1. HOW TO APPLY THE RECOMMENDATIONS? Different premises projects will have specific characteristics that influence the ICT design. Table 3 provides a brief overview of some issues to consider in these types of projects. However, the list may vary since each project is unique in its nature. In this context, we can conclude that ICT designers will most likely influence three to four of the eight areas listed in figure 1, with risk management, physical security, and network architecture being the probable priorities. The other areas will depend on proper cabling system design, correct identification and installation of communication spaces, and the system's overall resilience. However, this list is not definitive; it aims to promote discussion and refinement by practitioners, as this is an evolving field.
Based on the resources in Table 2, and considering the specific characteristics of ICT design in mines and other infrastructures, such as airports, educational campuses, or subways, there are eight areas (recommended by CISA in collaboration with the U.S. Department of Energy) to organize the design security work (Figure 1). These areas are broadly applicable and, as noted earlier, help divide the system so security can be integrated from the earliest phases of a project.
be helpful to keep a living inventory of equipment, software, and supporting infrastructure from day one. Before controls are implemented, it should be verified that they are tailored to each site’s unique situation. The same core principles apply—identifying risks early, segmenting wisely, hardening accessible areas, and designing for failover—but can be adjusted to fit local hazards, access rules, and operational needs. • Underground mines can pose various risks that may harm or damage communication infrastructure, such as rockfalls, blasting, dust, heat, humidity, water ingress, EMI, vehicle traffic, and shaft dynamics. Systems should be designed to withstand local faults so that critical equipment and locations, like refuges, conveyors, and emergency communications, remain connected with high availability. One strategy is to design a physical and logical ring that routes two physically separate paths. Attention should be paid to the type of optical fiber used; whenever possible, preterminated optical fiber is recommended to ensure that equipment relocation does not require a new commissioning team to reinstall it, thereby reducing downtime and risks. For underground mobility, if LTE/5G
Risk Mgmt and Cybersecurity Governance
Human Element
Physical Security
A. RISK MANAGEMENT AND CYBERSECURITY GOVERNANCE
Identifying vulnerabilities and threats early—so current risks can be understood—significantly reduces the chance of costly redesigns. It is better to base the design on a clear understanding of risks in the environment—especially those affecting ICT equipment, spaces, and cabling—so remediation needs are clear before final decisions are made. It can also
Network Security
Supply Chain Management
Type of Project
Description
Harsh, confined, and constantly changing environmental factors with extensive vertical and horizontal distances. Hoists and safety lockouts manage access while exposure to dust, moisture, heat, and vibration is a concern. Work must align with safety and production windows, and routers or device locations must adjust as the mine advances. Linear tunnels and platforms with heavy public exposure. Tight clearances and evacuation paths; EMI and placement limits near traction power and signaling; few alternate pathways. Maintenance happens mostly at night in short windows. Many buildings are spread across a wide area with frequent renovations and room repurposing. Mix of public and restricted spaces; semester schedules drive work windows. New buildings and programs must tie into a live backbone without disruption. Highly segmented (terminals, piers, baggage, tower, hangars) with 24/7, multi-tenant operations. Strict sterile/public boundaries and fire/smoke rules; permits/escorts for airside work; long inter-building runs across aprons and roofs; frequent layout changes at gates.
Underground Mine
Network Perimeter Security
Rail / Subway
Security Monitoring
Education Campus
Host Security
Airport
FIGURE 1 : The eight areas of security in design as advised by CISA and DoE. Source: Hatch
TABLE 3 : General premises projects characteristics. Source: Hatch
I
I
40
ICT TODAY
October/November/December 2025
41
Made with FlippingBook - Online catalogs