1 / 11

STK in a Multi-Level Security Environment

STK in a Multi-Level Security Environment. Nicholas Gavin Accenture. Overview. Objectives System Architecture Accenture Multiple Level Access Solution STK – AMLAS Client Questions Contact Information. Objectives. Real-time and near-real-time data visualization

jewell
Download Presentation

STK in a Multi-Level Security Environment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. STK in a Multi-Level Security Environment Nicholas Gavin Accenture

  2. Overview • Objectives • System Architecture • Accenture Multiple Level Access Solution • STK – AMLAS Client • Questions • Contact Information

  3. Objectives • Real-time and near-real-time data visualization • Manage data feeds with different clearance levels • Automated data scrubbers to pass data to low-side • MLS Analysis in STK • Create central MLS database for all analysis data • Perform STK analysis at lowest possible clearance level throughout project lifecycle • Minimize time required on high-level security assets • Minimize personnel clearance requirements

  4. Architecture

  5. AMLAS Overview • Allow applications to access data at multiple classification levels • Applications need not be multilevel aware • Application developers can focus on intended functionality without having to become experts in cross domain computing • Multiple data sources appear as a single multilevel database • No data stored within AMLAS itself, data providers retain control • Integrate legacy systems to provide cross domain data • SOAP wrapper provides web-service wrapper for existing applications • Immediate integration into SOA • Plug-in based architecture can use legacy applications as data sources to provide standard SQL and/or Web Services access • Cross domain certification can be limited to AMLAS and plug-ins • Legacy single level systems can continue to operate on isolated single level networks • Drastically simplifies certification and accreditation Multi-Level Security Capability Achieved Using Legacy Systems

  6. AMLAS Capabilities • Reach up to higher level data sources to retrieve data at, and below, current request level • Reach down to lower level data sources to include results into high level requests • Combine multiple data sources at disparate security levels into a single data set • JDBC Recordset and/or IC ISM compliant XML return types • Programs • TENCAP Radiant Alloy • CEST/CREST/AMLST • Strong Angel

  7. STK – AMLAS Client • Seamless integration with STK • All functions accessible from STK Plug-in GUI • AMLAS client • Format AMLAS data requests • Save data to database • XML Import and Export • IC-ISM compliant XML for classification and control • Geography Markup Language (GML) specification • Sensor Markup Language (SensorML) specification • Conversion to STK Objects • Lightweight object capability for visualization of a large number of objects at one time • Heavyweight objects for analysis

  8. Screenshot

  9. Screenshot

  10. Questions?

  11. Contact Information Nicholas Gavin Accenture 619-574-2335 nicholas.e.gavin@accenture.com

More Related