Secure Ad-Hoc File Exchange Pattern
Email Transport Layer Security (TLS) Pattern depicting key controls, particularly for companies with many business partners
Click on controls in the diagram to view details. Download SVG
When to Use
The discussed pattern matches best if the following indicators can be found:
- Business driven: business decides ad-hoc when and where the solution is required/used
- Simplified user interface, allows also staff members with low IT affinity to use the solution
- Low integration costs
- Identity federation with partner is not established
- Business unit is data owner, IT does not act as data owner custodian, business unit staff members can decide who needs access, when and where
- Audit trail needs to be available
- Strong authentication for example with second authentication factor (after uid/pw) that is transmitted over SMS is likely to be required for sensitive data.
When NOT to Use
Strong integration into document management workflow requires a single repository for internal and external collaboration. Real-time collaboration requirements would suggest a solution that includes collaborative editing and in-band update notification.
Assumptions
As it has to be assumed that the data that is shared can be classified as confidential, strong encryption is required by most corporate security policies. Data on the move as well as data at rest should therefore be encrypted, and access control policies probably declare the “Need to know principal”. In an ad-hoc scenario it is unlikely that digital rights management solutions (with water marking, and copy prevention) would be required. However integrity assurance on a technical level (for example with hash-value comparison before and after transmission) can be added.
Mapped Controls (25)
- AC-02 Account Management
- AC-07 Unsuccessful Login Attempts
- AC-10 Concurrent Session Control
- AC-12 Session Termination
- AC-20 Use of External Information Systems
- AT-02 Security Awareness
- AT-03 Security Training
- AT-05 Contacts With Security Groups And..
- AU-04 Auditable Events
- AU-06 Audit Monitoring, Analysis, And Reporting
- CA-02 Security Assessments
- CA-03 Information System Connections
- CM-03 Configuration Change Control
- CP-02 Contingency Plan
- CP-09 Information System Backup
- IA-04 Identifier Management
- IR-04 Incident Handling
- IR-07 Incident Response Assistance
- MA-02 Controlled Maintenance
- MA-06 Timley Maintenance
- RA-03 Risk Assessment
- RA-05 Vulnerability Scanning
- SC-07 Boundary Protection
- SC-09 Transmission Confidentiality
- SC-13 Use Of Cryptography