Cross-Domain Solutions
Everything you need to understand cross-domain solutions -- what they are, how they work, and how to choose the right one.
I'm new to CDS -- where do I start?
Start here:
- What is a CDS? -- the definition, the history, and why it's not a firewall
- Why CDS Matters -- the information sharing dilemma and real-world contexts
- The Three Types of CDS -- access, transfer, and multi-level solutions
- How CDS Works -- data flows, protocol break, treatments, and security enforcement
That sequence will take you from zero to a solid working understanding.
I'm an architect evaluating CDS options
You probably already know what CDS is. Jump to the technical detail:
- The Three Types -- make sure you have the taxonomy straight
- Protocol Break -- the foundational security mechanism
- Treatments and Transforms -- the 12+ treatment types in a CDS pipeline
- Security Enforcement -- labels, access control, audit
I'm in policy or compliance
Focus on the governance and standards material:
- What is a CDS? -- get the formal definitions (NIST, NCSC, NSA, ASD)
- Security Enforcement -- how security labels and access control work
- Why CDS Matters -- the stakes and the regulatory context
I want to build a software CDS
Understand the fundamentals first, then go deep on the mechanisms your software must implement:
- Protocol Break -- if you skip this, you're not building a CDS
- Treatments and Transforms -- the treatment pipeline your software needs
- Data Flow Models -- unidirectional, bidirectional, and multi-level flows
- Security Enforcement -- labels, MAC, ABAC, and audit
Key Concepts
- Cross-Domain Solution (CDS)
- A controlled interface that enables the manual or automatic transfer of information between security domains at different classification levels, while enforcing information flow policy. Not a firewall -- a CDS inspects and transforms the content, not just the network packets.
- Security Domain
- A collection of systems, networks, and users that share the same security policies and classification level. For example, a SECRET network is one security domain; an UNCLASSIFIED network is another.
- Protocol Break
- The deliberate termination of one network connection, extraction of the data payload, and creation of an entirely new connection on the other side of the security boundary. The foundational mechanism that makes a CDS a CDS. See Protocol Break.
- Security Label
- Machine-readable metadata attached to data that encodes its classification, handling caveats, and release constraints. NATO STANAGs 4774 and 4778 are the closest thing to an international standard. See Security Enforcement.
- Treatment
- Any processing step applied to data as it crosses a security boundary -- content inspection, format verification, CDR, dirty word search, label checking, and more. See Treatments and Transforms.
- Data Diode
- A hardware device that enforces physically unidirectional data flow. Data can travel in one direction only -- the physics makes reverse flow impossible. Zero reported successful cyber attacks, ever.
- Guard
- A bidirectional CDS that inspects, filters, and transforms content as it crosses a security boundary. Operates as a full application-layer proxy with complete protocol break.