Skip to content

Securing External Data Connections

Securing data exchange is essential for applications deploying in both Commercial and DoD Impact Level (IL) environments. Every External Data Connection (EDC) must be carefully planned, documented, and reviewed to ensure compliance with DoD security standards.

This guide outlines the requirements and security practices for safely establishing EDCs in the Game Warden platform.


Why securing EDCs matters

Improperly configured external connections can lead to data spills, unauthorized access, and CtF delays. For example:

  • An IL4 application cannot send Controlled Unclassified Information (CUI) to an IL2 system or public internet endpoint.
  • All data moving over external connections must be encrypted using FIPS-compliant standards.
  • Game Warden must verify that connections don’t bypass IL segmentation rules.

Key security requirements

  • Data Flow Documentation – Diagrams and written descriptions of all inbound, outbound, and bidirectional data flows.
  • Encryption In Transit – All data must be protected with TLS 1.2+ (e.g., mTLS).
  • Encryption At Rest – External systems must use FIPS 140-2 validated encryption modules or equivalent.
  • Impact Level Segmentation – Data must remain within its assigned IL unless explicitly approved.

Security guidelines for Impact Levels

Impact Level Requirement
IL2 – Public or Non-Critical Mission Data
  • Enforce basic access controls and authentication
  • Use TLS 1.2+ encryption for all data in transit
  • Maintain activity logging and monitoring to detect misuse
  • Avoid exposing non-public DoD data despite lower sensitivity
IL4 – Controlled Unclassified Information (CUI)
  • Strictly enforce IL segmentation—CUI must remain within IL4 or higher
  • Do not process or store National Security System (NSS) CUI
  • Apply encryption at rest using FIPS 140-2 validated modules
  • Maintain role-based access control (RBAC) and audit logging
  • Mission Owner Attestation may be required before approving EDCs
IL5 – Higher Sensitivity CUI / Mission-Critical
  • Enforce least privilege for all users and services
  • Segment workloads to isolate sensitive functions
  • Apply continuous monitoring (e.g., IDS/IPS, SIEM)
  • Encrypt all external data at rest and in transit
  • Document and justify all boundary-crossing data flows
  • Cross-IL data movement requires formal security review
IL6 – Classified Systems
  • Continuous monitoring and active threat detection
  • Apply the strongest possible encryption for all data
  • Enforce restricted physical and logical access
  • Follow NSA/DoD-defined cross-domain control protocols
  • External connections must use approved cross-domain solutions and are rarely permitted

Commercial connection rules

Commercial data connections entering a DoD Impact Level (IL) environment must follow a strict ingress-only policy—this includes IL2 environments. Outbound or bidirectional communication is not allowed unless explicitly approved through the EDC request process.

Following these security requirements—and taking a proactive approach to risk management—helps teams maintain secure data flows, protect critical systems, and ensure mission continuity. A documented incident response plan is also essential for addressing potential security events swiftly and effectively.


EDCs checklist

If your application includes any EDCs, you must submit an EDC request package to Second Front for review and approval. Use the checklist below to validate your setup before assembling the required artifacts for your submission.

Category Checklist Items
Impact Level Segmentation
  • Are data flows confined to their respective ILs?
  • Do systems only communicate with others at the same IL?
Data Protection
  • Is data encrypted in transit (mTLS 1.2+)?
  • Is data encrypted at rest (FIPS 140-2 validated modules)?
Connection Documentation
  • Have you included a complete network diagram?
  • Have you described the data types, purpose, and justification for each connection?
IL-Specific Requirements
  • IL2: Are external connections limited to essential, public-facing services?
  • IL4: Has a Mission Owner Attestation been signed (if applicable)? No NSS CUI processed?
  • IL5: Are encryption, logging, and access controls in place?
  • IL6: Are strongest encryption and continuous monitoring in place?
CTI Containment
Data Traversal Between ILs
  • If data must traverse between different Impact Levels (ILs), has a formal security review and approval been completed?
Commercial-to-DoD Connections
  • Does your commercial connection follow the ingress-only rule (unless explicitly approved)?
Security Posture
  • Are vulnerability scans conducted regularly?
  • Are IDS/IPS systems in place?
  • Is the principle of least privilege enforced?
  • Is continuous monitoring active?
  • Is there an incident response plan?

Required artifacts

Include the following with your EDC request:

  • List of all IPs, ports, and protocols
  • Direction of data flow for each connection
  • Description of transmitted data types
  • Diagram showing data flow and boundary crossings, similar to the already existing Authorization Boundary Diagram provided as part of the System Security Plan (SSP)
  • Justification and purpose for each connection

Need help?

For questions or to submit your request package, contact your implementation engineer or supportce@secondfront.com.