← Patterns / SP-019

Secure Ad-Hoc File Exchange Pattern

Email Transport Layer Security (TLS) Pattern depicting key controls, particularly for companies with many business partners

Release: 08.02 Authors: Tobias Christen Updated: 2025-07-05

Your browser does not support SVG. Download the diagram.

Click on controls in the diagram to view details. Download SVG

When to Use

The discussed pattern matches best if the following indicators can be found:

  • Business driven: business decides ad-hoc when and where the solution is required/used
  • Simplified user interface, allows also staff members with low IT affinity to use the solution
  • Low integration costs
  • Identity federation with partner is not established
  • Business unit is data owner, IT does not act as data owner custodian, business unit staff members can decide who needs access, when and where
  • Audit trail needs to be available
  • Strong authentication for example with second authentication factor (after uid/pw) that is transmitted over SMS is likely to be required for sensitive data.



When NOT to Use

Strong integration into document management workflow requires a single repository for internal and external collaboration. Real-time collaboration requirements would suggest a solution that includes collaborative editing and in-band update notification.

Assumptions

As it has to be assumed that the data that is shared can be classified as confidential, strong encryption is required by most corporate security policies. Data on the move as well as data at rest should therefore be encrypted, and access control policies probably declare the “Need to know principal”. In an ad-hoc scenario it is unlikely that digital rights management solutions (with water marking, and copy prevention) would be required. However integrity assurance on a technical level (for example with hash-value comparison before and after transmission) can be added.

Mapped Controls (25)

AC: 5AT: 3AU: 2CA: 2CM: 1CP: 2IA: 1IR: 2MA: 2RA: 2SC: 3