Cord3 Technology Offerings

Cord3 Unity DCS is implemented in the form of enforcement points that exert policy-based security control over data as it moves through the organization networks over standard network and data protocols.

In-line enforcement points intercept data in transit, evaluate user and data attributes, and enforce access and protection policies in real time. This ensures that only authorized users can access protected data—without requiring changes to applications or workflows.

Enforcement is applied consistently across different data types and communication channels, assessing user attributes such as classification level or nationality, to ensure users only have access to information for which they have been given the express policy right.

army (1)

Email Protection

The Cord3 Unity Email Enforcement Point inspects and applies security policy enforcement to emails, including the message body and attachments, prior to delivery. Access is controlled using security attributes such as classification, releasability, and caveats to ensure recipients are authorized to receive the content in the email. Each message is encrypted with a unique symmetric key. At the receiving end, the same policy validation is applied to the message to ensure that the recipient has the policy right to see the message and its contents. Only under conditions of a valid policy check will the original key be brought to the data to reconstruct the original message

File Protection

The Cord3 Unity File Enforcement Point protects files stored in shared environments such as Microsoft SharePoint, ensuring files are only visible and accessible to users whose attributes meet policy requirements. When files are shared via email, both file and email enforcement points are applied to ensure only authorized users can send and receive the content.
The stored files are encrypted at rest. The content is only disclosed to users who are authorized to access the content, based on the security attributes of both the user and the data asset.

XMPP Chat Protection

The Cord3 Unity Chat Enforcement Point secures chat rooms by restricting room access and conversations to authorized users based on security policy attributes. Message-level encryption ensures chat content remains protected from unauthorized access, including unauthorized privileged insider access.
Protected chat messages are individually encrypted with a unique key, allowing the message to only be decrypted by the enforcement point when it is retrieved by an authorized user.

Matrix Protection

The Cord3 Unity Matrix Enforcement Point secures real-time data streams through policy enforcement. Matrix is a powerful protocol that supports many defence-specific DCS use cases, including:
- Chat: Matrix-based chat applications, such as Element, are policy-enforced to restrict user access to encrypted messages.
- VTC: Video Teleconferencing (VTC) applications are policy-enforced to restrict participation based on the participants’ clearance level and nationality.
- COP: Access to Common Operating Picture (COP) data is policy-enforced to restrict access so users can only see data for which they are authorized. A COP being fed with real-time Link16 track data can be protected to control data access or presentation on a GIS viewer based on geospatial policy enforcement restrictions defining classification, releasability, presentation, or context.

Further enforcement points are under development for additional data feeds over Matrix – including Full Motion Video (FMV).