Hardware CDS
Hardware cross-domain solutions are the gold standard of assurance. Their security properties are rooted in physics, not software -- a fibre optic transmitter without a receiver physically cannot leak data backwards, no matter what code is running on the systems it connects.
This matters because hardware-enforced security boundaries cannot be bypassed by software vulnerabilities, zero-day exploits, or misconfiguration. Even if every computer on both sides of a hardware CDS is fully compromised, the security boundary holds.
Hardware CDS comes in two main flavours:
- Data diodes
- One-way transfer devices that use optical or electrical isolation to guarantee data can only flow in a single direction. The simplest and highest-assurance form of CDS, with zero reported breaches in decades of deployment. Read more about data diodes.
- Guards
- Bidirectional devices that inspect, filter, and control data flowing between security domains. More capable than diodes but with a larger attack surface and more complex certification path. Read more about guards.
Both types share a set of key characteristics that define what makes a CDS "hardware" -- physical separation, tamper resistance, TEMPEST compliance, hardware root of trust, and non-bypassable security enforcement.
If you are trying to decide between hardware and software approaches, the hardware vs software trade-off analysis covers the decision criteria in detail. For lower-sensitivity boundaries or cloud deployments, software CDS may be more appropriate -- but for SECRET and above, hardware remains the requirement in most national frameworks.