Stop swiveling: Modernize security and info sharing with multilevel security

 

Connecting state and local government leaders

An MLS system, platform or environment allows information at different classifications to be stored and accessed within a single security domain, while dynamically enforcing different access policies and compartments.

Information is valuable. Some information is more valuable than others, especially in government and defense, which is why taxonomies are in place to classify and label it as classified, secret, top secret and so on. The ability to share sensitive information between different agencies and with coalition partners is the lifeblood of protecting national interests.

This is why when a network is breached, it's not the network hardware that's the concern, it’s the access to services and information stored or connected to the compromised network.

This is elementary stuff, but it’s important to bear it in mind. Following the release of the Executive Order for Zero Trust and the Cybersecurity and Infrastructure Security Agency’s Zero Trust Maturity Model in late 2021, agencies are investigating technologies to help them meet the new requirements for their network.

There is a danger here: Zero trust architecture has its blind spots too. Remember, it is the data that is most valuable, not the network. Without applying the same principles of zero trust to the data that exists on the network, even if the network is unbreachable, agencies are still open to the host of data breaches caused by insider threats -- those caused by employees and contractors with authorized access to those same systems, applications and data. Agencies must rethink how information access is structured, not just access to the networks and applications that hold the information.    

Many major corporations and public institutions have had their vulnerabilities exposed by whistleblowers, but insider threats don’t have to be perpetrated by deliberate, malicious actors. A negligent member of staff copying sensitive data into a public database is a far more common source, as happened with the leak of the identities of U.K. Special Forces members last year on What’s App.

The way these breaches are discussed publicly, there’s an almost implicit assumption that nothing can prevent malicious insider threats from happening, but this just isn’t true. There are good and bad ways to proactively address the problem of who has access to what information, when and what they can do with it. New security methodologies and technology can prevent, not just detect, data loss or misuse caused by human error and insiders with bad intentions.

Surprisingly, the information sharing methods currently used by many government agencies and contractors are not efficient at solving the access problem. Here, it is common to see air gaps mandated between each level of information. In practice, this means Top Secret data is only accessed on a completely different network to one that contains public information, and so on for every security level between these two points.

What this leads to is "swivel chair" security. Quite literally, someone sitting at one PC copies the information they need, then swiveling their chair over to another other PC to access a different database.

Most IT teams would see the inefficiencies at play here. Manually copying information over each time it is needed is practically inviting errors and data loss, plus it takes a long time to do. It also means agencies need multiple different desktops/computers, complete with air-gapped infrastructure behind them, firewalls and so on. This air-gapped network-driven philosophy creates huge costs and focuses on protecting these networks, rather than protecting the data stored within them.

Even with a practically unlimited tech or security budget, if this strategy were proposed to any private enterprise, I’m willing to bet the time and resource cost would be the toughest sell. So why do we tolerate it in the public domain?

We need a better, middle ground, and fortunately one already exists. Multilevel security is a really simple concept. An MLS capability (system, platform or environment) allows information at different classifications to be stored and accessed within a single security domain, while enforcing different access policies and compartments dynamically depending on context, with the assurance that the separation is effective.

Think of it as a giant repository of data that can be accessed at any time, but only if with the right credentials. Users with a Secret credential, won’t see any data tagged Top Secret or above.

Combining this with technologies like attribute-based access control, MLS becomes even more effective. Attributes are the characteristics or values of a component. With ABAC, the combination of different user, environmental and resource attributes is evaluated to allow or deny access to a file – affording more granular, contextual control over access and data protection.

Even if the highest echelons of a repository (e.g. Top Secret) must remain air-gapped, there is much information that falls below it. Information can quickly become very valuable as a situation emerges or can just as quickly lose its value if it is not shared on time with the right agencies.

These times of upheaval and rethinking in cybersecurity are rare in our industry. Thanks to Executive Order for Zero Trust, we’ve got the right idea; we just need to make sure we apply it thoroughly. MLS, combined with the dynamic capabilities of ABAC, can help agencies meet the extremely complex information sharing challenges they now face. There really has never been as steep a premium on efficiency as exists in today’s information-centric world. We need to build an information sharing system that can keep up.     

Kurt Mueffelmann is US President & Global COO, archTIS.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.