The rapid pace of digitalization and growing cyber threats demand IT solutions that not only meet the highest security standards but are also flexible and user-friendly. This is especially critical for government agencies and armed forces, who work daily with classified information in accordance with the Classified Information Directive (VSA) and require a high level of sovereignty.
Daily Cyber Attacks on Corporate and Government Networks
The German Federal Office for Information Security (BSI) records 250,000 new malware variants every day. In the federal administration alone, an average of 775 emails containing malicious software are received daily. The BSI blocks access to 370 websites from government networks every day. Cyber espionage has become a daily occurrence. Here are some examples from recent years:
A tailored cloud infrastructure and a secure working environment designed to meet the demands of government agencies, militaries, and regulated industries – delivering maximum data sovereignty and protection up to the classification level of SECRET.
Every cloud requires a hypervisor for virtualisation and resource orchestration. In contrast to conventional clouds, the NSC relies on a modular, microkernel-based hypervisor. The Trusted Computing Base (TCB) – comprising the software and hardware that must be trusted – differs significantly between the NSC and traditional clouds. Conventional clouds rely on monolithic hypervisors with millions of lines of code, whereas the TCB of the NSC’s L4Re Hypervisor consists of only around 30,000 lines of code. This much smaller code base enables complete evaluation
and verifiability, while reducing vulnerabilities and susceptibility to errors.
The NSC is able to run multiple isolated networks or domains for different security levels on a single hardware platform, securely separating them using the L4Re Secure Separation Kernel. This has been approved by the BSI for classification levels up to SECRET.
Structured data can be exchanged between security domains via SDoT Security Gateways. These gateways verify data based on predefined rules. Unstructured data – such as Word, Excel or other files – must be labelled using an SDoT before leaving the security domain. E-mails can also be exchanged securely in this way. These IT security products are approved by the BSI up to the classification level SECRET.
Comprehensive security solutions are provided, including a BSI-approved hardware security module for all cryptographic requirements. Client-side protection is also available through hard disk encryption and "File and Folder" encryption, meeting standards up to RESTRICTED.
The VS-Workstation incorporates the core features of a digitally sovereign workplace designed for government clouds
Advantages of a digitally sovereign workplace for public authorities
Please fill in the form and we will get in touch with you as soon as possible.