Securing External Data Connections¶
Securing data exchange is essential for applications deploying in both Commercial and DoD Impact Level (IL) environments. Every External Data Connection (EDC) must be carefully planned, documented, and reviewed to ensure compliance with DoD security standards.
This guide outlines the requirements and security practices for safely establishing EDCs in the Game Warden platform.
Why securing EDCs matters¶
Improperly configured external connections can lead to data spills, unauthorized access, and CtF delays. For example:
- An IL4 application cannot send Controlled Unclassified Information (CUI) to an IL2 system or public internet endpoint.
- All data moving over external connections must be encrypted using FIPS-compliant standards.
- Game Warden must verify that connections don’t bypass IL segmentation rules.
Key security requirements¶
- Data Flow Documentation – Diagrams and written descriptions of all inbound, outbound, and bidirectional data flows.
- Encryption In Transit – All data must be protected with TLS 1.2+ (e.g., mTLS).
- Encryption At Rest – External systems must use FIPS 140-2 validated encryption modules or equivalent.
- Impact Level Segmentation – Data must remain within its assigned IL unless explicitly approved.
Security guidelines for Impact Levels¶
Impact Level | Requirement |
---|---|
IL2 – Public or Non-Critical Mission Data |
|
IL4 – Controlled Unclassified Information (CUI) |
|
IL5 – Higher Sensitivity CUI / Mission-Critical |
|
IL6 – Classified Systems |
|
Commercial connection rules¶
Commercial data connections entering a DoD Impact Level (IL) environment must follow a strict ingress-only policy—this includes IL2 environments. Outbound or bidirectional communication is not allowed unless explicitly approved through the EDC request process.
Following these security requirements—and taking a proactive approach to risk management—helps teams maintain secure data flows, protect critical systems, and ensure mission continuity. A documented incident response plan is also essential for addressing potential security events swiftly and effectively.
EDCs checklist¶
If your application includes any EDCs, you must submit an EDC request package to Second Front for review and approval. Use the checklist below to validate your setup before assembling the required artifacts for your submission.
Category | Checklist Items |
---|---|
Impact Level Segmentation |
|
Data Protection |
|
Connection Documentation |
|
IL-Specific Requirements |
|
CTI Containment |
|
Data Traversal Between ILs |
|
Commercial-to-DoD Connections |
|
Security Posture |
|
Required artifacts¶
Include the following with your EDC request:
- List of all IPs, ports, and protocols
- Direction of data flow for each connection
- Description of transmitted data types
- Diagram showing data flow and boundary crossings, similar to the already existing Authorization Boundary Diagram provided as part of the System Security Plan (SSP)
- Justification and purpose for each connection
Need help?¶
For questions or to submit your request package, contact your implementation engineer or supportce@secondfront.com.