Network and information transfer - policy - Kunnskapsbasen
Network and information transfer - policy
Policy for network and information transfer.
Norwegian version - Retningslinje for Nettverks- og informasjonsoverføring
- Type of document: Topic specific policy
- Managed by: CISO, Digital Security Section
- Approved by : Director for Organization and Infrastructure
- Valid from: 01.10.2025
- Next revision within: 01.10.2027
- Classification: No
- Reference ISO: ISO 27002:2022 5.14, 8.12, 8.21 – 8.23
- Reference NSMs principles for ICT-security : 2.3.10, 2.5.1-2.5.6, 2.5.8, 2.7.4
- Reference Law/Rule: Act relating to the processing of personal data (The Personal Data Act), Act relating to Control of the Export of Strategic Good, Services, Technolgy, etc.
- Reference internal documents : This topic spesific policy is subject to the Policy on Information Security.
Purpose
The purpose of this policy is to secure information against loss or misuse during transfer between internal systems at NTNU, electronic transmission of information to external parties, or transfer of information to other media that can be used to store data (storage media) that is not part of NTNU’s protected ICT infrastructure. NTNU’s ICT infrastructure refers to all equipment, digital information, information systems, and services used for information processing and communication.
Applies to
The "Policy for Network and Information Transfer" applies to all individuals who have access to, and/or process and manage information through NTNU’s network.
Roles and responsibilities
Information security work affects the organization at all levels. Responsibility and authority for information security follow the standard line management structure. This is detailed in the Policy for Information Security
For the Policy on Network and Information Transmission, line managers, the Head of the HR and HSE Department, the Head of the IT Department, the Head of IT Infrastructure, CISO/the Head of Digital Security, as well as system owners and project managers, have key roles with corresponding responsibilities.
General Principles
a. Measures should be implemented to enhance the ability to detect attacks and reduce the attack surface within the network.
b. Information in transactions to and from application services should be protected to prevent incomplete transmission, incorrect routing, unauthorized message alteration, unauthorized disclosure, unauthorized message duplication, or repetition.
c. When using external systems, a data processing agreement approved by Division for Governance and Management Systems must be established.
d. Research and knowledge that can be misused should be subject to export control following the Export Control Act and regulated by the "Policy for Control of Knowledge Transfer."1
e. During verbal communication outside of NTNU premises, participants must be aware of their surroundings and the content of their communication to prevent classified information from being compromised.
Network
Network Controls
NTNU’s data network is defined as the network owned and operated by NTNU on all campuses. This includes the core network and all network components connected to it. It also includes all internet connections in and out of NTNU, as well as any leased lines between NTNU and partners. To secure access to this network, the following controls must be implemented:
a. Client networks should have authentication for both wired and wireless networks (IEEE 802.1x).
b. Firewalls must be used to control network traffic, including firewalls on servers.
c. Firewall logs must be managed according to the requirements in the "Operational Security Policy."
d. External access to the network zones Intern, Confidential, and Strictly Confidential must be through encrypted connections with secure authentication, which can be achieved using e.g., VPN and/or Microsoft Direct Access. The solutions must have multi-factor authentication to prevent logging in with just a username and password.
Security of Network Services
The following measures should be implemented to secure NTNU’s data network:
a. Network equipment must be physically secured based on the requirements in the "Policy for Physical Security of ICT Infrastructure."
b. Network components must be configuration-managed to always ensure an up-to-date network.
c. Redundant connections must be established where availability requirements demand it.
d. The quality of network service should be clearly defined, whether provided by NTNU IT or external vendors.
Network Segregation
Network segregation is a prerequisite for achieving a higher level of information security. The following requirements are set:
a. User equipment must be isolated in separate zones. Where possible or appropriate, clients should also be separated from each other to avoid client-to-client infections (Private VLAN).
b. The network must be able to isolate compromised user equipment.
c. The network must have separate zones for user equipment with different security levels based on the following classification
- Unknown devices – for open information only
- Registered private devices – for up to internal information.
- Managed devices – for up to confidential information
- Managed devices with higher access control – for up to strictly confidential information
d. Servers must be placed in network zones based on the classification of information.
e. Separate network zones must be established for open, internal, confidential, and strictly confidential information.
f. Network segregation must be enforced through firewalls.
g. Network traffic from servers in the internal, confidential, and strictly confidential zones must only reach the internet via a proxy.
h. Laboratory equipment must be placed in a separate zone and must not be directly accessible from the internet.
Information Transfer
a. All information transfers involving Confidential and Strictly Confidential classified information must have mechanisms to verify integrity.
b. Transactions of Confidential or Strictly Confidential classified information must be encrypted or otherwise secured to ensure information security
c. Audit logging must be implemented for transactions containing personal data and Confidential or Strictly Confidential classified information. The log must meet the requirements for change tracking and access.
d. When transferring contract-regulated/legal-regulated information to an external party, a data or information processing agreement must always be in place.
Electronic Messaging Exchange
The following requirements apply to transfers via email or other electronic messaging systems:
a. Confidential or Strictly Confidential information transmitted via email or other electronic messaging services must be encrypted according to the "Policy for the Use of Cryptographic Controls."
Confidentiality or Non-Disclosure Agreements
The following requirements apply to confidentiality or non-disclosure agreements when processing classified information:
a. When transferring Intern, Confidential, or Strictly Confidential classified information to an external party, a signed agreement must be in place to protect NTN’s rights and obligations related to information transfer.
b. NTNU employees must be bound by confidentiality agreements for personal data where confidentiality is necessary.
c. Confidentiality agreements must also cover other information with relevance to information security.