22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

378 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

<strong>Information</strong> security domains can be implemented as both physically separated<br />

network domains or as virtual domains, using same network infrastructure<br />

<strong>and</strong> relying on cryptographic separation. Cryptographic separation means here<br />

encryption of all information belonging to particular information domain, making<br />

it inaccessible from other information security domains. In a simple scenario, which<br />

is analogous to the scenario addressed in [1], the guard separates two information<br />

security domains located in two physically separated network domains. In such<br />

scenario, one network enclave is typically denoted as high <strong>and</strong> the other as low. It is<br />

important to stress that in some of the HAAG usage scenarios the concepts of high<br />

<strong>and</strong> low information security domain may not mean high <strong>and</strong> low classification<br />

levels, as in many cases no order function can easily be defined between the classification<br />

levels (<strong>and</strong> thus information security domains) belonging to different<br />

organizations or nations.<br />

In a simple HAAG implementation scenario it can be further assumed that<br />

the guard is connected to the low <strong>and</strong> the high information security domains (<strong>and</strong><br />

thus low <strong>and</strong> high network enclaves) using separate physical network interfaces.<br />

However, this limiting assumption will not be necessary true in a more general<br />

case, where the information security domains can be virtualized.<br />

The HAAG limits the data flow between information security domains through<br />

enforcement of m<strong>and</strong>atory security policies. These security policies include information<br />

flow control policy, access control policy, <strong>and</strong> information protection<br />

policy. The set of these security policies is collectively called as Content-based<br />

Protection <strong>and</strong> Release (CPR) policy [2]. The CPR policy is being currently specified<br />

at the NCIA as a part of 2012 Allied Comm<strong>and</strong> Transformation (ACT) Scientific<br />

Program of Work (SPoW).<br />

A cross-domain information exchange introduces two major threats to security<br />

of involved information security domains: (1) leakage of confidential information<br />

from one information security domain to another information security domain;<br />

<strong>and</strong> (2) degradation of the integrity or availability of resources in one information<br />

security domain as a result of actions originating from another information security<br />

domain. The purpose of the HAAG is to enable, together with other components<br />

in the IEG, an effective <strong>and</strong> efficient cross-domain information exchange, while<br />

offering sufficient protection against the threats mentioned above <strong>and</strong> enforcing<br />

an appropriate information flow control policy.<br />

II. Use cases<br />

Classical use cases for information sharing between NATO Secret systems<br />

<strong>and</strong> non-NATO partners <strong>and</strong> unclassified networks involve document <strong>and</strong> email<br />

release. The capability to reliably <strong>and</strong> timely share information across the security<br />

domains is one of the desirable operational requirement in the current NATO operations,<br />

e.g., need for information sharing between NATO forces <strong>and</strong> non-NATO

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!