Data Confidentiality: Identifying and Protecting Assets and Data Against Data Breaches

Current Status

This project is currently in the build phase. We have selected several technology collaborators who have signed a Cooperative Research and Development Agreement (CRADA, see an example) with NIST.

Download the Data Confidentiality: Identifying and Protecting Assets and Data Against Data Breaches Project Description for more information on the project.

If you have any questions or would like to join our Community of Interest, please email the Data Security team at



The National Cybersecurity Center of Excellence is proposing a project to provide guidance and a reference architecture that will assist an organization in identifying and protecting information from threats to data confidentiality.

An organization’s data is one of its most valuable assets and must be protected from unauthorized access and disclosure. Large and small data breaches can impact the ability of an organization to survive as operational and financial data, along with employee or customer personally identifiable information, can become comprised. This can undermine the organization’s work and success and lead to severe reputational damage.

The goal of this project is to provide a practical solution to identify and protect the confidentiality of an enterprise’s data. This project will also provide guidance on data confidentiality that parallels the Detect, Respond to, and Recover from Data Breaches Project. The NCCoE chose to address data confidentiality in two parallel projects to provide modular, adaptable guidance rather than an all-or-nothing approach.

This project will result in a publicly available National Institute of Standards and Technology Cybersecurity Practice Guide, a detailed implementation guide of the practical steps needed to implement a cybersecurity reference design that addresses this challenge. Please read the fact sheet for this project. 


Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

GreenTec USA logo
StrongKey logo