词条 | Cross-domain solution |
释义 |
A cross-domain solution (CDS) is a means of information assurance that provides the ability to manually or automatically access or transfer information between two or more differing security domains.[1] They are integrated systems of hardware and software that enable transfer of information among incompatible security domains or levels of classification.[2] Modern military, intelligence, and law enforcement operations critically depend on timely sharing of information.[3] CDS is distinct from the more rigorous approaches, because it supports transfer that would otherwise be precluded by established models of computer, network, and data security, e.g., Bell–LaPadula model and Clark–Wilson model.{{Citation needed|date=October 2012}} CDS development, assessment, and deployment are based on risk management. The goal of a CDS is to allow an isolated critical network to exchange information with others, without introducing the security threat that normally comes from network connectivity. The three primary elements demanded from cross domain solutions are:
The acceptance criteria for information transfer across domains or cross-domain interoperability may be simple (e.g.{{Citation needed|date=October 2012}} antivirus scanning before transfer from low to high security domains) or complex (e.g. multiple human reviewers must examine and approve a document before release from a high security domain[4]).[5] One-way data transfer systems (one-way traffic systems, data diodes),[6][7] are often used to move information from low security domains to secret enclaves while assuring that information cannot escape. Cross-domain solutions often include a High Assurance Guard. To get a good foundation for Cross Domain Solution deployment, visit the DISA Mission Partners website and watch the following instructional videos: • CDS 101 CBT (11 minutes) • CDS CAP CBT (12 minutes) • DSAWG 101 CBT (17 minutes) Though cross-domain solutions have, as of 2019, historically been most typical in military, intelligence and law enforcement environments, there is also a use case for cross domain solutions in industry. Many industrial settings have control systems and analytic systems which are, or should be, in different security domains. One example is the flight control and infotainment systems on an airliner.[8] Given the wide variety of use cases in industry, different levels of third party accreditation and certification of aspects of the cross-domain solution will be appropriate for different applications, and can be found among different providers.[9][10] Unintended consequencesIn previous decades, multilevel security (MLS) technologies were developed and implemented that enabled objective and deterministic security, but left little wiggle room for subjective and discretionary interpretation.{{Citation needed|date=October 2012}} These enforced mandatory access control (MAC) with near certainty.{{Citation needed|date=October 2012}} This rigidity prevented simpler solutions that would seem acceptable on the surface.{{Citation needed|date=October 2012}} Automated information systems have enabled extensive information sharing that is sometimes contrary to the need to avoid sharing secrets with adversaries.{{Citation needed|date=October 2012}} The need for information sharing has led to the need to depart from the rigidity of MAC in favor of balancing need to protect with need to share.{{Citation needed|date=October 2012}} When the ‘balance’ is decided at the discretion of users, the access control is called discretionary access control (DAC) that is more tolerant of actions that manage risk where MAC requires risk avoidance.{{Citation needed|date=October 2012}} Allowing users and systems to manage the risk of sharing information is in some way contrary to the original motivation for MAC. The unintended consequences of sharing can be complex to analyze and should not necessarily be left to the discretion of users who may have a narrow focus on their own critical need.{{Citation needed|date=October 2012}} These documents provide standards guidance on risk management:
References1. ^{{cite web |url=http://iase.disa.mil/cds/ |title=Cross Domain Enterprise Service (CDES) |date=2011-11-16 |work=Information Assurance Support Environment |publisher=Defense Information Systems Agency (DISA) |accessdate=2012-01-16 |deadurl=yes |archiveurl=https://web.archive.org/web/20080326230421/http://iase.disa.mil/cds/ |archivedate=2008-03-26 |df= }} 2. ^{{cite web|title=Cloud Computing Strategy|url=http://www.dtic.mil/dtic/tr/fulltext/u2/a563989.pdf|website=DTIC.MIL}} 3. ^{{cite book|last1=Aristotle|first1=Jacob|url=http://dl.acm.org/citation.cfm?id=2378462|title=Cross-Domain Solution}} 4. ^Slater, T. "Cross-Domain Interoperability", Network Centric Operations Industry Consortium - NCOIC, 2013 5. ^{{cite web |url=http://www.crossdomainsolutions.com |title=Cross Domain Solutions - Ensuring Complete Data Security }} 6. ^{{cite web|title=Nexor Data Diode|url=http://www.nexor.com/data-diodes|publisher=Nexor|accessdate=3 June 2013}} 7. ^{{cite web |url=http://www.owlcti.com |title=Dual Data Diode Information Transfer Products |publisher=Owl Computing Technologies, Inc |accessdate=2012-01-16}} 8. ^{{Cite web|url=https://interset.com/2017/01/04/can-airplane-get-hacked-probably/|title=Can an Airplane Get Hacked? (Probably.)|date=2017-01-04|website=Interset|language=en-US|access-date=2019-03-07}} 9. ^{{Cite web|url=https://www.lockheedmartin.com/en-us/products/cross-domain-cyber-solution.html|title=Cross-Domain Solutions|website=Lockheed Martin|access-date=2019-03-07}} 10. ^{{Cite web|url=https://www.microarx.com/data-diodes|title=Data Diodes|website=MicroArx|language=en-US|access-date=2019-03-07}} Unified Cross Domain Management Office (UCDMO), Cross Domain Overlay, 1 December 2011, ver 1.0; provides extensive security control guidance to implement CDS platform address security controls for hardware and software, enforced with advanced inspections. 1 : Computer security software |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。