22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

391<br />

of the secure transport layer services can also provide additional protection for<br />

availability of the HAAG by introducing additional controls for allowed connections<br />

<strong>and</strong> resource consumption.<br />

3) Cryptographic Services<br />

The main Cryptographic Services required by the HAAG are related to integrity<br />

protection <strong>and</strong> authentication. The public key encryption module provides<br />

functionality required to verify digital signatures of the XML security labels. This<br />

functionality includes implementation of appropriate public-key cryptographic<br />

algorithms, hash functions, <strong>and</strong> certificate validation mechanisms. It can be also<br />

used in order to provide PKI-based authentication of the HAAG users.<br />

Additional Cryptographic Services might be required for authentication<br />

of the users <strong>and</strong> securing the communication channel between the HAAG <strong>and</strong><br />

the user (if applicable). These additional cryptographic services include message authentication<br />

codes (e.g. keyed hash function) <strong>and</strong> symmetric encryption algorithms.<br />

4) Cyber defence component<br />

In order to provide an adequate security <strong>and</strong> assurance level for information<br />

exchange between security domains, the HAAG relies on preventive <strong>and</strong> reactive<br />

services provided by the NATO cyber defence infrastructure. The NATO Cyber<br />

Defence Services of particular relevance to the HAAG include monitoring, data<br />

fusion, dynamic risk assessment <strong>and</strong> alert generation.<br />

The feedback from the Cyber Defence Services can be used to influence <strong>and</strong><br />

reconfigure the security policies enforced by the HAAG. The possibility of dynamic<br />

update of system security policy based on the identified threat level has been<br />

studied in [18]. In [19] an approach for integration of alerts, generated based on<br />

information received from various cyber sensors, with contextual security policies<br />

has been investigated. The alerts, received in the Intrusion Detection Message<br />

Exchange Format (IDMEF) [20], are mapped to contexts <strong>and</strong> response strategies<br />

involving changes to the enforced security policy.<br />

5) CIPE Content Filters<br />

The CIPE Content Filters are separate modules of the CIPE architecture, which<br />

can be provided by the third party. As opposed to the CIPE Framework, which<br />

is part of the HAAG TOE, the Content Filters are therefore treated as external<br />

services provided by the HAAG Operating Environment.<br />

The CIPE Service provides for separation of the CIPEF from the Content<br />

Filters. The Content Filters, the only CIPE Service component that directly h<strong>and</strong>les<br />

the contents of a data object, must be separated <strong>and</strong> managed outside of the other<br />

components of the CIPE Service due to the potential threats <strong>and</strong> vulnerabilities<br />

that may be exposed by the h<strong>and</strong>ling of data objects. The CIPEF communicates<br />

with the Content Filters via the Content Filter Interface.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!