-REV3
10. All security areas (e.g. offices, meeting and conference rooms, technically secure areas,
etc.) where NATO Classified Information is discussed shall be periodically evaluated for risks of
PUBLICLY DISCLOSED - PDN(2021)0002 - MIS EN LECTURE PUBLIQUE
overhearing. Where the relevant security authority determines such risks exist, classified
discussions should be prohibited, or appropriate corrective procedural measures (e.g. identifying
meetings rooms established for classified discussions) or technical measures (e.g. soundproofing
walls, doors, and ceilings, installing sound attenuation systems, etc.) shall be taken.
11. Those Security Areas which are not occupied by duty personnel on a 24-hour basis shall
be inspected immediately after normal working hours to ensure that they are properly secured
unless an IDS used for this purpose is activated.
12. An appropriate Access Control (e.g. pass or personal recognition system) governing
the regular staff shall control entry into Class I or Class II Security Areas.
Administrative Zone
13. An Administrative Zone shall be established around or leading to NATO Class I or Class II
Security Areas. Only information classified at the level of NATO RESTRICTED (NR) may be stored,
handled or discussed in Administrative Zones. Such areas require a visibly defined perimeter, within
which the possibility exists for the control of individuals and vehicles. However, individuals are not
required to be escorted.
15. Technically Secure Areas shall be subject to regular physical and technical2 inspections
and entry to them shall be strictly controlled. The following measures shall be applied to protect
against technical attacks and eavesdropping:
(a) implementation of the appropriate level of physical and technical security measures
to enforce risk-based access controls. The responsibility for determining the risk is
shared between the appropriate technical specialists and the security authority which
provides advice to the risk owner for a decision/approval;
2 Technical inspection refers to electronic sweeping or surveying of an area to determine the potential
presence of information collection devices (microphones, cameras, etc.) or communication jamming
devices.
NATO UNCLASSIFIED
1-5
NATO UNCLASSIFIED
ANNEX 1
AC/35-D/2001-REV3
(b) such areas shall be locked and/or guarded when not occupied and any keys shall be
treated as security keys3. Regular physical and/or technical inspections,
in accordance with the requirements of the appropriate security authority, shall be
undertaken. Such inspections shall also be conducted following any unauthorised
entry or suspicion thereof, as well as following the entry of any external personnel
(e.g. for the purposes of maintenance work, re-decoration);
(c) no item, furnishing or equipment shall be allowed into these areas until it has been
thoroughly examined for eavesdropping devices by trained security staff.
An appropriate record of items, furnishings and equipment moved into and out of
these areas shall be maintained;
(d) the presence of any electronic systems or mobile devices with recording and/or
PUBLICLY DISCLOSED - PDN(2021)0002 - MIS EN LECTURE PUBLIQUE
transmitting capabilities (e.g. mobile phones, smart phones and/or watches, tablets,
laptops, Internet of Things devices) shall be prohibited;
(e) telephones and other video conference devices shall normally not be installed in such
areas. However, where their installation is unavoidable, they shall be physically
disconnected when classified discussions take place. This does not apply
to appropriately installed and approved communication devices (e.g. classified
phone-lines, video conferencing equipment).
Perimeter
17. A perimeter forms a physical barrier and identifies the boundary of an area requiring
security protection.
3 Security keys are those which operate the locks fitted to: secure cabinets provided for the storage of
classified information; doors of secure rooms or areas; doors of secure rooms or areas which have
been subject to technical security inspections; and security cabinets used for the circulation of
classified documents. Security Keys are to be handled as and protected in the same manner as
the classified information to which they grant access.
NATO UNCLASSIFIED
1-6
NATO UNCLASSIFIED
ANNEX 1
AC/35-D/2001-REV3
19. The level of protection offered by a perimeter fence depends on its design, construction
material, height, foundation type and depth, and any additional security features used to increase
its performance and effectiveness (e.g. topping, perimeter intrusion detection system, lighting,
closed circuit television). Some buildings may not have perimeter fences, but may have
other barriers and infrastructure that act as a physical barrier.
20. A perimeter barrier only delays a determined intruder for a short period of time and should
therefore be supplemented by an intrusion detection system (IDS), closed circuit television (CCTV),
security lighting and periodic but random patrols by the appropriate security guards or forces.
21. The effectiveness of a perimeter also depends on the level of security at the entry points.
Therefore, the gates shall be constructed to the same security standard as the perimeter and some
PUBLICLY DISCLOSED - PDN(2021)0002 - MIS EN LECTURE PUBLIQUE
23. In accordance with the principle of “defence in depth”, IDS may be used in rooms and
buildings in place of, or to assist, guards. To be effective, an IDS should have a response force that
will react within a reasonable timeframe in the event of an alarm being activated.
Access Control
24. The term “access control” encompasses a pass or personal recognition system including
arrangements for controlling and escorting contractors and visitors.
25. Access control may be exercised over a site, a building or buildings on a site, or areas,
zones or rooms within a building. The control mechanism may be electronic, electro-mechanical, or
physical. It may also be exercised by a guard or a receptionist. A pass or personal recognition
system governing the regular staff shall control entry into Class I or Class II Security Areas.
26. In cases where a pass recognition system is in place within the establishment, security
passes shall be worn visibly at all times in order to permit recognition and identification.
Guards
28. The employment of guards can provide a valuable deterrent to individuals who might plan
covert intrusion. The guards’ duties and the frequency of patrols shall be decided by considering
the level of risk and other security systems or equipment that might be in place. Guards shall be
provided with adequate written guidance to ensure specifically assigned tasks are conducted as
required. Guards shall require a means of communication with their control centre.
NATO UNCLASSIFIED
1-7
NATO UNCLASSIFIED
ANNEX 1
AC/35-D/2001-REV3
29. When guards are used to ensure the integrity of security areas and NATO Classified
Information, they shall be appropriately security cleared, qualified by training and supervised.
30. When a security incident occurs on site, a response force is required to react.
This response force shall be comprised of an appropriate number of security personnel (normally,
a minimum of two guards), as determined by the appropriate security authority. Any response to
an incident shall not be to the detriment or weakening of protection elsewhere on the site. Guard
force response to alarms or emergency signals shall be tested and shall be within a time limit
evaluated as capable of preventing an intruder accessing NATO Classified Information.
31. The use of CCTV is a valuable aid to security guards in verifying incidents and IDSs on
large sites or perimeters. The effectiveness of such a system will, however, depend on the selection
and installation of suitable equipment as well as the monitoring of the system undertaken in
the control centre. Expert advice shall be sought when establishing the optimal CCTV design
elements such as: camera technical characteristics, camera installation locations, CCTV system
redundancies, and CCTV control centre monitoring array layout and ergonomics. Care shall be taken
to ensure that audio and visual data captured by CCTV does not put NATO Classified Information at
risk of overlooking.
Security Lighting
32. In addition to providing the illumination necessary for effective surveillance either directly by
the guards or indirectly through a CCTV system, security lighting can offer a high degree of
deterrence to a potential intruder. The standard of lighting shall meet the minimum requirement of
the CCTV and shall be installed in a manner which is appropriate to the site conditions.
Locks
34. Lock and key systems shall be selected to provide protection commensurate with the level
of access control required, the information to be protected and the type of construction and material
in which they will be installed.
NATO UNCLASSIFIED
1-8
NATO UNCLASSIFIED
ANNEX 1
AC/35-D/2001-REV3
35. Mechanical lock cylinders shall provide protection against key bumping, physical attack
(e.g. drilling, chiselling, twisting, extraction) and unauthorised key duplication. Site key management
systems shall have a moderate number master key groups. External locks shall be selected with
adequate corrosion resistance for the local environment.
36. Electronic locks shall provide adequate protection against unauthorised electronic key
(e.g. magnetic strip, smart chip, token, etc.) duplication and shall provide active indications of low
battery levels and system faults. Site electronic key management systems shall limit the number of
electronic master keys that provide access to a large number of electronic locks and shall limit
the validity period of electronic keys. Electronic locks shall maintain a record of electronic key-lock
access authorizations.
PUBLICLY DISCLOSED - PDN(2021)0002 - MIS EN LECTURE PUBLIQUE
38. Spare keys and a written record of each combination setting for use in an emergency shall
be held in sealed opaque envelopes by the local security authority.
39. Working and spare security keys shall be kept in separate cabinets. The record of each
combination shall be kept in a separate envelope.
40. Keys, combinations and envelopes shall be afforded a level of security protection no less
stringent than the information to which they give access.
Approved Equipment
41. The walls, floors, ceilings, and doors of vaults and open storage areas constructed within
a Class I or a Class II Security Area where information classified NC and above is stored on open
shelves or visibly displayed (e.g. on charts, maps), shall be approved by the appropriate security
authority.
42. NATO Nations shall only use equipment which has been approved for the protection of
NATO Classified Information by an appropriate security authority.
43. NATO Civil and Military Bodies shall ensure that any equipment purchased has been
approved for use by one of the NATO Nations in similar conditions. NATO Civil and Military bodies
may also purchase equipment approved for use by an appropriate security authority based on
a completed risk assessment that supports the reduction or mitigation of the identified risk(s).
NATO UNCLASSIFIED
1-9
NATO UNCLASSIFIED
ANNEX 1
AC/35-D/2001-REV3
Visitor Control
44. An appropriate Visitor Control System shall be in place to determine whether a visitor may
be permitted access to a site, building, or area where NATO Classified Information is stored, handled
and/or discussed.
45. Official visits should normally be notified in advance by the visitor’s parent organization.
As a minimum, the official notification should include a description of the official identifying document,
for example, passport or identity card.
46. Visitors can either be escorted or unescorted, however, an appropriate level of control over
visitors shall be maintained, as set out in the following paragraph.
PUBLICLY DISCLOSED - PDN(2021)0002 - MIS EN LECTURE PUBLIQUE
47. Procedures for the control of visitors may vary depending on local security requirements.
In every case the following minimum requirements apply to escorted or unescorted visitors:
(a) escorted:
visitors shall be accompanied at all times by staff or guards with the appropriate level
of PSC. They may be required to wear a pass that identifies them as a visitor.
Full details of visitors should be recorded;
(b) unescorted:
individuals with an appropriate PSC and the need-to-know may be provided with
a temporary unaccompanied entry to an area, or parts of it. However, such visitors
shall be required to wear a pass that identifies them as a visitor and shall be required
to return their temporary pass as soon as their business within the organization is
completed. Full details of visitors shall be recorded, including entry and exit times.
Visitors who are unescorted are not permitted to escort other visitors.
49. Entry and exit searches may be made a condition of entry to a site or building. A warning
notice shall be displayed to indicate that random entry and exit searches may be undertaken.
NATO UNCLASSIFIED
1-10
NATO UNCLASSIFIED
ANNEX 1
AC/35-D/2001-REV3
(iii) an approved IDS in combination with a response force that will, after an alarm
annunciation, arrive at the location within the estimated timeframe needed
to remove or break open the secure cabinet, or overcome the physical security
measures in place.
(b) in an open storage area constructed in accordance with Appendix 1 to this directive,
which is equipped with an IDS in combination with a response force that will, after
an alarm annunciation, arrive at the location within the estimated timeframe needed
for forced entry; or
(c) in an IDS-equipped vault in combination with a response force that will, after an alarm
annunciation, arrive at the location within the estimated timeframe needed for forced
PUBLICLY DISCLOSED - PDN(2021)0002 - MIS EN LECTURE PUBLIQUE
entry.
56. Areas in which CIS are used to display, store, process, or transmit information classified
NC and above, or where potential access to such information is possible, shall be established as
NATO Class I or Class II Security Areas or the national equivalent.
NATO UNCLASSIFIED
1-11
NATO UNCLASSIFIED
ANNEX 1
AC/35-D/2001-REV3
57. Areas in which CIS are used to display, store, process or transmit information classified NR,
or where potential access to such information is possible, may be established as Administrative
Zones.
58. Access to areas where critical CIS components (such as servers, network, storage, and
cryptographic equipment) are housed and managed shall be specifically controlled and limited to
only authorised personnel associated with security and system/network/crypto administration.
59. In order to identify an appropriate level of protection for CIS handling NATO Classified
Information the Enclosure F to C-M(2002)49 and its supporting directives shall be used.
60. Printers, copiers, shredders and other equipment used to reproduce or destroy
NATO Classified Information shall be physically protected to the extent necessary to ensure that
only authorised individuals can use them and that NATO Classified Information is controlled in
accordance with the requirements of NATO Security Policy and its supporting directives.
62. Protection against passive eavesdropping attacks (i.e. leakage of NATO Classified
Information via insecure communications or by unintentional electromagnetic emissions) may
involve seeking technical security advice.
63. Protection against active eavesdropping (i.e. leakage of NATO Classified Information by
wired microphones, radio microphones or other implanted devices) requires a technical and/or
physical security inspection of the fabric of the room, its furnishings and fittings and its office
equipment, including office machines (mechanical and electrical) and communications.
These inspections shall be undertaken by trained security staff authorised by the appropriate security
authority.
NATO UNCLASSIFIED
1-12
NATO UNCLASSIFIED
APPENDIX 1
ANNEX 1
AC/35-D/2001-REV3
1. Open Storage Areas are those authorised by the appropriate security authority for open
storage of NATO Classified Information. These areas shall be constructed in accordance with
the following standards:
(a) Construction
the perimeter walls, floors, and ceiling shall be permanently constructed and attached
to each other. All construction must be done in a manner so as to provide visual
PUBLICLY DISCLOSED - PDN(2021)0002 - MIS EN LECTURE PUBLIQUE
NATO UNCLASSIFIED
1-13