INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE

Similar documents
SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE

NATO automated information system co-operative zone technologies

Simplifying Information Sharing Across Security Boundaries. Deep-Secure Overview 12 th November 2013, Prague. Presentation to.

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Secure information exchange

Presentation Title 11/13/2013

Information Technology Security Guideline. Network Security Zoning

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Security

Information Security Controls Policy

Training UNIFIED SECURITY. Signature based packet analysis

INFORMATION ASSURANCE DIRECTORATE

Cisco s Appliance-based Content Security: IronPort and Web Security

Security Secure Information Sharing

All-in one security for large and medium-sized businesses.

IC32E - Pre-Instructional Survey

HP Instant Support Enterprise Edition (ISEE) Security overview

Transport Layer Security

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Forum XWall and Oracle Application Server 10g

Firewalls for Secure Unified Communications

Distributed Systems. Lecture 14: Security. 5 March,

Future-ready security for small and mid-size enterprises

Most Common Security Threats (cont.)

DeepSecure (CSDS) Release 2.1

RID IETF Draft Update

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

Lotus Protector Interop Guide. Mail Encryption Mail Security Version 1.4

Computers and Security

Campus Network Design

NGN: Carriers and Vendors Must Take Security Seriously

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Siebel CRM. Siebel Security Hardening Guide Siebel Innovation Pack 2015 E

Reviewer s guide. PureMessage for Windows/Exchange Product tour

A Review Paper on Network Security Attacks and Defences

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

the Corba/Java Firewall

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

A policy that the user agrees to follow before being allowed to access a network.

Internet Security: Firewall

INFORMATION ASSURANCE DIRECTORATE

NIS Standardisation ENISA view

Security by Default: Enabling Transformation Through Cyber Resilience

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

Security Assessment Checklist

Office 365 Integration Guide Software Version 6.7

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco Threat Control Solutions. Version: Demo

SAML-Based SSO Solution

SRX als NGFW. Michel Tepper Consultant

Public Key Infrastructure

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

CompTIA. SY0-401 EXAM CompTIA Security+ Certification Exam. m/ Product: Demo. For More Information:

Best Practice Guide. Encryption and Secure File Transfer

Chapter 5. Security Components and Considerations.

Chapter 9. Firewalls

INFORMATION ASSURANCE DIRECTORATE

Red Condor had. during. testing. Vx Technology high availability. AntiSpam,

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

User Guide Addendum Nomadix Service Engine (NSE) - Release X.5 October 2007 Introduction

Simple and Powerful Security for PCI DSS

Factsheet of Public Services Infrastructure (PSi) Updated on: 1st Sep 03

Deployment Options for Exchange March 2006

The X.500 Directory Standard: A Key Component of Identity Management

CIS Controls Measures and Metrics for Version 7

Security+ SY0-501 Study Guide Table of Contents

CSC Network Security

Certification Report

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

SAML-Based SSO Solution

Whitepapers. LDAP and X.500. First Published in Messaging Magazine, September What is Common to X.500 and LDAP

Network Security and Cryptography. 2 September Marking Scheme

Configure Basic Firewall Settings on the RV34x Series Router

Secure Communications on VoIP Networks

CIS Controls Measures and Metrics for Version 7

Carbon Black PCI Compliance Mapping Checklist

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

Integrating Microsoft Forefront Threat Management Gateway (TMG)

CompTIA Security+(2008 Edition) Exam

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Application Firewalls

Ingate SIParator /Firewall SIP Security for the Enterprise

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

BeOn Security Cybersecurity for Critical Communications Systems

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

COSC 301 Network Management

Towards secure Internet. TIVIT results and business forum, Prof. Mika Rautila VTT Technical Research Centre of Finland

Technical Brochure F-SECURE THREAT SHIELD

Security Gap Analysis: Aggregrated Results

NOAA TICAP. Robert Sears NOAA/OCIO/SDD/N-Wave

What is SIP Trunking? ebook

Service Description Safecom Customer Connection Version 3.5

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

Network Security Essentials

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Transcription:

INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED

CONTENTS 3 4 5 6 7 8 11 12 13 14 15 INTRODUCTION IEG SCENARIOS REFERENCE ARCHITECTURE ARCHITECTURE DESCRIPTION: OVERVIEW NODE PROTECTION INFORMATION EXCHANGE INFORMATION PROTECTION IEG MANAGEMENT SUMMARY IEG TERMINOLOGY ABOUT NEXOR Version 1.0 published March 2009 Version 1.1 published September 2013 Version 1.2 published January 2015 Version 1.3 published May 2017 INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE 2

INTRODUCTION Today s climate of coalition based operations and network enabled capability (NEC) means that there is a growing requirement for exchange of information between security and management domains. has defined the concept of an Information Exchange Gateway (IEG) to facilitate secure communication between different security and management domains. The IEG is designed to provide a standard and secure method of communication between, nations, non- nations, coalition forces, Non Government Organisations (NGOs), and other international organisations (IOs). The need to ensure information assurance, namely confidentiality, integrity and availability of information, has led to an IEG architecture which makes use of: Well-defined, limited and symmetrical interfaces A minimised number of standard protocols The IEG works on the principle of the self-protecting node; it assumes that everything is hostile including the internal network, so only information and services that need to be exchanged are allowed across the IEG. Figure 1 shows a high level view of the IEG concept connecting two security domains, A and B, with two symmetric gateways (IEGs), each protecting its own domain. This paper aims to provide a high level overview of the IEG, its components and their purpose. has defined a number of scenarios for the use of IEGs, each of which is described at a high level in the next section of this paper. The remainder of the paper discusses the IEG architecture and components. Figure 1 INFORMATION EXCHANGE GATEWAY HIGH LEVEL VIEW Node Protection Information Protection Node Protection Information Protection A B Information Exchange IEG Management Information Exchange IEG Management INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE 3

IEG SCENARIOS has defined five main IEG scenarios each with scenario variants. A few standardised IEG solutions can meet the requirement for most or all different scenarios, currently four standard designs have been devised. The scenarios take account of the security classifications of the domains that they connect, as well as the security policy, the owners and the administrators of those domains. Figure 2 shows the scenarios labelled A through to E. Scenario A is defined for connecting two domains that have the same security classification level and same baseline CIS, but are operated by different authorities. Typically, this will be a enclave run inside a nation. Scenario B is defined for connecting two domains that have the same security classification level, but different security policies, for example a nation connecting to. Scenario B variants also cover connecting multiple/different security classification levels with the same security policy, for example SECRET to RESTRICTED. Scenario C is defined for connecting deployed mission systems to other domains. Scenario D is defined for connecting systems to international organisations or non-government organisations. Scenario E is defined for connecting systems to the Internet or systems to UNCLASSIFIED systems that are connected to the Internet. As can be seen from Figure 2, a number of IEGs will be required in the deployed space to support information sharing during missions. Deployed IEGs will potentially be required to run on smaller, more mobile, ruggedised platforms and support a larger variety of physical connectors. Figure 2 DEFINED IEG SCENARIOS SECRET NON NATIONS D INTERNATIONAL ORGANISATIONS NATIONS C MISSIONS C A B B OPERATED BY NATION NATIONS C RESTRICTED MISSIONS C B NATIONS UNCLASSIFIED E D INTERNATIONAL ORGANISATIONS MISSIONS B NATIONS INTERNET E E INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE 4

REFERENCE ARCHITECTURE This section introduces the reference architecture for an IEG. The reference architecture identifies the key components of a solution and defines their functionality. The architecture is product and vendor independent. Four standard designs have been defined by for the IEG. The designs build up incrementally to handle the different scenarios described in the previous section. The architecture presented here is one that will support the main scenarios B, C and D. Scenario A requires a subset of this architecture and Scenario E requires a data diode in addition to this architecture. which connects to an IEG in order to communicate with the B domain. The IEG can be broken into four logical components: Node Protection Information Exchange Information Protection Information Management Figure 3 below shows an IEG protecting the A domain, Figure 3 INFORMATION EXCHANGE GATEWAY (IEG) REFERENCE ARCHITECTURE Management Server Management Client IEG MANAGEMENT A Network IDS Firewall Switch Network IDS Router B Internal Domain External Domain NODE PROTECTION MMHS Web Directory Email Guard Guard INFORMATION EXCHANGE INFORMATION PROTECTION INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE 5

ARCHITECTURE DESCRIPTION: OVERVIEW This section provides a brief introduction to each component of the reference architecture shown in Figure 4. The IEG comprises four main services: The IEG works on the principle of the self-protecting node; it assumes that any domain to which it might connect may be hostile. In order to allow exchange of information with other domains, it therefore must provide some protection for the domain. There are two levels of protection to be provided, Node Protection and Information Protection. Figure 4 THE IEG COMPRISES FOUR MAIN SERVICES Node Protection Information Protection Information Exchange IEG Management Node Protection Information Protection Information Exchange IEG Management This protects the infrastructure of the domain by providing services such as network filtering, intrusion detection and virus / malware detection. This protects the data residing in the domain by providing services to check the releasability of information outside of the domain. The purpose of the IEG is to enable information exchange with other domains. The information exchange is controlled in an IEG through the use of proxies to enable specific information flows only. The proxies also enable information flow between non IP routable networks which is currently the typical classified network situation between and Nations. The IEG must be managed to ensure that it is acting correctly. A separate management network allows various components to be monitored and managed in a secure way. INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE 6

NODE PROTECTION The infrastructure of the IEG is protected using a number of standard networking components including switches, routers and firewalls. Routers Routers provide network routing and optionally network address translation between the different networks and packet filtering to provide an initial level of defence from the external network. The router will only advertise the IP addresses of the IEG network and will hide the internal domain from the outside. Switches Switches enable an efficient way of connecting the different components within the IEG. Firewalls Firewalls, typically deployed in a resilient failover mode, ensure that only the protocols that are necessary for information exchange are actually allowed through the IEG. Firewalls will ensure that only authorised connections can be made to the IEG from both internal and external servers. Intrusion Detection Systems Intrusion Detection Systems (IDS) protect the infrastructure by detecting unwanted access to the various computer systems that they monitor and subsequently alerting administrators of the potential security breach. Network-based IDS (NIDS) examine the network traffic entering the IEG and can protect against port scans and denial of service attacks. A NIDS may also be used to monitor the local traffic in the IEG to protect against internally originated attacks. Host-based IDS (HIDS) work in conjunction with NIDS to monitor individual computers for inappropriate access to resources. The IDS will require active management to ensure that the relevant signature databases are up to date and that any alerts generated are followed up on. INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE 7

INFORMATION EXCHANGE Information exchange between domains is only allowed via proxy servers in all but the simplest standard IEG design for the Enclaves. These servers ensure that there is no direct connection between servers in the external domain and servers in the internal domain. Proxy servers only allow authorised connections to remote servers and can use techniques such as strong authentication to ensure that the remote server is trusted. Proxy servers can also perform some node protection services by detecting and preventing application level attacks, for example virus or malware scanning or spam detection. Proxy servers also provide a known protocol implementation conformance, hiding the internal domain implementation of the protocol. This provides a good basis for interoperability with the remote gateway which is further improved where both gateways share the same implementation. The actual proxy servers required in an IEG will depend on the information that is to be exchanged between the two partners. Initially, basic services will include informal messaging (email), web browsing, directory replication and formal (military) messaging. Each service will require a proxy server to mediate the traffic flowing between the two domains. Figure 5 LOGICAL EMAIL MESSAGE FLOW THROUGH AN IEG National MTA SMTP / X.400 National IEG Proxy MTA SMTP / X.400 IEG Proxy MTA SMTP / X.400 MTA An Email Proxy Server will typically be a Message Transfer Agent (MTA) capable of handling X.400 or SMTP traffic and supporting rich content such as attachments. Figure 5 shows the logical message flow between and a nation through an IEG. INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE 8

INFORMATION EXCHANGE CONT. Figure 6 LOGICAL DIRECTORY REPLICATION FLOW THROUGH AN IEG National Border Directory X.500 / LDAP National IEG Proxy Directory X.500 DISP IEG Proxy Directory X.500 DISP Border Directory National IEG Meta Directory or LDAP A Directory Replication Proxy Server will allow replication between the two domains. Directory replication will typically be using either X.500 Directory Information Shadowing Protocol (DISP) or a Meta directory product using LDAP v3 to read and write to the remote proxy server. Figure 6 shows the logical flow for directory replication between and a nation through an IEG. Figure 7 LOGICAL WEB BROWSING FLOW THROUGH AN IEG National Web Proxy HTTP(s) National IEG Web Proxy HTTP(s) IEG Web Proxy HTTP(s) Web Proxy National Web Browser Web Server A Web Browsing Proxy Server will allow browsing of web pages between the two domains. Web browsing will use the HTTP(S) protocol. Figure 7 shows the logical flow for browsing a web page in the domain from a national domain. INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE 9

INFORMATION EXCHANGE CONT. Figure 8 LOGICAL FORMAL MESSAGE FLOW THROUGH AN IEG National MMHS Border MTA X.400 National IEG X.400 IEG X.400 Proxy MMHS MTA Proxy MMHS MTA NMS Border MTA A Formal Messaging Proxy Server will be an MTA capable of handling X.400 traffic and supporting rich content such as attachments. Interworking of formal messages with the Messaging System (NMS) will require support for digitally signed X.400 messages, as defined in STANAG 4406 Edition 2. On the national side, a border MTA will be required to validate signed messages and generate valid signed messages for transfer to NMS. This will require a public key infrastructure (PKI) and potentially introduce the need for cross certification between national and PKIs. Figure 8 shows the logical formal message flow between and a nation through an IEG. Potential future services also requiring proxy servers include instant messaging (chat), teleconferencing, voice and web services. INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE 10

INFORMATION PROTECTION Information protection services are provided by application level guards. Application guards inspect the application data to ensure that the information is suitable for release from the internal domain. A security policy defines what suitable for release means and the application guard ensures that the security policy is enforced. Typically, this might include checking who the information is coming from, who it is going to, what type of information is being sent and, perhaps most importantly, whether the information has an appropriate protective marking security label. Application guards can also perform some node protection services by ensuring that incoming data does not contain any embedded malicious or unwanted data. For example, incoming email messages may be scanned for viruses and malicious code. The actual application guards required in an IEG will depend on the information that is to be exchanged between the two partners. Initial IEG implementations have included messaging guards to ensure that email traffic can be released from the domain. A Messaging Guard will typically be required to perform a number of checks: Valid security label to ensure that there is a correctly formed label attached to the message. For informal messaging, this is typically in the first line of text or subject of the message Releasable security label to ensure that the label found on the message is allowed to be transferred to the remote domain. Valid attachments to ensure that any attachments in the message are of a type supported by the remote domain. Valid From/To to ensure that the email has originated from a trusted source and is being sent to a known set of recipients. Figure 9 shows the logical message flow including a mail guard in the national IEG to protect national information. Potential services also requiring application level guards include instant messaging, directory replication, web services, and other XML based content. An XML Guard will validate XML schema and check for XML based security labels, as well as verifying the payload of the data which will depend on the services being exchanged. Figure 9 LOGICAL MESSAGE FLOW THROUGH AN IEG INCLUDING MAIL GUARD National MTA National IEG Proxy MTA National IEG Mail Guard IEG Proxy MTA MTA INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE 11

IEG MANAGEMENT As described previously, the IEG is a collection of components all contributing essential services. Each of the components must be managed in a secure manner. IEG management must include: Network, systems and services monitoring Software and hardware configuration management Collection and reporting of information from the intrusion detection systems Management of the security policy in the network and application level guards Management of the proxy servers Updates for anti-virus and IDS signatures Centralised log collection and analysis Management of individual components will often be by proprietary means although common standards, such as SNMP, can help to provide a common management interface for the IEG as a system. Whilst SNMP is primarily used for network monitoring, a number of standards are being developed to allow centralised management and configuration of a number of network components. INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE 12

SUMMARY There is a growing requirement for exchange of information between multiple domains that are owned and managed by different communities and that run at different security levels. has defined the concept of an Information Exchange Gateway to address this need for communication with. The IEG is designed to be flexible to support the exchange of multiple different services whilst maintaining a degree of separation between the communities. This paper has provided a high-level view of the components and their purpose in an IEG. Information on Nexor s IEG capability can be found in the complementary White Paper Information Exchange Gateways: Nexor Technical Position. INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE 13

IEG TERMINOLOGY CIS DISP HTTP IDS IEG IETF IO IP ITU LDAP MTA MMHS NETCONF NGO NMS PKI RFC SMTP SNMP STANAG 4406 XML X.400 X.500 Communications and Information System Directory Information Shadowing Protocol Hyper Text Transport Protocol Intrusion Detection System Information Exchange Gateway Internet Engineering Task Force International Organisation Internet Protocol International Telecommunication Union Lightweight Directory Access Protocol Message Transfer Agent Military Message Handling System North Atlantic Treaty Organisation Network Configuration protocol Non Government Organisation Messaging System Public Key Infrastructure Request For Comments (an IETF standard) Simple Mail Transfer Protocol Simple Network Management Protocol Standard for Military Messaging Extensible Markup Language ITU Message Handling Systems standards ITU Directory Systems standards INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE 14

ABOUT NEXOR Nexor has a rich history of deploying Information Exchange Gateway (IEG) solutions that support mission critical systems. With our heritage in research we continue to innovate and apply this approach to creating solutions to meet our customers specific requirements. Our track record is exemplified by our long-term relationships with key military organisations, such as and the European Defence Agency, as well as partnerships with a wide range of system integrators and channel partners. Our innovative IEG solutions have created competitive advantage for our customers and on several occasions Nexor has created a solution that proves to be a technological first. Our solutions are based on our industry-leading SIXA technology portfolio, which has a modular architectural design that offers both security and flexibility. Combined with our technology integration and software engineering capabilities, this ensures that we can provide solutions to an extensive set of IEG scenarios. Underlying our creativity is a value set that encompasses our commitment to customer service, communication and continuous improvement. We believe in doing things properly, which is why our customers have such high levels of confidence in our trustworthy IEG solutions. CONTACT DETAILS Nexor Limited, 8 The Triangle, Enterprise Way ng2 Business Park, Nottingham, NG2 1AE, UK +44 (0)115 952 0500 info@nexor.com www.nexor.com INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE 15 WP-0033-0517