Breadcrumb
- Home
- Capabilities
- Technologies
- Security
- Data-At-Rest (DAR) Encryption
- NSA CSfC and Common Criteria
What is the NSA CSfC?
Commercial Solutions for Classified (CSfC) is an important part of NSA’s commercial cybersecurity strategy to deliver secure solutions that leverage commercial technologies and products to deliver cybersecurity solutions quickly. The CSfC program is founded on the principle that properly configured, layered solutions can provide adequate protection of classified data in various applications. NSA has developed, approved, and published solution-level specifications called Capability Packages (CPs) and works with technical communities from across industry, governments, and academia to develop and publish product-level requirements in U.S. Government Protection Profiles (PPs).
Curtiss-Wright offers CSfC solutions in both the data-at-rest (DAR) and data-in-transit (DIT) CSfC categories. These solutions reflect Curtiss-Wright’s knowledge, experience and commitment to the CSfC Program. Information sharing and data storage is critical to ensure mission success. Curtiss-Wright is committed to provide CSfC solutions that are trusted and proven.
The Benefits of the NSA's CSfC Program
The CSfC program enables organizations to transmit classified information using commercial-grade encryption solutions (when appropriately tested, certified and configured), eliminating the need for expensive, difficult-to-use classified equipment.
Providing such benefits as:
- Enabling entirely new classes of wireless access to classified networks for warfighting
- Enabling U.S. coalition partners to access classified information without taking possession of controlled cryptographic items (CCI)
- Significantly reduces equipment costs and simplifies key management
- Simplifies equipment handling/security procedures
The NSA now allows classified information to be transmitted on wired and wireless connections, even over public and partner networks by using two sets of encryption technologies (such as Cisco and Aruba VPNs), one layered inside the other. The NSA has also approved combinations of solutions that include a layer of VPN combined with encryption provided by Wi-Fi, TLS or MACsec, following specific guidelines.
What is Common Criteria?
Common Criteria is a standard administered by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC). It serves as a framework that allows products to be evaluated against a defined Security Target (ST) and Security Functional Requirements (SFR). Normally, products will pull much of their ST from an already defined Protection Profile (PP) for a given set of products. Products are then evaluated against their defined ST and SFR at an independent lab.
CSfC Solutions
PacStar Secure, Modular, Agile, Rugged, & Tactical (SMART) Gateway
The PacStar SMART Gateway is a small form factor, modular communications package that enables wireless access and services for mobile devices including COTS smartphones and laptops for classified and unclassified networks in tactical and expeditionary environments.
PacStar Secure, Modular, Agile, Rugged, & Tactical (SMART) Gateway
The PacStar SMART Gateway is a small form factor, modular communications package that enables wireless access and services for mobile devices including COTS smartphones and laptops for classified and unclassified networks in tactical and expeditionary environments.
PacStar Secure Wireless Command Post (SWCP) TLS
The PacStar Secure Wireless Command Post (SWCP TLS) is a fully integrated, expeditionary solution that provides warfighters with the groundbreaking ability to transmit classified information over wireless networks in the field using LTE-enabled commercial smartphones and tablets.
PacStar Secure Wireless Command Post (SWCP) TLS
The PacStar Secure Wireless Command Post (SWCP TLS) is a fully integrated, expeditionary solution that provides warfighters with the groundbreaking ability to transmit classified information over wireless networks in the field using LTE-enabled commercial smartphones and tablets.
HSR10
The High-Speed Recorder 10 is a high-performance network attached storage (NAS) device with two 10 GbE ports, NVMe-based storage technology, and two encryption layers for high-speed data throughput and security.
HSR10
The High-Speed Recorder 10 is a high-performance network attached storage (NAS) device with two 10 GbE ports, NVMe-based storage technology, and two encryption layers for high-speed data throughput and security.
DTS1+
The DTS1+ NAS solution stores and protects mission-critical DAR during missions and transport with two layers of CSfC full disk encryption in a single, compact, ready-to-deploy device.
DTS1+
The DTS1+ NAS solution stores and protects mission-critical DAR during missions and transport with two layers of CSfC full disk encryption in a single, compact, ready-to-deploy device.
Explore the DAR Technologies
DAR Series Part 1: Data Threats and Protection
Explore strategies for protecting classified data through encryption and considerations for choosing a data-at-rest encryption approach.
DAR Series Part 1: Data Threats and Protection
Explore strategies for protecting classified data through encryption and considerations for choosing a data-at-rest encryption approach.
DAR Series Part 2: Commercial Solutions for Classified (CSfC)
Learn about the innovative NSA CSfC program leveraging commercial encryption technologies in a layered approach for agile and cost-effective classified data protection.
DAR Series Part 2: Commercial Solutions for Classified (CSfC)
Learn about the innovative NSA CSfC program leveraging commercial encryption technologies in a layered approach for agile and cost-effective classified data protection.
DAR Series Part 3: NSA High Assurance Type 1 Encryption
Gain valuable insights into NSA High Assurance Type 1 encryption including device consideration factors, encryption algorithms, and certification processes.
DAR Series Part 3: NSA High Assurance Type 1 Encryption
Gain valuable insights into NSA High Assurance Type 1 encryption including device consideration factors, encryption algorithms, and certification processes.
DAR Series Part 4: NSA CSfC vs. High Assurance Type 1 Encryption
Compare NSA High Assurance Type 1 and CSfC encryption approaches across over a dozen factors, including procurement, risk, technology adoption, and exportability.
DAR Series Part 4: NSA CSfC vs. High Assurance Type 1 Encryption
Compare NSA High Assurance Type 1 and CSfC encryption approaches across over a dozen factors, including procurement, risk, technology adoption, and exportability.
CSfC Series: Inner vs. Outer Layer
This white paper explores the Commercial Solutions for Classified (CSfC) program, data at rest encryption, terminology, and the inner vs. outer layer of protection.
CSfC Series: Inner vs. Outer Layer
This white paper explores the Commercial Solutions for Classified (CSfC) program, data at rest encryption, terminology, and the inner vs. outer layer of protection.
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption
The goal of post-quantum cryptography is to develop cryptographic systems that are secure and can interoperate with existing communications protocols and networks.
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption
The goal of post-quantum cryptography is to develop cryptographic systems that are secure and can interoperate with existing communications protocols and networks.
Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions
Review the challenges for deploying QR encryption and how to implement DAR and data-in-transit QR encryption solutions using commercial FPGA devices and off-the-shelf hardware.
Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions
Review the challenges for deploying QR encryption and how to implement DAR and data-in-transit QR encryption solutions using commercial FPGA devices and off-the-shelf hardware.
What's New in CSfC Data-at-Rest Capability Package 5.0
This paper provides a review of the most recent changes from CP 4.0 to 5.0 with special emphasis on Unattended Operation Use Case and a HH solution.
What's New in CSfC Data-at-Rest Capability Package 5.0
This paper provides a review of the most recent changes from CP 4.0 to 5.0 with special emphasis on Unattended Operation Use Case and a HH solution.
Airborne Applications & Protecting Data-at-Rest
Protecting top-secret data on network attached storage with National Security Agency (NSA) approved encryption for military aircraft.
Airborne Applications & Protecting Data-at-Rest
Protecting top-secret data on network attached storage with National Security Agency (NSA) approved encryption for military aircraft.
Seaborne Applications & Protecting Data-at-Rest
Find out how seaborne applications like UUVs, USVs, and submarines store and protect top-secret data-at-rest with a network-attached storage device.
Seaborne Applications & Protecting Data-at-Rest
Find out how seaborne applications like UUVs, USVs, and submarines store and protect top-secret data-at-rest with a network-attached storage device.
Certification Authorities for Trusted Computing in Military and Avionics Products
This white paper provides an overview of certification authorities involved in Trusted Computing, explores which disciplines they oversee, and gives guidance on when to get these certification authorities involved.
Certification Authorities for Trusted Computing in Military and Avionics Products
This white paper provides an overview of certification authorities involved in Trusted Computing, explores which disciplines they oversee, and gives guidance on when to get these certification authorities involved.
Choosing the Best Location for Your Data-At-Rest Encryption Technology
The choice of encryption location can determine how difficult it is for adversaries to decrypt sensitive data and use it to their advantage.
Choosing the Best Location for Your Data-At-Rest Encryption Technology
The choice of encryption location can determine how difficult it is for adversaries to decrypt sensitive data and use it to their advantage.
Review DAR Encryption Approaches
Endorsed by the NSA for securing classified and sensitive U.S. Government information when appropriately keyed.
An internationally recognized security certification standard for commercial cryptography.
See DAR Technologies in Action
Maximizing Mission Duration and Data Security for UUVs
A system developer sought to equip a new generation of UUVs with a compact, efficient data storage solution capable of supporting extended missions, high-performance throughput, and data protection – all within the constraints of the underwater environment. Learn about the challenges, solution, and results.
Maximizing Mission Duration and Data Security for UUVs
A system developer sought to equip a new generation of UUVs with a compact, efficient data storage solution capable of supporting extended missions, high-performance throughput, and data protection – all within the constraints of the underwater environment. Learn about the challenges, solution, and results.
Deploying Secure and Efficient NAS Solutions for a UAV
To accelerate program development with no NRE investment and enable rapid integration, a UAV developer required a ready-to-deploy network attached storage system with reliable, redundant Ethernet network interfaces and expandable storage capacity with security.
Deploying Secure and Efficient NAS Solutions for a UAV
To accelerate program development with no NRE investment and enable rapid integration, a UAV developer required a ready-to-deploy network attached storage system with reliable, redundant Ethernet network interfaces and expandable storage capacity with security.
Modernizing an ISR Mission with Secure 10 GbE Data Storage
An aerospace company sought a network attached storage (NAS) device that was fast enough for new high-fidelity sensors that could store the vast amounts of data produced, could protect the classified data, and facilitate capacity expansion in the future.
Modernizing an ISR Mission with Secure 10 GbE Data Storage
An aerospace company sought a network attached storage (NAS) device that was fast enough for new high-fidelity sensors that could store the vast amounts of data produced, could protect the classified data, and facilitate capacity expansion in the future.
Unmanned Surface Vehicle Requires Encrypted Storage for the Autonomy System
Tasked with building a new Unmanned Surface Vehicle (USV), a shipbuilder faced challenging requirements.
Unmanned Surface Vehicle Requires Encrypted Storage for the Autonomy System
Tasked with building a new Unmanned Surface Vehicle (USV), a shipbuilder faced challenging requirements.
Aggressor Fighter Squadron Needs Secure Removable Storage Solutions
Tasked by the U.S. Air Force with updating their Aggressor fighter squadron, an aerospace company sought a small data network attached storage (NAS) device for a new batch of refurbished fighter jets.
Aggressor Fighter Squadron Needs Secure Removable Storage Solutions
Tasked by the U.S. Air Force with updating their Aggressor fighter squadron, an aerospace company sought a small data network attached storage (NAS) device for a new batch of refurbished fighter jets.
COTS Data-at-Rest Encryption Onboard an Unmanned Underwater Vehicle (UUV)
Curtiss-Wright develops network-attached storage (NAS) devices for an unmanned underwater vehicle (UUV).
COTS Data-at-Rest Encryption Onboard an Unmanned Underwater Vehicle (UUV)
Curtiss-Wright develops network-attached storage (NAS) devices for an unmanned underwater vehicle (UUV).
Next-Generation Aircraft Protection Requires ITAR-Free Data Storage
Tasked with developing a flexible, modular aircraft protection system, an aerospace company sought a small data network attached storage (NAS) device that could be used on current and future programs.
Next-Generation Aircraft Protection Requires ITAR-Free Data Storage
Tasked with developing a flexible, modular aircraft protection system, an aerospace company sought a small data network attached storage (NAS) device that could be used on current and future programs.
Unmanned Surface Vehicle Requires NetBoot and Commercial Encryption
Tasked with building a new Unmanned Surface Vehicle (USV), a shipbuilder faced challenging requirements. The developer planned to connect all the computer systems via a one gigabit Ethernet (1 GbE) network.
Unmanned Surface Vehicle Requires NetBoot and Commercial Encryption
Tasked with building a new Unmanned Surface Vehicle (USV), a shipbuilder faced challenging requirements. The developer planned to connect all the computer systems via a one gigabit Ethernet (1 GbE) network.
Aircraft Developer Looks to Modernize Storage of Sensitive Data
A leading C5ISR system integrator reached out to Curtiss-Wright in search of network-attached storage (NAS) server that would bring their aging fleet up-to-date.
Aircraft Developer Looks to Modernize Storage of Sensitive Data
A leading C5ISR system integrator reached out to Curtiss-Wright in search of network-attached storage (NAS) server that would bring their aging fleet up-to-date.
Airplane Developer Looks to Protect ISR Data with Encryption
While developing a new intelligence, surveillance, and reconnaissance (ISR) system, a large aerospace developer approached Curtiss-Wright for commercial off-the-shelf (COTS) equipment that had to fit into a space-constrained, propeller-driven aircraft.
Airplane Developer Looks to Protect ISR Data with Encryption
While developing a new intelligence, surveillance, and reconnaissance (ISR) system, a large aerospace developer approached Curtiss-Wright for commercial off-the-shelf (COTS) equipment that had to fit into a space-constrained, propeller-driven aircraft.
Unmanned Underwater Vehicle NAS Protects Terabytes of Top Secret Mission Data
In search of a small form factor network attached storage (NAS) solution for a new UUV, an engineer at a defense contractor reached out to Curtiss-Wright. The UUV required a high storage capacity solution to store critical mission data on long-range missions.
Unmanned Underwater Vehicle NAS Protects Terabytes of Top Secret Mission Data
In search of a small form factor network attached storage (NAS) solution for a new UUV, an engineer at a defense contractor reached out to Curtiss-Wright. The UUV required a high storage capacity solution to store critical mission data on long-range missions.
Rugged, Encrypted Data Storage for an ISR Pod
A customer sought a secure data storage solution that could maintain reliability under extreme temperatures and vibration, and be available off the shelf.
Rugged, Encrypted Data Storage for an ISR Pod
A customer sought a secure data storage solution that could maintain reliability under extreme temperatures and vibration, and be available off the shelf.
Protecting Data-at-Rest with NSA CSfC Approved Encryption on a UAV
A large integrator faced the challenge of protecting Top Secret DAR on a UAV and approached Curtiss-Wright for a solution.
Protecting Data-at-Rest with NSA CSfC Approved Encryption on a UAV
A large integrator faced the challenge of protecting Top Secret DAR on a UAV and approached Curtiss-Wright for a solution.