Tessera for Cross Domain
A bi-directional security gateway that mediates controlled information exchange between classification domains — enforcing dual security policies on every flow, with a Guard as the sole permitted crossing path.
Classified networks operate under security policies that define what information can be created, handled, and shared within each domain. Those policies reflect different classification ceilings, different coalition memberships, and different need-to-know requirements.
Yet operators and systems in different domains regularly need to exchange information — tasking orders, intelligence reports, situation reports. When that information crosses a domain boundary, both security policies must be satisfied simultaneously: the originating domain's policy must confirm the label is valid, and the destination domain's policy must confirm the information is releasable to that domain.
Human-enforced transfer processes are slow, error-prone, and do not scale. Manual review cannot keep pace with operational information flows, and a single oversight can expose classified material to an unauthorised domain.
Five principles that define the security posture of Tessera for Cross Domain.
Every information flow is evaluated against both domain SPIFs in a single atomic decision. The originating SPIF confirms the label is valid and properly formed; the destination SPIF confirms the information is releasable to that domain and within its ceiling. Both must agree.
No network path exists between the High-Side and Low-Side zones except through the Guard. There is no connection that spans both zones. Every packet crossing the domain boundary transits the Guard's forward chain — there is no bypass and no exception.
Any error at any stage — SPIF loading failure, label parsing error, scanner failure, CDR failure — results in a DENY. There is no pass-through state, no "allow on timeout", and no ambiguous outcome. The Guard will not forward content it cannot fully evaluate.
The STANAG 4778 Binding-Data CMS SignedData in the payload is applied before the Guard Input Format (GIF) is constructed and is preserved unchanged through the pipeline. The destination proxy delivers the Guard-approved payload without modification — no rebinding or re-wrapping occurs.
Every Guard decision — ALLOW and DENY — is recorded with the flow direction, source and destination identity, confidentiality label, label derivation method, filter results, and timestamp. Audit records are immutable and stored in the Guard zone, isolated from both HS and LS management networks.
Each zone firewall has three interfaces — external (user networks), internal (zone services), and guard zone — mirroring the physical appliance topology. All inter-segment traffic transits the firewall's forward chain. The software topology is designed for direct replacement by physical hardware appliances.
High-to-Low (HS→LS) and Low-to-High (LS→HS) flows follow distinct pipelines. Each stage is a policy enforcement point; failure at any stage blocks the flow.
Six logical network segments: HS External, HS Internal, HS Guard Zone, LS Guard Zone, LS Internal, and LS External. Each firewall spans three segments with a default-deny forward chain. No network connection spans zone boundaries.
30+ services across DNS, NTP, PKI, email proxy, CDR, malware scanning, monitoring, and management — each independently deployable and health-checked. All inter-service communication is zone-local, consistent with the physical appliance topology the deployment models.
The zone firewalls and Guard mirror the physical three-legged appliance topology. Firewall rulesets for physical appliances are included; rules are exportable from the management UI for import into hardware.
XML Confidentiality Label format; classification and category encoding evaluated against domain SPIFs for every flow.
CMS SignedData validation (HS→LS) and generation (LS→HS); ADatP-4778.2 binding profiles for OOXML, XMP, and sidecar.
ABAC policy enforcement referencing ACP-240 attribute URI conventions for classification and category assertions in GIF flows.
Full SPIF parsing for both domain policies; dual-SPIF evaluation for every crossing decision.
Cryptographic Message Syntax for STANAG 4778 Binding Information Object signing and verification.
RFC-compliant Non-Delivery Reports (NDR) generated on DENY, informing the originating sender of the rejection reason.
Standards implemented in Tessera for Cross Domain
STANAG 4774 STANAG 4778 ACP-240 ADatP-5636 XMLSPIF v2.1/v3.0 RFC 5652 CMS RFC 3464 NDR