This guide provides recommendations on how to respond to and recover from data beaches, including cybersecurity and privacy considerations to prepare for data breaches and specific technical direction for implementation.
Data Confidentiality: Detect, Respond to, and Recover from Data Breaches
Data confidentiality refers to protecting data from unauthorized access and disclosure, including means for protecting personal privacy and proprietary information. Lapses in data confidentiality can lead to a data breach, which can have far-reaching operational, financial, and reputational impacts for the enterprise. The NCCoE is committed to helping organizations address threats to data confidentiality.
Demonstrating How Organizations Can Efficiently Detect, Respond, and Recover from Data Confidentiality Attacks
Project Abstract
An organization’s data is one of its most valuable assets and must be protected from unauthorized access and disclosure. Large and small data breaches can impact the ability of an organization to survive as operational and financial data, along with employee or customer personally identifiable information, can become compromised. This can undermine the organization’s work and success and lead to severe reputational damage.
The NCCoE is helping enterprises address data confidentiality challenges through collaborative efforts with industry and the Information Technology (IT) community, including vendors of cybersecurity solutions.
The goal of this project is to provide a practical solution to detect, respond to, and recover from incidents that affect data confidentiality. This project will also provide guidance that parallels the Identifying and Protecting Assets and Data Against Data Breaches Project. The NCCoE chose to address data confidentiality in two parallel projects to provide modular, adaptable guidance rather than utilize an all-or-nothing approach. In addition, two projects allow for multiple scenarios for preventing and reacting to a data breach or other loss of data confidentiality event.
An organization’s data is one of its most valuable assets and reacting to a data breach requires quick and diligent action.
Collaborating Vendors
Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.