Security Solution
Cross-Domain Security Control
A Transmission Control System That Strengthens Inter-System Security
Cross-Domain Security Control
A next-generation security solution designed to strengthen transmission data control between defense systems with different security classifications, developed through the transfer of security control technologies from the National Security Research Institute.
Summary
CDE Protocol
Hardware Security Control Module
NSR Security Control Technology
Architecture Diagram
Key Features
POINT 01
Hardware-based Security Control Module
  • Generation and management of CDE-specific encryption keys
  • Data control based on national security standards
  • Physical intrusion protection applied
POINT 02
SUD(Sercure USB Device)
  • Issuance of CDE encryption keys via secure USB
  • Encryption key injection and synchronization with CDS devices via secure USB
POINT 03
CDE Protocol
  • Protocol developed with NSR-transferred technology
  • CDE-key-based packet transformation and integrity validation of transferred data
POINT 04
Encryption Key Protection
  • Tamper-resistant hardware erase button for key removal
  • Protection against physical intrusions such as server dismantling
POINT 05
Dedicated Adapter for Cross-Network Integration
  • Integration between systems with different security levels
  • Supports indirect-linkage cross-domain security architecture
POINT 06
Malware Inspection
  • Real-time malware scanning on transferred data
  • CC-certified commercial antivirus applied
  • Multi-antivirus support
Key Features & Advantages
NSR-developed CDS Security Control Technology
Adoption of NSR’s indirect linkage-based security control technology, essential for secure system-to-system integration
  • CDE protocol exclusively for CDS security devices
  • Hardware security token module for key generation and management
  • SGX-based CDE labeling security
Compliance with the Latest National Security Requirements V3.0
Meets NIS National Security Requirements V3.0 for cross-network information transfer systems
  • Use of certified cryptographic modules
  • Integrity validation of transferred data
  • Policy-based access and data control
  • Audit log management
Defense Compliance Alignment
Compliant with Defense Security Standards, Cybersecurity Directives, and Defense Information Transfer Security Guidelines
  • Indirect-linkage CDS security control architecture
  • Security-level verification and secure adapter integration
  • Full audit trail for data transmission and reception
High-speed Data Processing & Minimal Latency
High-speed and secure data transfer through CDS-controlled integration
  • Kernel- and NIC-level acceleration for high-speed transfer
  • Ensures confidentiality and integrity during transmission
  • Real-time transmission ensured through high-speed processing and minimal latency
Patents & Certifications
Inter-Network Data Transfer Solution Certifications
GS Certification (Grade 1)
Security Function Verification Certificate
Contact for Solution Inquiries
Sales & Consulting
Contact : +82-2-429-5602 / E-mail : sales@hanssak.co.kr