SWIPSY

SWIPSY was a firewall toolkit produced by the Defence Evaluation and Research Agency in the UK[1] (later QinetiQ). The SWIPSY toolkit was an ITSEC E3 (equivalent to Common Criteria EAL4) evaluated product[2] that allowed additional code to be added to its security ‘compartments’ without affecting the evaluation status of the toolkit itself.

SWIPSY had security properties that assured network and process separation. In particular processes communicating with one network could not communicate directly with the other network other than by ‘trusted mover agents’ that in turn force data to be passed to the format and content checkers. SWIPSY ran on a Trusted Solaris 8 platform, utilising its Mandatory Access Controls to enforce separation between compartments.

SWIPSY, which stood for SWitch IP SecurelY, was used to build an SNMP firewall system[3] called MIDASS.[4]

SWIPSY technology was licensed by Clearswift for use in its Deep-Secure line of guard products .

SWIPSY was used as the basis for a guard for the Citrix ICA protocol by QinetiQ.[5]

References

  1. Dean, Tim; Wyatt, Graham (April 2004). Information Exchange between Resilient and High-Threat Networks: Techniques for Threat Mitigation. RTO IST Symposium on “Adaptive Defence in Unclassified Networks”. Toulouse, France,.
  2. "SWIPSY Firewall Platform Security Target" (PDF). August 2000.
  3. "Management In DomAin-based Secure Systems (MIDASS) (United Kingdom), Encryption and security".
  4. "MIDASS: Management in Domain Based Secure Systems" (PDF).
  5. "SyBard ICA Guard" (PDF).
This article is issued from Wikipedia - version of the Sunday, October 05, 2014. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.