Cross-domain solution

A cross-domain solution (CDS) is an integrated information assurance system composed of specialized software or hardware that provides a controlled interface to manually or automatically enable and/or restrict the access or transfer of information between two or more security domains based on a predetermined security policy.[1][2] CDSs are designed to enforce domain separation and typically include some form of content filtering, which is used to designate information that is unauthorized for transfer between security domains or levels of classification,[3] such as between different military divisions, intelligence agencies, or other operations which depend on the timely sharing of potentially sensitive information.[4]

The goal of a CDS is to allow a trusted network domain to exchange information with other domains, either one-way or bi-directionally, without introducing the potential for security threats. CDS development, assessment, and deployment are based on comprehensive risk management. Every aspect of an accredited CDS is usually evaluated under what is known as a Lab-Based Security Assessment (LBSA)[citation needed] to reduce potential vulnerabilities and risks. The evaluation and accreditation of CDSs in the United States are primarily under the authority of the National Cross Domain Strategy and Management Office (NCDSMO) within the National Security Agency (NSA).

CDS filter for viruses and malware; content examination utilities; in high-to-low security transfer audited human review. CDS sometimes has security-hardened operating systems, role-based administration access, redundant hardware, etc.

The acceptance criteria for information transfer across domains or cross-domain interoperability is based on the security policy implemented within the solution. This policy may be simple (e.g., antivirus scanning and whitelist (also known as an "allowlist") check before transfer between peer networks) or complex (e.g., multiple content filters and a human reviewer must examine, redact, and approve a document before release from a high-security domain[5]).[6] Unidirectional networks are often used to move information from low-security domains to secret enclaves while assuring that information cannot escape.[7][8] Cross-domain solutions often include a High Assurance Guard.

Though cross-domain solutions have, as of 2019, historically been most typical in military, intelligence, and law enforcement environments, one example is the flight control and infotainment systems on an airliner.[9]

  1. ^ "Cross Domain Enterprise Service (CDES)". Information Assurance Support Environment. Defense Information Systems Agency (DISA). 2011-11-16. Archived from the original on 2008-03-26. Retrieved 2012-01-16.
  2. ^ "Learn About Cross Domain Solutions". Owl Cyber Defense. Aug 25, 2020. Archived from the original on 2020-09-21.
  3. ^ "Cloud Computing Strategy" (PDF). DTIC.MIL. Archived (PDF) from the original on August 16, 2016.
  4. ^ Aristotle, Jacob. Cross-Domain Solution.
  5. ^ Slater, T. "Cross-Domain Interoperability"[usurped], Network Centric Operations Industry Consortium - NCOIC[usurped], 2013
  6. ^ "Cross Domain Solutions - Ensuring Complete Data Security".
  7. ^ "Nexor Data Diode". Nexor. Retrieved 3 June 2013.
  8. ^ "Dual Data Diode Information Transfer Products". Owl Cyber Defense, LLC. Retrieved 2019-08-20.
  9. ^ "Can an Airplane Get Hacked? (Probably.)". Interset. 2017-01-04. Retrieved 2019-03-07.