An L3 Perspective on Allied Data Security
-
Upload
icsa-llc -
Category
Government & Nonprofit
-
view
261 -
download
0
Transcript of An L3 Perspective on Allied Data Security
1
Joint force Information
Exchange and Data
Integrity in a Coalition
Environment
Rob Slaven, DSML-3 Communication Systems Australia
3
Come as you are warfare
For a Coalition finding a common cause is hard, speaking one language is harder, whilst using common systems and equipment configurations would seem to be the hardest challenge of them all
5
Integration as a stepping stone
The challenge isn’t
technical in nature, but
technical solutions exist
to address the issue in
the short term given early
holistic focus
7
Black Routed WAN(e.g. MTWAN)
HAIPECrypto HAIPE
Crypto
Black IPBlack IP
UNCLASSIFIED Data
PROTECTED/FOUOData
Black IP
Black IP
5-Eyes SECRET Data
TOP SECRET Data
AUSTEO SECRET Data
HAIPECrypto
Black IP
TCDL with Embedded Crypto e.g.
ROVER, mini-CDL
Red IP
Satcom Links
Terr
estr
ial L
inks
Data Diode
8
How to address the problem?
• Internationally agreed interface standards and programming languages are a first step
• Initiation of a cyber secure program environment from project initiation is a necessary step
9
A Future Vision
• All sensors
• All data
• All weapons
• All bandwidth
• One picture
• One unified
response