There are three types of cross-domain solutions (CDS). 10 These types are broken down into Access, Transfer, and Multi-level solutions (MLS) and all must be included in the cross-domain baseline list before Department of Defense-specific site implementations.11 Access Solution "An access solution describes a user’s ability to view and manipulate information from domains of differing security levels and caveats. In theory, the ideal solution respects separation requirements between domains by preventing overlapping data between domains, which ensures data of different classifications cannot ‘leak’ (i.e. data spill) between networks at any host layer of the OSI/TCP model. In practice, however, data spills are an ever-present concern that system designers attempt to mitigate within acceptable risk levels. For this reason, data transfer is addressed as a separate CDS".12 Transfer Solution offers the ability to move information between security domains that are of different classification level or different caveat of the same classification level. Multi-level Solutions "Access and transfer solutions rely on multiple security levels (MSL) approaches that maintain the separation of domains; this architecture is considered multiple single levels. A multi-level solution (MLS) differs from MSL architecture by storing all data in a single domain. The solution uses trusted labeling and integrated Mandatory Access Control (MAC) schema as a basis to mediate data flow and access according to user credentials and clearance to authenticate read and write privileges. In this manner, an MLS is considered an all-in-one CDS, encompassing both access and data transfer capabilities."13
In previous decades, multilevel security (MLS) technologies were developed. These enforced mandatory access control (MAC) with near certainty. Automated information systems sometimes share information contrary to the need to avoid sharing secrets with adversaries. When the ‘balance’ is decided at the discretion of users, the access control is called discretionary access control (DAC), that is more tolerant of actions that manage risk where MAC requires risk avoidance.
These documents provide standards guidance on risk management:
"Cross Domain Enterprise Service (CDES)". Information Assurance Support Environment. Defense Information Systems Agency (DISA). 2011-11-16. Archived from the original on 2008-03-26. Retrieved 2012-01-16. https://web.archive.org/web/20080326230421/http://iase.disa.mil/cds/ ↩
"Learn About Cross Domain Solutions". Owl Cyber Defense. Aug 25, 2020. Archived from the original on 2020-09-21. https://owlcyberdefense.com/learn-about-cross-domain-solutions/ ↩
"Cloud Computing Strategy" (PDF). DTIC.MIL. Archived (PDF) from the original on August 16, 2016. http://apps.dtic.mil/dtic/tr/fulltext/u2/a563989.pdf ↩
Aristotle, Jacob (April 2012). Cross-Domain Solution. Secut Press. ISBN 978-613-6-31800-4. 978-613-6-31800-4 ↩
Slater, T. "Cross-Domain Interoperability"[usurped], Network Centric Operations Industry Consortium - NCOIC[usurped], 2013 https://web.archive.org/web/20140714155934/http://www.ncoic.org/cross-domain-interoperability/ ↩
"Cross Domain Solutions - Ensuring Complete Data Security". http://www.crossdomainsolutions.com ↩
"Nexor Data Diode". Nexor. Retrieved 3 June 2013. http://www.nexor.com/data-diodes ↩
"Dual Data Diode Information Transfer Products". Owl Cyber Defense, LLC. Retrieved 2019-08-20. http://www.owlcyberdefense.com ↩
"Can an Airplane Get Hacked? (Probably.)". Interset. 2017-01-04. Retrieved 2019-03-07. https://interset.com/2017/01/04/can-airplane-get-hacked-probably/ ↩
"Department of Defense Instruction (DoDI) 854001p" (PDF). esd.whs.mil. Retrieved 28 January 2024.{{cite web}}: CS1 maint: url-status (link) https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/854001p.pdf ↩
"CNSSI-4009" (PDF). RMF.org. Archived (PDF) from the original on 2020-02-28. Retrieved 28 February 2020. https://rmf.org/wp-content/uploads/2017/10/CNSSI-4009.pdf ↩
Smith, Scott (28 February 2020). "Shedding Light on Cross Domain Solutions". SANS Institute Information Security Reading Room. Archived from the original on 2020-02-28. Retrieved 28 February 2020. https://www.sans.org/reading-room/whitepapers/dlp/shedding-light-cross-domain-solutions-36492 ↩