19min read (2484 words)
The need to transfer information between defense systems is overlaid with the need to restrict information transfer based on security classifications. Information approved for a given security domain should only be transferred to systems authorized for that domain. Cross-domain solutions (CDS) are mechanisms for implementing appropriate transfers based on a defined security policy but reliance on software makes these CDS vulnerable to cyberattacks, while the centralized model limits their usefulness with high-bandwidth, many-sensor data streams. The next generation of CDS will look very different, delivering more security, higher performance, and greater flexibility.
Read this white paper to learn:
- System security domains and the way information is shared in defense systems
- Limitations of current cross domain solution designs
- The traditional centralized CDS implementation, downsides, and security vulnerabilities
- Why centralized CDS will not work with AI, 6G and IoT
- Mercury's track-record in creating CDS solutions that are still being used today
- Design requirements for the next generation CDS
- Bookend CDS model using FPGAs that will mitigate cyberattacks
- DARPA Guaranteed Architecture Physical Security (GAPS) program achievements in CDS