000007683 001__ 7683 000007683 005__ 20240531164756.0 000007683 02470 $$2doi$$a10.24868/issn.2515-818X.2020.042 000007683 035__ $$a4497831 000007683 037__ $$aGENERAL 000007683 245__ $$aTHALES Secure CMS: from a highly secure to the Trusted Information Exchange 000007683 269__ $$a2020-10-05 000007683 336__ $$aConference Proceedings 000007683 520__ $$aTHALES Netherlands Naval is recognized as a distinguished, high class system integrator who provides cybersecurity as an integral part of its complex systems, where the Tacticos naval CMS (Combat Management System) is just one example taken out of its large portfolio. Mastering Security requires a professionally managed, orchestrated evolution of all underlying cybersecurity technologies. Latest when it comes to secure and even trusted computing on THALES systems, the presented results contribute to THALES&rsquo; discriminator solutions that excel not only in the naval CMS realm. THALES Research and Technology directorate manages the stepwise, well-considered application of emerging cybersecurity technologies, leading to high technology systems that navies worldwide can trust upon, both<br> now and in the future. To illustrate this fascinating ongoing THALES cybersecurity journey, the current paper provides realized examples that demonstrate some of the important early steps taken. For successfully mastering the complexity of naval IT platform systems an optimization approach is derived where Security necessarily comprises of more than only these three dimensions that are commonly known as confidentiality, availability and integrity. This paper focuses on &rsquo;Information and communication technologies&rsquo;. In particular, the discussed Machine Authentication Continuum and Remote Attestation provide new insights on some techniques to power THALES solutions to a new distinctive level of cybersecurity. It is elaborated how well-considered applications of these technologies enhance the trust that navies globally can rely on: well-thought-out use cases demonstrate how Trusted Hardware harnesses the trusted information exchange between the complexity of subsystems that constitute the overall naval IT platform. This paper will further show how a concept of i.a. signed messages fits into complex architectures. 000007683 542__ $$fCC-BY-4.0 000007683 6531_ $$aAuthentication Continuum 000007683 6531_ $$aEnhanced CIA-Triad (multidimensional) 000007683 6531_ $$aCybersecurity 000007683 6531_ $$aNaval Risk Management 000007683 6531_ $$aRisk Perception 000007683 6531_ $$aSilicon-based Root of Trust (RoT) 000007683 6531_ $$aSilicon-based Security 000007683 6531_ $$aTrustworthiness 000007683 6531_ $$aTrade-off Space 000007683 6531_ $$aTrusted Hardware. 000007683 7001_ $$aGlinka, MF 000007683 773__ $$tConference Proceedings of INEC 000007683 773__ $$jINEC 2020 000007683 789__ $$whttps://zenodo.org/record/4497831$$2URL$$eIsIdenticalTo 000007683 85641 $$uhttps://www.imarest.org/events/inec-2020$$yConference website 000007683 8564_ $$981bd7786-2c7d-485f-a319-853c7de6a47a$$s2852855$$uhttps://library.imarest.org/record/7683/files/INEC_2020_Paper_64.pdf