Securing External Data Connections¶
This article serves as a guide outlining the criteria and processes for securing External Data Connections (EDCs) on the Game Warden platform.
Each team and individual plays a vital role in supporting customer applications and upholding the Department of Defense's (DoD) commitment to safeguarding systems and information. The stringent security protocols established by Game Warden across various Impact Levels (ILs) are a testament to this commitment, ensuring the confidentiality, integrity, and availability of data transmitted over external connections. This guide provides the necessary direction and best practices for application teams to adhere to when requesting EDCs on the Game Warden platform.
Requirements¶
The below are the requirements that must be met to support use cases for External Data Connections for your applications.
Thorough Connection Documentation¶
-
Visual Representation: A detailed network diagram illustrating all external connections, including source and destination systems, data flow directionality, and specific ports and protocols used for communication. (See Authorization Boundary Diagrams for more information)
-
Data Flow Descriptions: Comprehensive documentation describing the types of data transmitted/received for each connection, including the purpose and justification for each connection.
-
Robust Data Protection:
- Impact Level Segmentation: This principle is of utmost importance as it ensures that data flows are strictly isolated within their respective Impact Levels (ILs). Applications and data stores residing on a specific IL must only communicate with resources within the same IL. This strict isolation is a key measure to prevent data spills of sensitive information from leaking to a less trusted domain.
- Encryption in Transit: Data in motion across external connections must be protected with strong encryption protocols like mTLS 1.2 or higher.
- Encryption at Rest: Data stored on external systems, even within the same IL, must be encrypted at rest using FIPS 140-2 validated encryption modules or their equivalent.
Impact Level-Specific Security Measures | |
---|---|
DoD Impact Level 2 (IL2) |
|
DoD Impact Level 4 (IL4) |
|
DoD Impact Level 5 (IL5) |
|
DoD Impact Level 6 (IL6) |
|
Commercial Data Connections¶
Commercial data connections that traverse into a DoD IL environment must adhere to a strict "ingress only" policy, which also applies to IL2 connections.
Bi-directional communications must be explicitly authorized via the external data connection request process (see below).
By adhering to these comprehensive security guidelines and adopting a proactive approach to risk management, application teams can establish and maintain secure external data connections that safeguard sensitive information, protect critical systems, and ensure the continuity of mission-critical operations. A well-defined incident response plan is a crucial part of this proactive approach, ensuring that we are prepared to handle any security incidents effectively.
External Data Connection Request Checklist¶
- IL Segmentation:
- Have you confirmed that all data flows are strictly isolated within their respective ILs?
- Do applications and data stores on a specific IL only communicate with resources within the same IL?
- Data Protection:
- Is data in motion across external connections protected with mTLS 1.2 or higher?
- Is data at rest on external systems encrypted using FIPS 140-2 validated encryption modules or equivalent?
- Connection Documentation:
- Have you provided a detailed network diagram illustrating all external connections, including source/destination systems, data flow directionality, and ports/protocols?
- Have you provided comprehensive documentation describing the types of data transmitted/received for each connection, including purpose and justification?
- CTI Containment:
- Have you ensured that no Controlled Technical Information (CTI) is transmitted outside the DoD environment?
- Data Traversal:
- If data traversal between ILs is required, has a formal security review and approval process been approved?
- IL-Specific Measures:
- For IL2 systems, are external connections limited to essential public-facing services with robust authentication and authorization?
- For IL4 systems handling CUI, has a Mission Owner Attestation been signed (if applicable)?
- Have you verified that your IL4 systems don't process NSS CUI?
- For IL5 systems, are access controls, encryption, and comprehensive logging implemented to protect sensitive DoD data?
- For IL6 systems, are the strongest encryption protocols, stringent access controls, and continuous monitoring in place?
- Commercial Data Connections:
- Do commercial data connections adhere to a strict "ingress only" policy?
- Security Posture:
- Are regular vulnerability scans conducted on systems with external connections? This will need to be done with detailed information describing how this is being accomplished on the system/systems they want to be connected to.
- Are Intrusion Detection/Prevention Systems (IDS/IPS) implemented for real-time monitoring and analysis?
- Is the principle of least privilege enforced for systems and users?
- Is continuous monitoring of all external connections in place?
- Is there a well-defined incident response plan in place?
Required Artifacts for EDC Request Package¶
- List of Ports and Protocols: A complete list of all IP addresses, ports, and protocols used for each external connection.
- Directionality of Data: Specify whether each connection is ingress or egress only or bi-directional.
- Type of Data: Provide a specific description of the types of data transmitted/received for each connection.
- Detailed Description of EDCs: A comprehensive list of all requested EDCs with a detailed description of each and its intended use within the application.
- Data Flow Architecture Diagram: A visual representation illustrating all requested EDCs traversing the authorization boundary.
- Provide a diagram similar to the already existing authorization boundary diagram provided as part of the System Security Plan (SSP).