Download supporting materials

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

IEEE 1355 wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
STK in a Multi-Level Security Environment
Nicholas Gavin
Accenture
Overview






Objectives
System Architecture
Accenture Multiple Level Access Solution
STK – AMLAS Client
Questions
Contact Information
2
Objectives
 Real-time and near-real-time data visualization
– Manage data feeds with different clearance levels
– Automated data scrubbers to pass data to low-side
 MLS Analysis in STK
– Create central MLS database for all analysis data
– Perform STK analysis at lowest possible clearance
level throughout project lifecycle
– Minimize time required on high-level security assets
– Minimize personnel clearance requirements
3
Architecture
STK in a Multi-Level Secure Environment
UNCLASS
Network
SECRET
Network
TOP SECRET
Network
STK
STK
STK
STK
STK
STK
STK-AMLAS
Interface
STK
STK
STK-AMLAS
Interface
STK
STK-AMLAS
Interface
Accenture Multiple Level Access Solution
(AMLAS)
Accenture Developed
Component
Accenture 2010©
Oracle,
SQL Server,
Etc.
NIPRNET
Data
Scrubber
Data
Scrubber
SIPRNET
JWICS
Nicholas Gavin
619-574-2335
[email protected]
4
AMLAS Overview
 Allow applications to access data at multiple classification
levels
 Applications need not be multilevel aware
– Application developers can focus on intended functionality without having
to become experts in cross domain computing
 Multiple data sources appear as a single multilevel database
– No data stored within AMLAS itself, data providers retain control
– Integrate legacy systems to provide cross domain data
 SOAP wrapper provides web-service wrapper for existing
applications
– Immediate integration into SOA
 Plug-in based architecture can use legacy applications as data
sources to provide standard SQL and/or Web Services access
 Cross domain certification can be limited to AMLAS and plugins
– Legacy single level systems can continue to operate on isolated single
level networks
– Drastically simplifies certification and accreditation
Multi-Level Security Capability Achieved Using Legacy Systems
5
AMLAS Capabilities
 Reach up to higher level data sources to retrieve data at,
and below, current request level
 Reach down to lower level data sources to include results
into high level requests
 Combine multiple data sources at disparate security
levels into a single data set
 JDBC Recordset and/or IC ISM compliant XML return
types
 Programs
– TENCAP Radiant Alloy
– CEST/CREST/AMLST
– Strong Angel
6
STK – AMLAS Client
 Seamless integration with STK
– All functions accessible from STK Plug-in GUI
 AMLAS client
– Format AMLAS data requests
– Save data to database
 XML Import and Export
– IC-ISM compliant XML for classification and control
– Geography Markup Language (GML) specification
– Sensor Markup Language (SensorML) specification
 Conversion to STK Objects
– Lightweight object capability for visualization of a large number of
objects at one time
– Heavyweight objects for analysis
7
Screenshot
8
Screenshot
9
 Questions?
10
Contact Information
Nicholas Gavin
Accenture
619-574-2335
[email protected]
11