主权项 |
1. A method implemented by a single computing device having a first perimeter and a second perimeter with access restrictions on resources between the first perimeter and the second perimeter, the first perimeter and the second perimeter each defining a logical separation within a memory of the single computing device, the method comprising:
receiving an input requesting a transfer of data from the first perimeter to the second perimeter; identifying a first cross-perimeter policy associated with the first perimeter and a second cross-perimeter policy associated with the second perimeter, the first and second cross-perimeter policies defining, for each of the first and second perimeters respectively, one or more criteria for at least one of: permitting the transfer of data or requiring generation of an audit trail; combining the first cross-perimeter policy and the second cross-perimeter policy to determine at least one of: whether the transfer of data is permitted or whether generation of the audit trail is required; and in accordance with the determination resulting from the combining:
transferring data from the first perimeter to the second perimeter within the memory of the single computing device in response to the request, if it is determined that the transfer of data is permitted; andgenerating a data transfer audit trail including transfer event information about the data transfer, if it is determined that generation of the audit trail is required. |