Data Confidentiality: Detect, Respond to, and Recover from Data Breaches

Current Status

This project is currently in the build phase. We have selected several technology collaborators who have signed a Cooperative Research and Development Agreement (CRADA, see an example) with NIST.

Download the Data Confidentiality: Detect, Respond to, and Recover from Data Breaches Project Description for more information on the project.

If you have any questions or would like to join our Community of Interest, please email the Data Security team at


The NCCoE is proposing a project to provide guidance and a reference architecture that will assist an organization in detecting, responding, and recovering information from threats to data confidentiality.

An organization’s data is one of its most valuable assets and must be protected from unauthorized access and disclosure. Large and small data breaches can impact the ability of an organization to survive as operational and financial data, along with employee or customer personally identifiable information, can become comprised. This can undermine the organization’s work and success and lead to severe reputational damage.

The goal of this project is to provide a practical solution to detect, respond to, and recover from incidents that affect data confidentiality. This project will also provide guidance on data confidentiality that parallels the Identifying and Protecting Assets and Data Against Data Breaches Project. The NCCoE chose to address data confidentiality in two parallel projects to provide modular, adaptable guidance rather than an all-or-nothing approach. In addition, two projects allow for multiple scenarios for preventing and reacting to a data breach or other loss of data confidentiality event.

This project will result in a publicly available National Institute of Standards and Technology Cybersecurity Practice Guide, a detailed implementation guide of the practical steps needed to implement a cybersecurity reference design that addresses this challenge. Please read the fact sheet for this project. 



Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.