NIST SPECIAL PUBLICATION 1800-28
Data Confidentiality: Identifying and Protecting Assets Against Data Breaches¶
Data Confidentiality:
Identifying and Protecting Assets Against Data Breaches
Includes Executive Summary (A); Approach, Architecture, and Security Characteristics (B); and How-To Guides (C)
William Fisher
R. Eugene Craft
Michael Ekstrom
Julian Sexton
John Sweetnam
February 2024
FINAL
This publication is available free of charge from https://doi.org/10.6028/NIST.SP.1800-28
The first draft of this publication is available free of charge from: https://www.nccoe.nist.gov/data-confidentiality-identifying-and-protecting-assets-against-data-breaches
NIST SPECIAL PUBLICATION 1800-28
Data Confidentiality: Identifying and Protecting Assets Against Data Breaches
Includes Executive Summary (A); Approach, Architecture, and Security Characteristics (B); and How-To Guides (C)
FINAL
February 2024
- 1 Summary
- 2 How to Use This Guide
- 3 Approach
- 4 Architecture
- 5 Security & Privacy Characteristic Analysis
- 6 Future Build Considerations
- Appendix A List of Acronyms
- Appendix B Glossary
- Appendix C References
- Appendix D Security Control Map
- Appendix E Privacy Control Map
- 1 Introduction
- 2 Product Installation Guides
- 2.1 FireEye Helix
- 2.2 Symantec Cloud Secure Web Gateway
- 2.3 PKWARE PKProtect
- 2.4 StrongKey Tellaro
- 2.5 Qcor ForceField
- 2.6 Avrio SIFT
- 2.7 Cisco Duo
- 2.8 Dispel
- 2.9 Integration: FireEye Helix and Symantec SWG
- 2.10 Integration: FireEye Helix and PKWARE PKProtect
- 2.11 Integration: FireEye Helix and Cisco Duo
- 2.12 Integration: FireEye Helix and QCOR ForceField
- 2.13 Integration: FireEye Helix and Dispel
- 2.14 Integration: Avrio SIFT and PKWARE PKProtect
- 2.15 Integration: Dispel and Cisco Duo
- Appendix A List of Acronyms