<section title="19.2. Cross Domain Solutions (CDS)"><subsection title="Objective"><paragraph
    title="19.2.1."


><![CDATA[<p>Cross-Domain Solutions secure transfers between systems of differing classifications or trust levels with high assurance over the security of systems and information.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="19.2.2."


><![CDATA[<p>This section describes the use and implementation of Cross Domain Solutions (CDS).</p>]]></paragraph>
<paragraph
    title="19.2.3."


><![CDATA[<p>CDS provide information flow control mechanisms at each layer of the OSI model with a higher level of assurance than typical gateways.  This section extends the preceding Gateways section.  CDS systems must apply controls from each section.</p>]]></paragraph>
<paragraph
    title="19.2.4."


><![CDATA[<p>19.2.1.&nbsp;&nbsp;&nbsp;&nbsp; Additional information relating to topics covered in this section can be found in the following chapters and sections:</p><ul>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-12591">Section 4.4 – Accreditation Framework</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-13260">Section 8.2 – Servers and Network Devices</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-13284">Section 8.3 – Network Infrastructure</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-13306">Section 8.4 – IT Equipment</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-15349">Section 16.1 – Identification, Authentication and passwords</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-15629">Section 16.6 – Event Logging and Auditing</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16568">Section 19.1 – Gateways</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16688">Section 19.3 – Firewalls</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16715">Section 19.4 – Diodes</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16735">Section 19.5 – Session Border Controllers</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16836">Section 20.1 – Data Transfers</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16876">Section 20.2 – Data Import and Export</a>; and</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16919">Section 20.3 – Content Filtering</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Deploying Cross Domain Solutions"><paragraph
    title="19.2.5."


><![CDATA[<p>Consult the section on Firewalls in this chapter for devices used to control data flow in bi-directional gateways.</p>]]></paragraph>
<paragraph
    title="19.2.6."


><![CDATA[<p>Consult the section on Diodes in this chapter for devices used to control data flow in uni-directional gateways.</p>]]></paragraph>
<paragraph
    title="19.2.7."


><![CDATA[<p>Consult the Data Transfers and Content Filtering sections for requirements on appropriately controlling data flows in both bi-directional and uni-directional gateways</p>]]></paragraph>
</block>
<block title="Types of gateways"><paragraph
    title="19.2.8."


><![CDATA[<p>This manual defines three types of gateways:</p><ul>
<li>access gateways;</li>
<li>multilevel gateways; and</li>
<li>transfer gateways.</li>
</ul>]]></paragraph>
</block>
<block title="Access Gateway"><paragraph
    title="19.2.9."


><![CDATA[<p>An access gateway provides the system user with access to multiple security domains from a single device.</p>
<p><img class="leftAlone" title="" src="assets/NZISM/19.2.9-Access-gateway.png" alt="19.2.9. Access Gateway" width="600" height="574"></p>]]></paragraph>
<paragraph
    title="19.2.10."


><![CDATA[<p>A transfer gateway facilitates the transfer of information, in one or multiple directions (low to high or high to low) between different security domains.  A traditional gateway to the Internet is considered a form of transfer gateway.</p>]]></paragraph>
<paragraph
    title="19.2.11."


><![CDATA[<p>The following illustrates a Uni-Directional Transfer Cross Domain Solution.</p>
<p><img class="leftAlone" title="" src="assets/NZISM/19.2.11-Uni-DIrectional.png" alt="19.2.11 Uni-Directional" width="600" height="461"></p>]]></paragraph>
<paragraph
    title="19.2.12."


><![CDATA[<p>A Bi-Directional Cross Domain Solution enables access, based on authorisations, to data at multiple classifications and releasability levels.</p>
<p><img class="leftAlone" title="" src="assets/NZISM/19.2.12-Bi-Directional.png" alt="19.2.12 Bi-Directional" width="600" height="519"></p>]]></paragraph>
<paragraph
    title="19.2.13."


><![CDATA[<p>A Multi-Level Transfer Cross Domain Solution enables access, based on authorisations, to data at multiple classifications and releasability levels.</p>
<p><img class="leftAlone" title="" src="assets/NZISM/19.2.13-Multi-Level.png" alt="19.2.13 Multi-Level" width="600" height="663"></p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="19.2.14."


><![CDATA[<p>Additional guidance can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cross Domain Solutions</strong></p>
</td>
<td style="text-align: center;">ASD</td>
<td style="width: 33%;">
<p><a title="Cross Domain Solutions" rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/guidance/cross-domain-solutions" target="_blank"></a><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/introduction-cross-domain-solutions" target="_blank">Introduction to Cross Domain Solutions | Cyber.gov.au</a><a title="Cross Domain Solutions" rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/guidance/cross-domain-solutions" target="_blank"></a></p>
<p><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/fundamentals-cross-domain-solutions" target="_blank">Fundamentals of Cross Domain Solutions | Cyber.gov.au</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Security principles for Cross Domain Solution</strong></td>
<td style="text-align: center;">NCSC UK</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/collection/cross-domain-solutions" target="_blank">Security principles for cross domain solutions - NCSC.GOV.UK</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Cross Domain Security Primer</strong></td>
<td style="text-align: center;">CSE Canada</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.cyber.gc.ca/en/guidance/cross-domain-security-primer-itsb-120" target="_blank">Cross domain security primer (ITSB-120) - Canadian Centre for Cyber Security</a></p>
</td>
</tr>
<tr>
<td><strong><strong>Sse-100-1</strong></strong></td>
<td><strong>Information Assurance Guidance For Systems Based On A Security Real-Time Operating System Systems Security Engineering&nbsp;</strong></td>
<td style="text-align: center;">NSA</td>
<td style="width: 33%;">
<p>Available at:</p>
<p><a rel="noopener noreferrer" href="https://www.amazon.com/National-Information-Assurance-Real-Time-Operating/dp/1508545707" target="_blank">National Security Agency Information Assurance Guidance for Systems Based on a Security Real-Time Operating System: Systems Security Engineering: National Security Agency: 9781508545705: Amazon.com: Books</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Solving the Cross-Domain Conundrum,</strong></p>
<strong>Colonel Bernard F. Koelsch United States Army, 2013</strong></td>
<td style="text-align: center;">US Army War College</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://apps.dtic.mil/sti/pdfs/ADA589325.pdf" target="_blank">ADA589325.pdf (dtic.mil)</a> &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><a href="https://www.microsoft.com/en-us/security/blog/2020/07/29/inside-microsoft-threat-protection-solving-cross-domain-security-incidents-through-the-power-of-correlation-analytics/"></a><strong>Inside Microsoft 365 Defender: Solving cross-domain security incidents through the power of correlation analytics - Microsoft Security Blog</strong></p>
</td>
<td style="text-align: center;">Microsoft</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.microsoft.com/en-us/security/blog/2020/07/29/inside-microsoft-threat-protection-solving-cross-domain-security-incidents-through-the-power-of-correlation-analytics/" target="_blank">Inside Microsoft 365 Defender: Solving cross-domain security incidents through the power of correlation analytics - Microsoft Security Blog</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Shedding Light on Cross Domain Solutions</strong></td>
<td style="text-align: center;">SANS</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.sans.org/reading-room/whitepapers/dlp/shedding-light-cross-domain-solutions-36492" target="_blank">https://www.sans.org/reading-room/whitepapers/dlp/shedding-light-cross-domain-solutions-36492</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Gateway classification"><paragraph
    title="19.2.15.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>The trust level or classification of systems directs users and systems administrators to the appropriate handling instructions and level of protection required for those systems.  This aids in the selection of systems controls.</p>]]></paragraph>
<paragraph
    title="19.2.15.C.01."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="3870"
><![CDATA[<p>For the purposes of this Manual, the CDS MUST be classified at the highest classification of connected domains.</p>]]></paragraph>
</block>
<block title="Allowable gateways"><paragraph
    title="19.2.16.R.01."

    tags="Technical,Gateways,Gateway Security"


><![CDATA[<p>Connecting systems to the Internet attracts significant risk and so highly classified systems are prohibited from being <em>directly</em> connected to each other or to the Internet.  If an agency wishes to connect a highly classified system to the Internet the connection will need to be cascaded through a system of a lesser classification that is approved to connect directly to the Internet.</p>]]></paragraph>
<paragraph
    title="19.2.16.C.01."

    tags="Technical,Gateways,Gateway Security"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3880"
><![CDATA[<p>Agencies connecting a TOP SECRET, SECRET OR CONFIDENTIAL network to any other network MUST implement a CDS.</p>]]></paragraph>
<paragraph
    title="19.2.16.C.02."

    tags="Technical,Gateways,Gateway Security"


    classification="Secret, Top Secret, Confidential"
    compliance="Must Not"
    cid="3887"
><![CDATA[<p>Agencies MUST NOT implement a gateway permitting data to flow directly from:</p><ul>
<li>a TOP SECRET network to any network below SECRET;</li>
<li>a SECRET network to an UNCLASSIFIED network; or</li>
<li>a CONFIDENTIAL network to an UNCLASSIFIED network.</li>
</ul>]]></paragraph>
</block>
<block title="Implementing Cross Domain Solutions"><paragraph
    title="19.2.17.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>Connecting multiple sets of gateways and Cross Domain Solutions (CDS) increases the threat surface and, consequently, the likelihood and impact of a network compromise.  When a gateway and a CDS share a common network, the higher security domain (such as a classified agency network) can be exposed to malicious activity, exploitation or denial of service from the lower security domain (such as the Internet).</p>]]></paragraph>
<paragraph
    title="19.2.17.R.02."

    tags="Technical,Gateway Security"


><![CDATA[<p>To manage this risk, CDS should implement products that have completed a high assurance evaluation, see <a title="Product Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>.&nbsp; The <a title="AISEP" rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/assessment-and-evaluation-programs/australian-information-security-evaluation-program" target="_blank">AISEP Evaluated Product List (EPL)</a> includes products that have been evaluated in the high assurance scheme but is not an exhaustive list.</p>
<p>Where CDS are not listed on the AISEP EPL, the GCSB can provide guidance on product selection and implementation on request.</p>]]></paragraph>
<paragraph
    title="19.2.17.C.01."

    tags="Technical,Gateway Security"


    classification="Secret, Confidential"
    compliance="Must"
    cid="3926"
><![CDATA[<p>When designing and deploying a CDS, agencies MUST consult with the GCSB and comply with all directions provided.</p>]]></paragraph>
<paragraph
    title="19.2.17.C.02."

    tags="Technical,Gateway Security"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="3927"
><![CDATA[<p>Agencies connecting a typical gateway and a CDS to a common network MUST consult the GCSB on the impact to the security of the CDS and comply with all directions provided.</p>]]></paragraph>
</block>
<block title="Separation of data flows"><paragraph
    title="19.2.18.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>Gateways connecting highly classified systems to lower classified, or Internet connected systems need to incorporate physically separate paths to provide stronger control of information flows.  Typically this is achieved through separate pathing and the use of diodes. Such gateways are generally restricted to process and communicate only highly-structured formal messaging traffic.</p>]]></paragraph>
<paragraph
    title="19.2.18.C.01."

    tags="Technical,Gateway Security"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="3929"
><![CDATA[<p>Agencies MUST ensure that all bi-directional gateways between TOP SECRET and SECRET networks, SECRET and less classified networks, and CONFIDENTIAL and less classified networks, have separate upward and downward paths which use a diode and physically separate infrastructure for each path.</p>]]></paragraph>
</block>
<block title="Trusted sources"><paragraph
    title="19.2.19.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>Trusted sources are designated personnel who have the delegated authority to assess and approve the transfer or release of data or documents.  Trusted sources may include security personnel within the agency such the CISO and the ITSM.</p>]]></paragraph>
<paragraph
    title="19.2.19.C.01."

    tags="Technical,Gateway Security"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3932"
><![CDATA[<p>Trusted sources MUST be:</p><ul>
<li>a strictly limited list derived from business requirements and the result of a security risk assessment;</li>
<li>where necessary an appropriate security clearance is held; and</li>
<li>approved by the Accreditation Authority.</li>
</ul>]]></paragraph>
<paragraph
    title="19.2.19.C.02."

    tags="Technical,Gateway Security"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="3933"
><![CDATA[<p>Trusted sources MUST authorise all data to be exported from a security domain.</p>]]></paragraph>
</block>
<block title="Operation of the Cross Domain Solution"><paragraph
    title="19.2.20.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>The highly sensitive nature of the data within cross domain solutions requires additional audit and logging for control, management, record and forensic purposes.&nbsp; This is in addition to the audit and logging requirements in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15629">Section 16.6 – Event Logging and Auditing</a>.</p>]]></paragraph>
<paragraph
    title="19.2.20.C.01."

    tags="Technical,Gateway Security"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3936"
><![CDATA[<p>All data exported from a security domain MUST be logged.</p>]]></paragraph>
</block>
</subsection>
</section>
