Remote Management in Practice

decisioncrunchNetworking and Communications

Nov 20, 2013 (3 years and 9 months ago)

62 views

Distributed Mission Operations

Cross Domain Solution

Remote Management in Practice


Bonnie Page Danner, CISSP

Northrop Grumman Information Systems

Topics

DCDS Remote Management Accomplishment

Addressing the Risks

Remote Management Conceptual View

DMON Remote Management Process

Reduced Costs and Stronger Security

Evolving Solutions

Certification and Accreditation

Remote Management Experience

Future Considerations


2

DCDS Remote Management Accomplishment

Accreditation Guidance States: “Remote administration of the
Controlled Interface is discouraged”

Few remotely managed Cross Domain Solutions (CDS) are
operational


None in the simulation training environment before the DMO Network
CDS (DCDS)

Accomplishment challenges:


Designing and implementing sufficient safeguards to address remote
management risk concerns


Convincing accreditation authorities that trustworthy DCDS remote
management was possible


Providing assurance evidence for residual risk acceptance


Obtaining persistent Approvals to Operate


3

Addressing the Risks




4

DMON Cross Domain Solution Remote Management addresses risks
and meets Designated Approval Authority requirements:


Privileged users only and Role Based Access Controls (RBAC)


Secure Operating System Foundation and Mandatory Access Controls


Tightly Closed Environment with all users cleared to at least Secret level


Dedicated Crypto
-
nets between Management and Controlled interface
using NSA Type 1 Encryption and Secure shell end
-
to
-
end access
protections


Unique within the modeling, simulation and training environment



DMON Event Remote Management Process

Historical Precedence for Single Domain Network Events


Event managers at the DMON Operations Center set up network
security components and allow network connections for
Distributed Interactive Simulation (DIS) information exchange
between participant training sites


Remote management of network Portal systems including audit
collection and Portal software updates and control

Remotely Managed DCDS Controlled Interfaces Located in
DMON Portal Kits at Defined Participant Sites


Aligns cross domain event management with single domain DMO
Network Concept of Operations

5

Reduced Cost and Stronger Security

Cost to Centrally Manage Controlled Interfaces is
Significantly Less than Local Management at Each DMON
Cross Domain Solution Mission Training Center


Fewer people to train for security operations and maintenance


Implementing separation of roles, security system management
and rules deployment are accomplished at DMON operations
center where expertise resides

Trustworthy System Management Strengthens Security
Solution


Trustworthy assembly, testing, installation procedures, hardened
operating systems, controlled system access, dedicated crypto
-
nets, and remote monitoring of system security

6

Evolving Solutions

Successful solutions since 2006:


The DMO Cross Domain Solution received 20 Approvals to
Operate


Fielded at 13 USAF Mission Training Center worldwide sites


Implemented 9 different rule sets/security policies (some sites host
two different rule sets)


Three DMO Cross Domain Solution versions evolved and all are in
the process of being upgraded over time to the most current
version


DCDS version 1: Leveraged accredited Intelligence application


DCDS version 2: Improved to help address complex rules


DCDS version 3 (current): Provides notable security enhancements




7

DCDSv3 Remote Management Architecture

Provides full Controlled Interface
capabilities, complete transaction
accounting

Adds policy driven LINUX security
extensions, Advanced Intrusion
Detection System
Environment, and
restricted communication path through
specified IP tables

Improves monitoring and transaction
capabilities for better accountability of
data flows

Expands audit capability and enables
real
-
time review of selected options

Offers simplified architecture without a
need for external recorders of data flows

Adds expanded role of “Operator” to
Role Based Access Control to help
ensure proper system operations during
training events




8

DCDSv3 Remote Management Architecture
A2011.031
Crypto
Management
GEMS
PL3
`
Elmendorf ECDS
Management
System (EMS)
TSol 8
(V240)
PL3
Crypto
Management
GEMS
TACLANE
`
Elmendorf ECDS
Management
System (EMS)
TSol 8
(V240)
PL3
Crypto
Management
Encryption
Mgmt Net
Encryptor
DMO Network
Encryptor
Encryptor
At the
High
-
side
MTC
`
DMON CDS
Management
System
(DMS
)
PL3
DCDS
Cryptonet
DCDS
Controlled
Interface
At the
High
-
side
MTC
In the
Orlando
DOC
In the
Orlando
DOC
DIS PDUs
to low side
DIS PDUs
to high side
DIS PDUs
from low side
DIS PDUs
from high side
Certification and Accreditation

Meets Joint Air Force, Army Navy (JAFAN) 6/3 Guidance

Approved for Protection Level 3 Confidentiality

9

Section

Requirement

7
.
B
.
2
.
k

Remote

administration

of

the

Controlled

Interface

is

discouraged
.

All

remote

administration

of

Controlled

Interfaces

requires

written

approval

of

the

Designated

Approval

Authority
.

If

remote

administration

is

employed,

the

session

must

be

protected

through

the

use

of

the

following

techniques
:

7
.
B
.
2
.
k(
1
)

Strong

authentication,

and

either

7
.
B
.
2
.
k(
2
)

Physically

separate

communications

paths,

or

7
.
B
.
2
.
k(
3
)

Logically

separated

communications

paths

based

upon

either

7
.
B
.
2
.
k(
3
)(a)

NSA
-
approved

encryption
;

or

7
.
B
.
2
.
k(
3
)(b)

NSA
-
approved

encryption

and

Designated

Approval

Authority

-
approved

privacy

encryption

to

provide

privacy

of

the

remote

administration

session
.

7
.
B
.
2
.
k(
4
)

Direct

user

access

to

the

Controlled

Interface

shall

require

strong

authentication
.

7
.
B
.
2
.
k(
5
)


ISSO,

or

ISSM

have

the

obligation

to

ensure

that

the

Information

Systems

comprising

the

interconnected

Information

System

provide

the

required

security

functionality
.

7
.
B
.
2
.
k(
6
)


The

introduction

of

a

Controlled

Interface

does

not

impact

the

determination

of

the

Protection

Level

or

Levels
-
of
-
Concern

of

the

Information

Systems

comprising

the

interconnected

Information

System
.

Remote Management Experience (1 of 2)

Enhanced Management System Evolved from Experience


Captures, records data as received, and acts in accordance


with policy rules (drop, pass, guise and pass)


Allows selection and examination of individual data units as test or
training scenario is progressing without interrupting data flow

Preparation for Cross Domain Events


Attention to data flow statistical assessments evolved from having to set
up tools and test machines to a reduced amount of set up and event
preparation with DCDSv3

Cross Domain Event Execution


Requires more set up preparation time than single domain events


Enhanced audit functions of DCDSv3 add stronger real


time and post event security assurance






10

Remote Management Experience (2 of 2)

Cross Domain Event Completion


DCDSv3 Controlled Interface statistics comparison determines if a
potential data spill is a concern without the need for external data
recorders and log file retrievals

Remote System Administration and Maintenance


Facilitates administration and maintenance of deployed DCDS
components and software


Accommodates privileged user access from the local Management
System


Enables remote component and software updates with Role Based
Access Controls implemented on remote computers saving time and
travel to the Mission Training Centers


11

Future Considerations

With flexible rules management and current strength of its security
systems, DCDSv3 is robust enough to meet new requirements near
term with relative ease

Persistent approvals to operate and remote management of DCDS are
key discriminators for future warfighter simulation training across
different security domains

As the DMO network grows, assessment of the security posture of
remote management solutions becomes more even more important

Global Infrastructure enterprise focus on cross domain solutions
recognizes centralized management as a goal

New technologies and approaches will evolve from cross domain
solution enterprise research and development initiatives to help
address emergent DMO Network needs


12

Contact Information

Bonnie Page Danner, CISSP

bonnie.danner@ngc.com

321
-
235
-
3818

13