×

Please register to view this content

First Name
Last Name
Company
Job Title
Country
State
Opt me in to receive communications from Mercury Systems
Thank you
Error - something went wrong!
   

White Paper: Cloud-Scalable Cross-Domain Solutions for an Evolving Battlefield

August 9, 2021

On today’s battlefield, rapid and secure information transfer between defense systems is essential for effective and synergistic response. However, information must be restricted based on security classifications. This white paper outlines the need for cross-domain solutions, discusses current and future methodologies, including a DARPA project, and implementation challenges. 

White paper Intro

Cross-domain solutions (CDS) are mechanisms for implementing appropriate transfers based on a defined security policy. For example, information with various security levels is commonly found within high-security systems; a CDS controls transfers to lower-security level systems, so that only approved information flows to the lower levels and restricted information is withheld.

Most current CDS use specialized software, and sometimes custom hardware, to enforce security-based transfer restrictions. They are often located in the middle of a network architecture, controlling information flows between systems. Reliance on software makes these CDS vulnerable to cyberattack, while the centralized model limits their usefulness with high-bandwidth, many-sensor data streams.

Fortunately, new CDS design concepts are emerging that will enable distributed, multi-domain architectures. The next generation of CDS will look very different, delivering more security, higher performance, and greater flexibility

 

Previous Asset
Solutions Brief: Intel and Mercury Deliver Rugged Edge Processing and Advanced Security for Defense
Solutions Brief: Intel and Mercury Deliver Rugged Edge Processing and Advanced Security for Defense

Mercury Systems is partnering with Intel to develop high-performance, ruggedized, and secure edge computing...

Next Video
Strengthening Cybersecurity at the Edge: Intel and Mercury talk multilayered security
Strengthening Cybersecurity at the Edge: Intel and Mercury talk multilayered security

Taking secure computing to the tactical edge requires a built-in multilayered security approach from system...