ACSC programs and advice are being migrated to cyber.gov.au (see sidebar)

Introduction to Cross Domain Solutions

Download ACSC Protect: Introduction to Cross Domain Solutions (PDF), January 2018
First published January 2018

Introduction

  1. This document introduces technical and non-technical audiences to the concept of Cross Domain Solutions (CDS), a type of security capability that is used to connect discrete systems within separate ‘security domains’ in an assured manner.

Security domains explained

  1. A security domain is a system (or collection of systems) operating under a consistent security policy that defines the security classification, releasability and special handling caveats for information stored and processed within the domain.
  2. For example, an organisation’s UNCLASSIFIED DLM and CONFIDENTIAL AGAO networks are separate security domains; as are the SECRET networks of two different organisations; as are the SECRET AUSTEO and SECRET REL networks of a single organisation.

Cross Domain Solutions explained

  1. CDS are systems comprising security-enforcing functions tailored to mitigate the specific security risks of accessing or transferring information between security domains. A CDS may be an integrated appliance or, more commonly, be composed of discrete technologies or sub-systems, with each sub-system consisting of hardware and/or software components.
  2. Secure CDS implementations ensure that the security policy of each security domain involved is upheld in a robust and highly assured manner, across all physical and logical layers of the connection between domains. To achieve this, the use of certified high assurance products and evaluated components is strongly encouraged where appropriate.
  3. Example use cases for a CDS include ingesting publicly-available data from an UNCLASSIFIED DLM network into a SECRET-classified analysis system; consolidating the presentation of differently-classified desktop systems into a single client; or aggregating input from multiple differently-classified environments into a central audit system.

CDS security threats and risks

  1. Understanding the security risks specific to each cross domain use case is essential, as to be secure a CDS must address an organisation’s specific business requirements and risk environment. Any approved or accredited solution is likely to require modification to be suitable for use in another organisation or risk environment.
  2. When CDS security controls are inadequately enforced, connections between different security domains may allow an adversary to:
    • gain unauthorised access to steal, copy or interfere with sensitive information
    • establish covert channels into or out of sensitive systems
    • compromise the integrity of trusted systems or data (such as audit logs)
    • bypass security-enforcing functions
    • interrupt the availability of critical systems or services, or
    • propagate to access sensitive systems by pivoting through less-protected networks.

CDS security design principles

  1. A CDS prevents the flow of information between different security domains by default. A CDS will only permit selected information to pass security enforcement points where appropriate, based on conformance of all data to a security policy. Security-enforcing functions may be implemented by discrete hardware or software components, and a CDS architecture must ensure that these security-enforcing components are unable to be bypassed. Examples of security-enforcing components include data diodes, protocol adaptors and content filters.
  2. CDS are typically designed to mitigate threats to the more sensitive or trusted security domain (the ‘high side’ of the connection) originating from the less sensitive or trusted security domain (the ‘low side’). However, it is important to consider that certain threats may be introduced by the more sensitive or trusted security domains.
  3. To uphold the effectiveness of a CDS, each security domain connected by a CDS must also implement appropriate security controls to protect its core systems and boundary connections.

CDS security risk management

  1. The Australian Cyber Security Centre (ACSC) advocates that organisations perform rigorous analysis of the security, financial and sustainment risks when considering the business benefits of any proposed CDS in their environment. In order to gain assurance in the effectiveness of security-enforcing functions performed by a CDS, systematic risk-based analysis and thorough technical assessments are strongly recommended.
  2. Some organisations house delegated CDS advisory bodies, who are subject matter experts operating on behalf of the ACSC, to provide tailored security advice and assistance.
  3. The ACSC recommends that CDS projects engage with their Information Technology Security Advisers (ITSAs), security certification authorities and CDS advisory bodies early and often, to ensure that security risks are comprehensively understood and managed.
  4. In addition to published guidance and policy documents, the ACSC provides advice and assistance to CDS advisory bodies and ITSAs seeking further guidance on the threats and risks to security-relevant components of a CDS, or the strength of security-relevant components.

Further information

  1. The Australian Government Information Security Manual (ISM) contains a range of security controls relating to CDS and network gateways within its Cross Domain Security and Data Transfers and Content Filtering chapters.
  2. The Guide to the Secure Configuration of Cross-Domain Solutions (GSCC) offers detailed guidance on CDS security controls from a technical perspective. This document is available to download from OnSecure or may be provided on request from the ACSC. The ACSC is currently developing supplementary documentation to assist organisations with the design, development and assessment of CDS.
  3. In addition to CDS-specific guidance, ASD’s public website hosts a range of cyber security products including the Strategies to Mitigate Cyber Security Incidents (featuring the Essential Eight), which detail prioritised activities to assist technical cyber security professionals in all organisations mitigate cyber security incidents.

Contact details

  1. Organisations or individuals with questions regarding this advice can contact the ACSC by emailing asd.assist@defence.gov.au or calling 1300 CYBER1 (1300 292 371).

In August 2018 ACSC launched a new website, cyber.gov.au, to reflect its new organisation.

Cyber security programs and advice are being migrated to cyber.gov.au. Information and advice on this site remains current.

Reports help the ACSC to develop a better understanding of the threat environment and will assist other organisations who are also at risk.

Cyber security incident reports are also used in aggregate for developing new defensive policies, procedures, techniques and training measures to help prevent future incidents.

Information for Australian businesses
Information for individual Australian citizens
Information for Federal, State and Local government agencies