Transfer solutions send or TRANSFER data between different security domains. A site’s Virtual Desktop Infrastructure (VDI) can also be supported. In the desktop Access model, users can have separate Virtual Machines, each at different classification levels and accessing separate, isolated networks. Access solutions allows a user to ACCESS differently classified networks from a single machine.WHAT TYPES OF CROSS DOMAIN SOLUTIONS ARE THERE? * Please contact us today to discuss your specific cross domain requirements find out how AFRL can revolutionize your mission! V2CDS – The Voice & Video Cross Domain Solution from the CCOLT PMO enables users to make secure cross domain one-to-one audio or video calls, as well as audio conference calls.X-ARBITOR – The Next Generation Transfer solution, featuring secure yet flexible Filter Orchestration Engine and Protocol Adapter plug-in architecture.ISSE Guard – A Cross Domain Transfer solution that enables bi-directional and uni-directional secure information flows, with extensive message filtering capabilities for both structured and unstructured data.SECUREVIEW – A Cross Domain Access solution that supports multiple classifications on single machine using both “Thick” & “Thin” VM clients simultaneously.AFRL offers both cross domain access and transfer solutions to meet your mission needs. Additionally, a Transfer CDS will use various filters to inspect data in transit to ensure compliance with security and releasability policies, as well as to reduce the risk of attack from embedded content.ĪFRL has designed, developed and revolutionized secure information sharing and cross domain technologies for over 30 years. A CDS will use cryptography and mandatory access control (MAC) mechanisms to isolate different networks and data flows. In layman’s terms, a CDS must prevent both data spills as well as attacks against classified networks. A CDS may also be deployed at the tactical edge in order to meet site or mission specific needs.Ī CDS must simultaneously protect the confidentiality of high-side data, protect the data integrity and protect the availability of high-side resources. Information sharing, however, must be done securely in order to maintain the necessary data characteristics of Confidentiality, Integrity and Availability (CIA).Ĭross-domain Solutions are often used in large enterprise data centers where there are many different networks and security enclaves, each with a different classification and/or releasability. In fact, the lack of information sharing was a key reason behind the 9/11 attacks. How to securely share information for mission operations in Enterprise EnvironmentsĪ Cross-domain Solution (CDS) is a mechanism to access or transfer information between two or more networks of different security classifications.Ĭross-domain Solutions are needed to enable secure information sharing – getting the right information to the right people at the right time.
0 Comments
Leave a Reply. |