22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

383<br />

B. Phase 1: High assurance automated guard as a gateway<br />

A logical evolution of the Phase 0 design is to replace the cascade with a single<br />

high assurance guard used as a gateway, an architecture shown in Figure 4.<br />

Figure 4. High assurance automated guard (HAAG) as a gateway<br />

This architecture uses the HAAG as a dedicated information flow control<br />

device between the domain with a lower <strong>and</strong> a higher trustworthiness. In addition,<br />

the HAAG must be accompanied by, <strong>and</strong> usually collocated with, additional<br />

security tools, such as firewalls <strong>and</strong> malware detection software.<br />

Compared to the Phase 0 architecture, there are two important differences. First,<br />

the HAAG authenticates users from both low <strong>and</strong> high domains, whereas only network<br />

interfaces were authenticated in Phase 0. The authentication is mainly for auditing <strong>and</strong><br />

accountability purposes, but can also constitute an input for an authorization of access<br />

to the data (e.g. basic enforcement of need-to-know principle). Second, the required<br />

assurance level for the HAAG design <strong>and</strong> implementation is significantly higher.<br />

Phase 1 improves the assurance <strong>and</strong> information flow capabilities in a short<br />

to medium time-frame. It relies on support for cross-domain authentication, e.g.<br />

by implementing a claims-based identity <strong>and</strong> access control [11]. This architecture<br />

allows also a gradual introduction of elements of the CPR security policies. The CPR<br />

security model is envisaged to replace in the long term an inflexible Bell-LaPadula<br />

security model, which is not suitable for a modern dynamic <strong>and</strong> federated coalition<br />

environment.<br />

C. Phase 2: High assurance automated guard as a separation service<br />

In Phase 2 of the HAAG development a more radical approach is taken toward<br />

solving the information sharing challenges. This approach is based on a complete<br />

rethinking of the security model used within NATO <strong>and</strong> utilizing implementation<br />

of advanced cryptographic mechanisms. In this architecture, depicted in Figure 5,<br />

the concept of security domains is ab<strong>and</strong>oned, <strong>and</strong> the information flow is controlled<br />

through a HAAG service implemented in a distributed fashion.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!