<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>xmlspif.orgxmlspif.org &#187; </title>
	<atom:link href="http://www.xmlspif.org/?feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://www.xmlspif.org</link>
	<description>The home of the Open XML SPIF</description>
	<lastBuildDate>Thu, 07 May 2026 15:11:18 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.8</generator>
	<item>
		<title>Confidentiality Metadata-based Access Control (CMBAC) core to enabling NATO Data-Centric Security (DCS) vision and strategy</title>
		<link>http://www.xmlspif.org/?p=240</link>
		<comments>http://www.xmlspif.org/?p=240#comments</comments>
		<pubDate>Wed, 03 Dec 2025 11:10:23 +0000</pubDate>
		<dc:creator><![CDATA[xmlspif]]></dc:creator>
				<category><![CDATA[STANAG]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[CMBAC]]></category>
		<category><![CDATA[DCS]]></category>
		<category><![CDATA[NATO]]></category>

		<guid isPermaLink="false">http://www.xmlspif.org/?p=240</guid>
		<description><![CDATA[DCS is recognised as a key enabler for NATO to evolve towards digital transformation exploiting new technologies and processes that treats data as a strategic resource to help inform timely decision making at all political and military levels across multiple domains of operations. NATO vision for DCS is to deliver shareable, timely and reliable information: [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><b>DCS</b> is recognised as a key enabler for NATO to evolve towards digital transformation exploiting new technologies and processes that treats data as a strategic resource to help inform timely decision making at all political and military levels across multiple domains of operations.</p>
<p>NATO vision for <b>DCS</b> is to deliver shareable, timely and reliable information: protected at source; and, controlled for life.</p>
<p>NATO strategy for implementing <b>DCS</b> is evolutionary defined by three Maturity Levels (MLs), whereby each ML facilitates interoperability and builds ontop of each other to reach the defined end-state.</p>
<p><b>DCS ML 1</b>: <b>Basic Labelling</b> (<b>DCS-1</b>) &#8211; Facilitated by the NATO standards (<i>STANAG 4774</i>, <i>STANAG 5636</i> and <i>STANAG 4778</i>) to provide consistent, reliable and trustworthy labelling with metadata associated for use with all common types of file formats and core services. Use of the XMLSPIF is fundamental for ensuring confidentiality metadata (<i>STANAG 4774 confidentiality label</i> and <i>confidentiality clearance</i>) is consistently applied and consistently displayed based upon the governing security policy that is being enforced.</p>
<p><b>DCS ML 2</b>: <b>Enhanced Labelling</b> (<b>DCS-2</b>) &#8211; Facilitated by the emerging NATO standard (<i>STANAG 5663</i>) to provide federated identity and access management (FIAM) and facilitate attribute-based access control (ABAC). The &#8220;<em><strong>Holy Trinity</strong></em>&#8221; (not George Best, Dennis Law and Sir Bobby Charlton) of <i>STANAG 4774 confidentiality label</i>, <i>STANAG 4774 confidentiality clearance</i> and XMLSPIF are used to provide <b><i>Confidentiality Metadata-based access Control</i></b><i> </i>(<b><i>CMBAC</i></b>; pronounced as &#8220;<b><i>Come Back</i></b>&#8220;), fundamental for facilitating ABAC. XMLSPIF specifies the rules for how <b><i>CMBAC</i></b> is enforced based upon comparing the confidentiality metadata value domains provided in a <i>STANAG 4774 confidentiality label</i> (associated with a resource) against a <i>STANAG 4774 confidentiality clearance</i> (associated with a <i>Subject</i> i.e. a user, application device or service). Implementation of <b><i>CMBAC</i></b> (as illustrated below), through the ratification of <i>ADatP-5663: Federated Identity, Credentials and Access Management</i>, is recognised as a core capability for evolving NATO <b>DCS</b> vision and strategy towards achieving <b>DCS-2</b>.</p>
<p style="text-align: center;"><a href="http://www.xmlspif.org/wp-content/uploads/2025/12/cmbac.jpg"><img class="alignnone size-medium wp-image-242" alt="cmbac" src="http://www.xmlspif.org/wp-content/uploads/2025/12/cmbac-300x192.jpg" width="300" height="192" /></a></p>
<p><b>DCS ML 3</b>: <b>Cryptographic Protection</b> (<b>DCS-3</b>) &#8211; NATO currently do not have a standardised approach for achieving <b>DCS-3</b>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.xmlspif.org/?feed=rss2&#038;p=240</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>STANAG 4774 Published</title>
		<link>http://www.xmlspif.org/?p=212</link>
		<comments>http://www.xmlspif.org/?p=212#comments</comments>
		<pubDate>Tue, 16 Jan 2018 12:46:31 +0000</pubDate>
		<dc:creator><![CDATA[Graeme Lunt]]></dc:creator>
				<category><![CDATA[STANAG]]></category>

		<guid isPermaLink="false">http://www.xmlspif.org/?p=212</guid>
		<description><![CDATA[After being ratified by a quorum of NATO Nations, STANAG 4774, Metadata Confidentiality Label Syntax, has been promulgated (published) by NATO. STANAG 4774 provides a XML syntax for representing a confidentiality label in an arbitrary policy, and includes information about the life-cycle of the confidentiality label e.g. when it should be reviewed. An example of [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>After being ratified by a quorum of NATO Nations, STANAG 4774, <em>Metadata Confidentiality Label Syntax</em>, has been promulgated (published) by NATO.</p>
<p>STANAG 4774 provides a XML syntax for representing a confidentiality label in an arbitrary policy, and includes information about the life-cycle of the confidentiality label e.g. when it should be reviewed.</p>
<p><span style="font-size: 12.16px;">An example of simple confidentiality label using the example </span><a style="font-size: 12.16px;" href="http://www.xmlspif.org/wp-content/uploads/2009/03/policy-amoco.xml">AMOCO security policy</a><span style="font-size: 12.16px;">, is shown below:</span></p>
<pre>&lt;slab:originatorConfidentialityLabel&gt;
  &lt;slab:ConfidentialityInformation&gt;
    &lt;slab:PolicyIdentifier&gt;TEST-Amoco&lt;/slab:PolicyIdentifier&gt;
    &lt;slab:Classification&gt;General&lt;/slab:Classification&gt;
    &lt;slab:PrivaryMark&gt;MINIMUM&lt;/slabPrivacyMark&gt;
   &lt;/slab:ConfidentialityInformation&gt;
   &lt;slab:CreationDateTime&gt;
     2016-11-10T12:30:00Z
   &lt;/slab:CreationDateTime&gt;
&lt;/slab:originatorConfidentialityLabel&gt;</pre>
<p>An XMLSPIF can be used to describe the value domains for the PolicyIdentifier, Classification, GenericValue (a category value), and PrivacyMark elements of the confidentiality metadata label.</p>
<p>The confidentiality metadata label syntax was designed to be used define metadata elements, with those metadata elements in turn being bound to information. STANAG 4774 defines two metadata elements that use the syntax:</p>
<ul>
<li>originatorConfidentialityLabel &#8211; the confidentiality label assigned to the information by the originator</li>
<li>alternativeConfidentialityLabel &#8211; an confidentiality label in a different policy that is equivalent to the originatorConfidentialityLabel</li>
</ul>
<p>The binding of metadata elements to information (both XML and non-XML) is the subject of a second STANAG, STANAG 4778, <em>Metadata Binding Mechanism</em>, which is expected to be ratified in 1Q18.</p>
<p>It is highly recommended that metadata elements which use the confidentiality metadata label syntax only use the STANAG 4778 binding mechanism to associate a confidentiality label with information.</p>
<p>STANAG 4774 is not openly available, so in order to obtain a copy of STANAG 4774, you should contact your National Technical Expert (NATEX).</p>
]]></content:encoded>
			<wfw:commentRss>http://www.xmlspif.org/?feed=rss2&#038;p=212</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>XMLSPIF used in STANAG to describe Security Labelling Policy</title>
		<link>http://www.xmlspif.org/?p=195</link>
		<comments>http://www.xmlspif.org/?p=195#comments</comments>
		<pubDate>Thu, 09 Nov 2017 15:46:34 +0000</pubDate>
		<dc:creator><![CDATA[Graeme Lunt]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[SPIF]]></category>
		<category><![CDATA[STANAG]]></category>

		<guid isPermaLink="false">http://www.xmlspif.org/?p=195</guid>
		<description><![CDATA[The goal of the Research Task Group in Cross Domain Security Solutions (IST-068/RTG-031) of the NATO Science and Technology Organization (STO)  was to improve the sharing of information in military environments and to facilitate the evolution of a flexible infrastructure by utilizing the eXtensible Markup Language (XML) to create suitable security solutions. In 2010, the [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The goal of the Research Task Group in Cross Domain Security Solutions (IST-068/RTG-031) of the NATO Science and Technology Organization (<a href="https://www.sto.nato.int/Pages/default.aspx">STO</a>)  was to improve the sharing of information in military environments and to facilitate the evolution of a flexible infrastructure by utilizing the eXtensible Markup Language (XML) to create suitable security solutions.</p>
<p>In 2010, the group published for a <a href="https://www.sto.nato.int/publications/_layouts/WordViewer.aspx?id=/publications/STO%20Meeting%20Proceedings/RTO-MP-IST-091/MP-IST-091-22.doc&amp;Source=https%3A%2F%2Fwww%2Esto%2Enato%2Eint%2Fpublications%2FSTO%2520Meeting%2520Proceedings%2FForms%2FMeeting%2520Proceedings%2520Document%2520Set%2Fdocsethomepage%2Easpx%3FID%3D36396%26FolderCTID%3D0x0120D5200078F9E87043356C409A0D30823AFA16F602008CF184CAB7588E468F5E9FA364E05BA5%26List%3D7e2cc123%2D6186%2D4c30%2D8082%2D1ba072228ca7%26RootFolder%3Dhttps%253A%252F%252Fwww%252Esto%252Enato%252Eint%252Fpublications%252FSTO%2520Meeting%2520Proceedings%252FRTO%252DMP%252DIST%252D091&amp;DefaultItemOpen=1&amp;DefaultItemOpen=1">proposal</a> for an XML Labelling and Metadata Binding specification.</p>
<p>This work has gone on to be developed into two new Standards Agreements (STANAGS), which in turn, are cover documents for the associated Allied Data Publications (ADatPs)):</p>
<ul>
<li>STANAG 4774 &#8211; Confidentiality Metadata Label Syntax &#8211; an XML schema that can be used to represent a confidentiality (security) label.</li>
<li>STANAG 4778 &#8211; Metadata Binding Mechanism - an XML Schema that can be used to bind arbitrary metadata (including metadata that uses the confidentiality metadata label syntax, to pieces of information.</li>
</ul>
<p>Both of these STANAGs are currently in the process of being ratified by the NATO Nations.</p>
<p>STANAG 4774 defines the structure of a confidentiality label, which includes elements such as the policy identifier, classifications and security categories. The non-normative Annexes B and D of STANAG 4774 provide descriptions of two security labelling policies, &#8220;NATO&#8221; and &#8220;PUBLIC&#8221;, in the form of Security Policy Information Files (SPIFs), which provide the value domains for the elements of the confidentiality label.</p>
<p>The SPIFs in the STANAG obviously can only contain a snapshot of the NATO security labelling policy, as new categories are added and removed to support missions and exercises. However, an up-to-date SPIF is maintained in the NATO Metadata Registry and Repository (<a href="https://nmrr.ncia.nato.int/home.htm">NMRR</a>) (login required), along with the STANAG 4774 and 4778 XML schemas, and other associated artefacts.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.xmlspif.org/?feed=rss2&#038;p=195</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>XMLSPIF Used to &#8220;Notable&#8221; Effect During CWID 2010.</title>
		<link>http://www.xmlspif.org/?p=165</link>
		<comments>http://www.xmlspif.org/?p=165#comments</comments>
		<pubDate>Tue, 16 Nov 2010 21:34:28 +0000</pubDate>
		<dc:creator><![CDATA[xmlspif]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.xmlspif.org/?p=165</guid>
		<description><![CDATA[CWID, the Coalition Warrior Interoperability Demonstration, is the premier annual event that enables U.S. Combatant Commands, national civil authorities and the international community to investigate and assess command and control (C2), communications systems, intelligence, surveillance, and reconnaissance (ISR) solutions. One of the &#8220;notable interoperability highlights&#8221; identified in this year&#8217;s Final Report is that a CWID [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.cwid.org/">CWID</a>, the Coalition Warrior Interoperability Demonstration, is the premier annual event that enables U.S. Combatant Commands, national civil authorities and the international community to investigate and assess command and control (C2), communications systems, intelligence, surveillance, and reconnaissance (ISR) solutions.</p>
<p>One of the &#8220;notable interoperability highlights&#8221; identified in this year&#8217;s <a href="http://www.cwid.org/2010%20Final%20Report/pdffiles/2010booklet.pdf">Final Report</a> is that a CWID 2010 trial:</p>
<blockquote><p>&#8220;Demonstrated a potential cross-domain solution to e-mail services, Extensible Messaging and Presence Protocol (XMPP) chat services, web services, and document sharing all of which were <strong>governed by a common security policy based on open standards</strong> to meet the requirements for providing a network enabled capability.&#8221;</p></blockquote>
<p>This refers to a <a href="http://www.cwid.org/2010%20Final%20Report/htmlfiles/UK-NATO.html">trial</a> run by the UK to demonstrate Cross Domain Chat between the UK, US and NATO. The trial adopted the XMLSPIF schema in order to provide a revisable, extensible schema that could support widespread adoption. The UK were able to represent the US and NATO Security Labelling policies with this standard and hence define the equivalent security labels to support mapping of labels within Cross Domain Services. The UK SPIF was stored in the X.500 / LDAP Enterprise Directory and a number of services then retrieved the SPIF, via LDAP, in order to display and apply Security Labels, and also make Access Control Decisions.</p>
<p>Appendix C of <a href="http://www.cwid.org/2010%20Final%20Report/pdffiles/CWID%202010%20UK%20Cross%20Domain%20Chat%20Technical%20Report.pdf">UK Cross Domain Chat Technical Report</a> contains an XMLSPIF representing UK JSP 457 Volume 7 Electronic Labelling Services used in the trial.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.xmlspif.org/?feed=rss2&#038;p=165</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Version 2.0 Schema Published</title>
		<link>http://www.xmlspif.org/?p=160</link>
		<comments>http://www.xmlspif.org/?p=160#comments</comments>
		<pubDate>Fri, 28 May 2010 09:46:21 +0000</pubDate>
		<dc:creator><![CDATA[xmlspif]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.xmlspif.org/?p=160</guid>
		<description><![CDATA[A new version of the XMLSPIF schema is now available. It includes new features requested by members to support their customers&#8217; requirements. These new features include: Validity periods for the whole policy and individual category values. MarkingData and MarkingQualifiers for the SPIF, privacy marks and tag categories. Enhanced constraints on the number of privacy marks [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>A new version of the XMLSPIF schema is now available. It includes new features requested by members to support their customers&#8217; requirements. These new features include:</p>
<ul>
<li>Validity periods for the whole policy and individual category values.</li>
<li>MarkingData and MarkingQualifiers for the SPIF, privacy marks and tag categories.</li>
<li>Enhanced constraints on the number of privacy marks and tags that can be selected.</li>
<li>Date format specification for category values containing a date.</li>
<li>Required categories for an equivalent policy, classification and categories to provide enhanced equivalency mappings.</li>
<li>Equivalency between tag sets, where the tag values are the same in each tag set. For example, ISO3166 country codes.</li>
<li>Fixes to the schema constraints.</li>
</ul>
<p>Version 2.0 of the schema replaces Version 1.0 of the schema at:<br />
<a href="http://www.xmlspif.org/schema/xmlspif.xsd">http://www.xmlspif.org/schema/xmlspif.xsd</a></p>
<p>The Version 2.0 schema is backwards compatible with Version 1.0. However, for those people who wish to specifically reference Version 1.0 of the schema, it is still available at:<br />
<a href="http://www.xmlspif.org/schema/2009/03/xmlspif.xsd">http://www.xmlspif.org/schema/2009/03/xmlspif.xsd</a></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.xmlspif.org/?feed=rss2&#038;p=160</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
