22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

390 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

1) Security Management Infrastructure <strong>and</strong> <strong>Information</strong> Assurance<br />

Services<br />

The NATO security management infrastructure (SMI) services <strong>and</strong> information<br />

assurance (IA) services are described in [15] as depicted in Figure 9.<br />

Figure 9. NATO security management infrastructure services <strong>and</strong> information<br />

assurance services as defined in [15]<br />

Both types of services typically require the use of the other for their own functionality.<br />

A security management service might use an IA service to ensure the secure<br />

h<strong>and</strong>ling of its own information, e.g. the Digital Policy Management Service<br />

might use a confidentiality service <strong>and</strong> an integrity service to secure the renewal<br />

of policy for system-wide access rights (its own function). An IA service might<br />

rely on a security management service for proper continuation of its own function,<br />

e.g. a confidentiality service might use the Crypto Key Management Service<br />

for policy-m<strong>and</strong>ated periodic keying material changes.<br />

The Identity Management <strong>and</strong> Credential Management Services rely on<br />

the NATO Public Key Infrastructure (NPKI) [16]. The exchange of the relevant<br />

PKI information between NATO <strong>and</strong> Nations during NATO operations <strong>and</strong> missions<br />

is discussed in [17].<br />

2) Secure Transport Layer Services<br />

Secure transport layer services might be required in some scenarios to provide<br />

a secure (i.e. cryptographically protected) communication channel between the user<br />

<strong>and</strong> the HAAG. A typical example of scenario where such channel is required<br />

is remote management of the HAAG. However, also in the case of end-users using<br />

the HAAG for data transfer, a secure communication channel might be required<br />

in order to both protect privacy of the end user <strong>and</strong> provide additional layer<br />

of confidentiality <strong>and</strong> integrity protection for the exchanged information. The use

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!