22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

389<br />

• Interfaces between the CIPEF <strong>and</strong> the content filters<br />

• Proxy Interfaces<br />

The main element of the CIPE Service included in the HAAG TOE is the CI-<br />

PEF. The CIPEF is responsible for the management <strong>and</strong> scheduling of data objects<br />

as they are routed through the content filters. The route through the content filters<br />

depends on the identified data object(s) <strong>and</strong> any embedded data objects <strong>and</strong> is adjusted<br />

dynamically. The CIPEF provides interfaces for data objects to be input into<br />

the CIPEF <strong>and</strong> output from the CIPEF. Any suspect, malicious or unsupported<br />

data objects are quarantined for further investigation <strong>and</strong> appropriate authorised<br />

h<strong>and</strong>ling.<br />

The Identification, Verification <strong>and</strong> Transformation capabilities are implemented<br />

in CIPE Service by means of the Content Filters. The Content Filters constitute<br />

a part of the HAAG operational environment <strong>and</strong> are discussed in section<br />

dealing with external supporting services.<br />

A Proxy Interface is the boundary between the CIPE Service <strong>and</strong> the HAAG <strong>and</strong><br />

can h<strong>and</strong>le protocol <strong>and</strong> content mediation between the data source <strong>and</strong> the CIPEF.<br />

4) Local Security Policy Repository Service<br />

The Local Security Policy Repository Service provides access to all security<br />

policies, which are enforced within the HAAG. It provides a management interface<br />

enabling configuration of the policies, including possible synchronization with<br />

centralized security policy repository. The policies stored within the local repository<br />

include both IFP enforced by the HAAG on the mediated data <strong>and</strong> an access<br />

control policy for the HAAG users. The IFP is provided by so-called Content-based<br />

Protection <strong>and</strong> Release Policy (CPR). The CPR policy consists of two specific policies:<br />

Content-based Protection Policy <strong>and</strong> Content-based Release Policy. The Contentbased<br />

Protection Policy defines the technical protection measures, which have to<br />

be enforced by the user’s operational environment (i.e. network <strong>and</strong> user’s host)<br />

in order for the information to be securely released. The Content-based Release<br />

Policy defines the required user’s attributes, such as security clearance <strong>and</strong> associated<br />

security domain for allowing an information release.<br />

D. External Supporting Services<br />

This section briefly introduces the services, which are provided by the operational<br />

environment in support of the HAAG capability. These services are not part<br />

of the HAAG target of evaluation, <strong>and</strong> as such their assurance level <strong>and</strong> functionality<br />

will not be evaluated during the HAAG evaluation. However, it is recommended<br />

that their implementation should provide a level of assurance equal or higher to<br />

the level provided by the HAAG.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!