top of page

Introduction to the Cross Domain Hybrid Application Framework (CDHA)

Updated: May 10

Is CDHA Just Another Gateway? Absolutely not!  

Here’s why: 

Gateways and diodes are crucial for securing high trust domains, acting as integral components of the system’s defence. Gateways control the access, allowing only secure and verified interactions, while diodes reinforce the domain’s boundaries, ensuring the data within is protected. Together, they establish a solid defence, maintaining the integrity and confidentiality of the data within the high trust domain. However, one might wonder, what about the data on the low trust domain? How do we ensure it receives equivalent protection, especially when it is at its most vulnerable stage? This question highlights potential security concerns on the lower tier and invites further discussion or exploration of solutions that CDHA offers for comprehensive security across all levels. 

With the implementation of CDHA, this security extends beyond the high trust domain, offering protection for data across both tiers. CDHA provides a comprehensive security framework that safeguards information on every level, ensuring that both, the more accessible low trust domain and the restricted high trust domain benefit from enhanced protection against threats. 

CDHA is designed to safeguard not only the high tier but also the low tier.  

Let’s use the example of our cyberpunk-themed world, where the blue low-trust domain and the red high-trust domain are completely separated from each other. In this vivid picture, CDHA stands as the envisioned bridge, promising safe and seamless passage for data between the low and high tiers. It is not just about transferring data; it’s about ensuring that data is collected securely at the lower tier and then transported and stored with equal security at the higher tier. Additionally, CDHA ensures that data is protected while processing at the low trust domain, adding another layer of security to the entire process. 

Within CDHA, data is enveloped in a protective shield or ‘cocoon,’ ensuring its integrity and security throughout its journey, untouched by threats. This cocoon, in essence, represents encryption, a powerful safeguard that utilises the user’s keys to protect the data against hostile state actors’ access or tampering. CDHA facilitates robust two-way communication between low and high tiers: not only does it collect, transfer, and securely store data from the low to the high tier, but it also ensures that responses from the high tier to the low tier are swift and secure. This comprehensive approach ensures an efficient exchange of information while maintaining strict security protocols throughout. 

Let’s have a look at the benefits of CDHA in a nutshell: 

Unique Cross-Domain Cryptographic Key Management: CDHA ensures secure management of cryptographic keys across different security domains, enhancing overall data security. 


Enhanced Data Movement Security: CDHA enhances data movement with advanced security measures, ensuring sensitive information remains protected during transit. 


Secure Data Housing: CDHA provides secure storage, minimising the risk of unintended access or data breaches while data is at rest. 


Intuitive Key Management for Users: CDHA offers user-friendly key management, simplifying processes while maintaining strict security protocols. 


Minimising Dependency on Secret EUD: CDHA reduces reliance on compromised devices, enhancing overall system security. 


Advanced Cross-Domain Protection: CDHA employs advanced security measures to protect against threats across security domains. 


Let’s explore how CDHA delivers these benefits in our upcoming blog, focusing on the technical aspects of the CDHA Architecture.

Please watch our Senior Associate, Stephen Thomas, discussing this topic in-depth in this insightful video:


Commenting has been turned off.
bottom of page