National Cybersecurity Center of Excellence (NCCoE) Domain Name System-Based Security (DNS) for Electronic Mail Building Block, 60363-60365 [2015-25304]

Download as PDF Federal Register / Vol. 80, No. 193 / Tuesday, October 6, 2015 / Notices identification card for access to federal facilities if such license or identification card is issued by a state that is compliant with the REAL ID Act of 2005 (P.L. 109–13), or by a state that has an extension for REAL ID compliance. NIST currently accepts other forms of federal-issued identification in lieu of a state-issued driver’s license. For detailed information please contact Ms. Young or visit: http://www.nist.gov/ public_affairs/visitor/. Richard Cavanagh, Acting Associate Director for Laboratory Programs. [FR Doc. 2015–25310 Filed 10–5–15; 8:45 am] BILLING CODE 3510–13–P DEPARTMENT OF COMMERCE National Institute of Standards and Technology [Docket No. 150917865–5865–01] National Cybersecurity Center of Excellence (NCCoE) Domain Name System-Based Security (DNS) for Electronic Mail Building Block National Institute of Standards and Technology, Department of Commerce. ACTION: Notice. AGENCY: The National Institute of Standards and Technology (NIST) invites organizations to provide products and technical expertise to support and demonstrate security platforms for the Domain Name SystemBased (DNS) Security for Electronic Mail Building Block. This notice is the initial step for the National Cybersecurity Center of Excellence (NCCoE) in collaborating with technology companies to address cybersecurity challenges identified under the Domain Name System-Based Security for Electronic Mail Building Block. Participation in this building block is open to all interested organizations. DATES: Interested parties must contact NIST to request a letter of interest template to be completed and submitted to NIST that identifies the organization requesting participation in the Domain Name System-Based Security for Electronic Mail Building Block and the capabilities and components that are being offered to the collaborative effort. Letters of interest will be accepted on a first come, first served basis. Collaborative activities will commence as soon as enough completed and signed letters of interest have been returned to address all the necessary components tkelley on DSK3SPTVN1PROD with NOTICES SUMMARY: VerDate Sep<11>2014 18:31 Oct 05, 2015 Jkt 238001 and capabilities, but no earlier than November 5, 2015. When the building block has been completed, NIST will post a notice on the Domain Name System-Based Security for Electronic Mail Building Block Web site at http://nccoe.nist.gov/DNSSecuredEmail announcing the completion of the building block and informing the public that it will no longer accept letters of interest for this building block. ADDRESSES: The NCCoE is located at 9600 Gudelsky Drive, Rockville, MD 20850. Letters of interest must be submitted to dns-email-nccoe@nist.gov or via hardcopy to National Institute of Standards and Technology, NCCoE; 9600 Gudelsky Drive; Rockville, MD 20850. Organizations whose letters of interest are accepted in accordance with the process set forth in the SUPPLEMENTARY INFORMATION section of this notice will be asked to sign a Cooperative Research and Development Agreement (CRADA) with NIST. A CRADA template can be found at: http://nccoe.nist.gov/node/138. FOR FURTHER INFORMATION CONTACT: William C. Barker via email to dnsemail-nccoe@nist.gov; by telephone 301–975–3655; or by mail to National Institute of Standards and Technology, NCCoE; 9600 Gudelsky Drive; Rockville, MD 20850. Additional details about the Domain Name System-Based Security for Electronic Mail Building Block are available at http://nccoe.nist.gov/ DNSSecuredEmail. SUPPLEMENTARY INFORMATION: Background: The NCCoE, part of NIST, is a public-private collaboration for accelerating the widespread adoption of integrated cybersecurity tools and technologies. The NCCoE brings together experts from industry, government, and academia under one roof to develop practical, interoperable cybersecurity approaches that address the real-world needs of complex Information Technology (IT) systems. By accelerating dissemination and use of these integrated tools and technologies for protecting IT assets, the NCCoE will enhance trust in U.S. IT communications, data, and storage systems; reduce risk for companies and individuals using IT systems; and encourage development of innovative, job-creating cybersecurity products and services. Process: NIST is soliciting responses from all sources of relevant security capabilities (see below) to enter into a Cooperative Research and Development Agreement (CRADA) to provide products and technical expertise to support and demonstrate security platforms for the Domain Name System- PO 00000 Frm 00015 Fmt 4703 Sfmt 4703 60363 Based Security for Electronic Mail Building Block. The full building block description can be viewed at: http:// nccoe.nist.gov/DNSSecuredEmail. Interested parties should contact NIST using the information provided in the FOR FURTHER INFORMATION CONTACT section of this notice. NIST will then provide each interested party with a letter of interest template, which the party must complete, certify that it is accurate, and submit to NIST and which identifies the organization requesting participation in the Domain Name System-Based Security for Electronic Mail Building Block and the capabilities and components that are being offered to the collaborative effort. NIST will contact interested parties if there are questions regarding the responsiveness of the letters of interest to the building block objective or requirements identified below and to obtain additional information. NIST will select participants who have submitted complete letters of interest on a first come, first served basis within each category of product components or capabilities listed below up to the number of participants in each category necessary to carry out the Domain Name System-Based Security for Electronic Mail Building Block. However, there may be continuing opportunity to participate even after initial activity commences. Selected participants will be required to enter into a consortium CRADA with NIST (for reference, see ADDRESSES section above). NIST published a notice in the Federal Register on October 19, 2012 (77 FR 64314) inviting U.S. companies to enter into National Cybersecurity Excellence Partnerships (NCEPs) in furtherance of the NCCoE. For this demonstration project, NCEP partners will not be given priority for participation. Building Block Objective Both public and private sector business operations are heavily reliant on electronic mail (email) exchanges. The need to protect business plans and tactics, the integrity of transactions, financial and other proprietary information, and privacy of employees and clients are only four of the factors that motivate organizations to secure their email exchanges. Whether the security service desired is authentication of the source of an email message, assurance that the message has not been altered by an unauthorized party, or confidentiality of message contents, cryptographic functions are usually employed in providing the service. Economies of scale and a need for uniform security implementation drive most enterprises to rely on mail E:\FR\FM\06OCN1.SGM 06OCN1 tkelley on DSK3SPTVN1PROD with NOTICES 60364 Federal Register / Vol. 80, No. 193 / Tuesday, October 6, 2015 / Notices servers to provide security to the members of an enterprise rather than end-to-end security mechanisms operated by individual users. Most current server-based email security mechanisms are vulnerable to, and have been defeated by, attacks on the integrity of the cryptographic implementations on which they depend. The consequences frequently involve unauthorized parties being able to read or modify supposedly secure information, or to use email as a vector for inserting malware into the system that is intended to deny access to critical information or processes or to damage or destroy system components and/or information. Improved email security can help protect organizations and individuals against these consequences and also serve as a marketing discriminator for email service providers as well as improve the trustworthiness of enterprise email exchanges. Domain Name System Security Extensions (DNSSEC) for the Domain Name System (DNS) are technical mechanisms employed by internet service providers to protect against unauthorized modification to network management information and connections to devices operated by untrustworthy parties. DNS-based Authentication of Named Entities (DANE) is a protocol that securely associates domain names with cryptographic certificates and related security information so that they can’t be fraudulently modified or replaced to breach the security of Internet exchanges. In spite of the dangers of failure to authenticate the identities of network devices, adoption of DNSSEC has been slow. Demonstration of DANEsupported applications such as reliably secure email may support increased user demand for domain name system security. Follow-on projects might include HTTPS, IOT, IPSEC keys in DNS, and DNS service discovery. The current project will demonstrate a proof of concept security platform composed of off the shelf components that provides trustworthy mail server-tomail server email exchanges across organizational boundaries. The DANE protocol will be used to authenticate servers and certificates in two roles in the DNS-Based Security for Email Project: (1) By binding the X.509 certificates used for Transport Layer Security (TLS) to DNS names verified by DNSSEC and supporting the use of these certificates in the mail server-to-mail server communication; and (2) by binding the X.509 certificates used for Secure Secure/Multipurpose Internet Mail Extensions (S/MIME) to email VerDate Sep<11>2014 18:31 Oct 05, 2015 Jkt 238001 addresses encoded as DNS names verified by DNSSEC. These bindings support trust in the use of S/MIME certificates in the end-to-end email communication. The resulting building block will encrypt email traffic between servers, allow individual email users to digitally sign and/or encrypt email messages to other end users, and allow individual email users to obtain other users’ certificates in order to validate signed email or send encrypted email. The project will include an email sending policy consistent with a stated privacy policy that can be parsed by receiving servers so that receiving servers can apply the correct security checks and report back the correctness of the email stream. Documentation of the resulting platform will include statements of the security and privacy policies and standards (e.g., Executive Orders, NIST standards and guidelines, IETF RFCs) supported, technical specifications for hardware and software, implementation requirements, and a mapping of implementation requirements to the applicable policies, standards, and best practices. The secure email project will involve composition of a variety of components that will be provided by a number of different vendors. Client systems, DNS/ DNSSEC services, mail transfer agents, and certificate providers (CAs) are generally involved. Collaborators are being sought to provide components and expertise for DNS resolvers (stub and recursive) for DNSSEC, authoritative DNS servers for DNSSEC signed zones, mail servers and mail security components, extended validation and domain validation TLS certificates. This project will result in one or more demonstration prototype DNS-based secure email platforms, a publicly available NIST Cybersecurity Practice Guide that explains how to employ the platform(s) to meet security and privacy requirements, and platform documentation necessary to compose a DNS-based email security platform from off the shelf components. A detailed description of the Domain Name System-Based Security for Electronic Mail Building Block is available at: http://nccoe.nist.gov/ DNSSecuredEmail. Requirements: Each responding organization’s letter of interest should identify which security platform component(s) or capability(ies) it is offering. Letters of interest should not include company proprietary information, and all components and capabilities must be commercially available. Components are listed in section eight of the Domain Name PO 00000 Frm 00016 Fmt 4703 Sfmt 4703 System-Based Security for Electronic Mail Building Block description (for reference, please see the link in the PROCESS section above) and include, but are not limited to: • Client systems • DNS/DNSSEC services • Mail transfer agents • DNS resolvers (stub and recursive) for DNSSEC validation • Authoritative DNS servers for DNSSEC signed zones • Mail server/mail security systems • S/MIME certificates • Extended validation and domain validation TLS certificates Each responding organization’s letter of interest should identify how their product(s) address one or more of the desired solution characteristics in section five of the Domain Name System-Based Security for Electronic Mail Building Block description (for reference, please see the link in the PROCESS section above). Additional details about the Domain Name System-Based Security for Electronic Mail Building Block are available at: http://nccoe.nist.gov/ DNSSecuredEmail. NIST cannot guarantee that all of the products proposed by respondents will be used in the demonstration. Each prospective participant will be expected to work collaboratively with NIST staff and other project participants under the terms of the consortium CRADA in the development of the Domain Name System-Based Security for Electronic Mail Building Block. Prospective participants’ contribution to the collaborative effort will include assistance in establishing the necessary interface functionality, connection and set-up capabilities and procedures, demonstration harnesses, environmental and safety conditions for use, integrated platform user instructions, and demonstration plans and scripts necessary to demonstrate the desired capabilities. Each participant will train NIST personnel, as necessary, to operate its product in capability demonstrations. Following successful demonstrations, NIST will publish a description of the security platform and its performance characteristics sufficient to permit other organizations to develop and deploy security platforms that meet the security objectives of the Domain Name System-Based Security for Electronic Mail Building Block. These descriptions will be public information. Under the terms of the consortium CRADA, participants will commit to providing: 1. Access for all participants’ project teams to component interfaces and E:\FR\FM\06OCN1.SGM 06OCN1 Federal Register / Vol. 80, No. 193 / Tuesday, October 6, 2015 / Notices the organization’s experts necessary to make functional connections among security platform components 2. Support for development and demonstration of the Domain Name System-Based Security for Electronic Mail Building Block in NCCoE facilities which will be conducted in a manner consistent with Federal requirements (e.g., FIPS 200, FIPS 201, SP 800–53, and SP 800–63) In addition, NIST will support development of interfaces among participants’ products by providing IT infrastructure, laboratory facilities, office facilities, collaboration facilities, and staff support to component composition, security platform documentation, and demonstration activities. The dates of the demonstration of the Domain Name System-Based Security for Electronic Mail Building Block capability will be announced on the NCCoE Web site at least two weeks in advance at http://nccoe.nist.gov/. The expected outcome of the demonstration is to improve domain name systembased security for electronic mail within the enterprise. Participating organizations will gain from the knowledge that their products are interoperable with other participants’ offerings. For additional information on the NCCoE governance, business processes, and NCCoE operational structure, visit the NCCoE Web site http:// nccoe.nist.gov/. Richard Cavanagh, Acting Associate Director for Laboratory Programs. [FR Doc. 2015–25304 Filed 10–5–15; 8:45 am] BILLING CODE 3510–13–P DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration tkelley on DSK3SPTVN1PROD with NOTICES Submission for OMB Review; Comment Request The Department of Commerce will submit to the Office of Management and Budget (OMB) for clearance the following proposal for collection of information under the provisions of the Paperwork Reduction Act (44 U.S.C. Chapter 35). Agency: National Oceanic and Atmospheric Administration (NOAA). Title: Environmental Compliance Questionnaire for National Oceanic and Atmospheric Administration Federal Financial Assistance Applicants. VerDate Sep<11>2014 18:31 Oct 05, 2015 Jkt 238001 OMB Control Number: 0648–0538. Form Number(s): None. Type of Request: Regular (revision and extension of a currently approved information collection). Number of Respondents: 1,000. Average Hours per Response: One to three hours. Burden Hours: 3,000. Needs and Uses: This request is for a revision and extension of a currently approved information collection. The National Environmental Policy Act (‘‘NEPA’’; 42 U.S.C. 4321–4370) requires federal agencies to complete an environmental analysis for all major federal actions, including funding nonfederal projects through federal financial assistance awards where Federal participation in the funded activity is expected to be significant. This Environmental Compliance Questionnaire for National Oceanic and Atmospheric Administration Federal Financial Assistance Applicants (Questionnaire) is used by the National Oceanic and Atmospheric Administration (NOAA) to collect information about proposed activities for NEPA and other environmental compliance requirements associated with proposed projects, such as federal consultations. The Questionnaire is used in conjunction with NOAA Funding Opportunity Announcements (FOA). Applicants are required to provide only the information from this Questionnaire that is specified in the FOA to which they are applying. The FOA may present these questions in one of two ways: (1) The applicable questions can be inserted directly into the FOA with reference to the OMB Control Number (0648–0538) for this form; or (2) The FOA can specify which questions (e.g. 1, 2) an applicant must answer, with the entire OMB-approved Questionnaire attached to the FOA. This Questionnaire has been revised to (1) remove repetitive questions; (2) revise specific questions to use plain language instead of NEPA-specific language; and (3) add questions that would be helpful to a wider range of NOAA programs. The revision reduced the overall number of questions by 22. Affected Public: Individuals or households; business or other for-profit organizations; not-for-profit institutions; state, local, or tribal government; and federal government. Frequency: On occasion. Respondent’s Obligation: Required to obtain or retain benefits. This information collection request may be viewed at reginfo.gov. Follow the instructions to view Department of Commerce collections currently under review by OMB. PO 00000 Frm 00017 Fmt 4703 Sfmt 4703 60365 Written comments and recommendations for the proposed information collection should be sent within 30 days of publication of this notice to OIRA_Submission@ omb.eop.gov or fax to (202) 395–5806. Dated: October 1, 2015. Sarah Brabson, NOAA PRA Clearance Officer. [FR Doc. 2015–25378 Filed 10–5–15; 8:45 am] BILLING CODE 3510–NW–P DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration Proposed Information Collection; Comment Request; Limits of Application of the Take Prohibitions National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice. AGENCY: The Department of Commerce, as part of its continuing effort to reduce paperwork and respondent burden, invites the general public and other Federal agencies to take this opportunity to comment on proposed and/or continuing information collections, as required by the Paperwork Reduction Act of 1995. DATES: Written comments must be submitted on or before December 7, 2015. SUMMARY: Direct all written comments to Jennifer Jessup, Departmental Paperwork Clearance Officer, Department of Commerce, Room 6616, 14th and Constitution Avenue NW., Washington, DC 20230 (or via the Internet at JJessup@doc.gov). FOR FURTHER INFORMATION CONTACT: Requests for additional information or copies of the information collection instrument and instructions should be directed to Gary Rule, NOAA Fisheries, 1201 NE Lloyd Blvd. Suite 1100, Portland, OR 97232, (503) 230–5424 or gary.rule@noaa.gov. SUPPLEMENTARY INFORMATION: ADDRESSES: I. Abstract This request is for extension of a currently approved information collection. Section 4(d) of the Endangered Species Act of 1973 (ESA; 16 U.S.C. 1531 et seq.) requires the National Marine Fisheries Service (NMFS) to adopt such regulations as it ‘‘deems necessary and advisable to provide for the conservation of’’ threatened species. Those regulations may include any or all of the E:\FR\FM\06OCN1.SGM 06OCN1

Agencies

[Federal Register Volume 80, Number 193 (Tuesday, October 6, 2015)]
[Notices]
[Pages 60363-60365]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2015-25304]


-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Institute of Standards and Technology

[Docket No. 150917865-5865-01]


National Cybersecurity Center of Excellence (NCCoE) Domain Name 
System-Based Security (DNS) for Electronic Mail Building Block

AGENCY: National Institute of Standards and Technology, Department of 
Commerce.

ACTION: Notice.

-----------------------------------------------------------------------

SUMMARY: The National Institute of Standards and Technology (NIST) 
invites organizations to provide products and technical expertise to 
support and demonstrate security platforms for the Domain Name System-
Based (DNS) Security for Electronic Mail Building Block. This notice is 
the initial step for the National Cybersecurity Center of Excellence 
(NCCoE) in collaborating with technology companies to address 
cybersecurity challenges identified under the Domain Name System-Based 
Security for Electronic Mail Building Block. Participation in this 
building block is open to all interested organizations.

DATES: Interested parties must contact NIST to request a letter of 
interest template to be completed and submitted to NIST that identifies 
the organization requesting participation in the Domain Name System-
Based Security for Electronic Mail Building Block and the capabilities 
and components that are being offered to the collaborative effort. 
Letters of interest will be accepted on a first come, first served 
basis. Collaborative activities will commence as soon as enough 
completed and signed letters of interest have been returned to address 
all the necessary components and capabilities, but no earlier than 
November 5, 2015. When the building block has been completed, NIST will 
post a notice on the Domain Name System-Based Security for Electronic 
Mail Building Block Web site at http://nccoe.nist.gov/DNSSecuredEmail 
announcing the completion of the building block and informing the 
public that it will no longer accept letters of interest for this 
building block.

ADDRESSES: The NCCoE is located at 9600 Gudelsky Drive, Rockville, MD 
20850. Letters of interest must be submitted to dns-email-nccoe@nist.gov or via hardcopy to National Institute of Standards and 
Technology, NCCoE; 9600 Gudelsky Drive; Rockville, MD 20850. 
Organizations whose letters of interest are accepted in accordance with 
the process set forth in the SUPPLEMENTARY INFORMATION section of this 
notice will be asked to sign a Cooperative Research and Development 
Agreement (CRADA) with NIST. A CRADA template can be found at: http://nccoe.nist.gov/node/138.

FOR FURTHER INFORMATION CONTACT: William C. Barker via email to dns-email-nccoe@nist.gov; by telephone 301-975-3655; or by mail to National 
Institute of Standards and Technology, NCCoE; 9600 Gudelsky Drive; 
Rockville, MD 20850. Additional details about the Domain Name System-
Based Security for Electronic Mail Building Block are available at 
http://nccoe.nist.gov/DNSSecuredEmail.

SUPPLEMENTARY INFORMATION:
    Background: The NCCoE, part of NIST, is a public-private 
collaboration for accelerating the widespread adoption of integrated 
cybersecurity tools and technologies. The NCCoE brings together experts 
from industry, government, and academia under one roof to develop 
practical, interoperable cybersecurity approaches that address the 
real-world needs of complex Information Technology (IT) systems. By 
accelerating dissemination and use of these integrated tools and 
technologies for protecting IT assets, the NCCoE will enhance trust in 
U.S. IT communications, data, and storage systems; reduce risk for 
companies and individuals using IT systems; and encourage development 
of innovative, job-creating cybersecurity products and services.
    Process: NIST is soliciting responses from all sources of relevant 
security capabilities (see below) to enter into a Cooperative Research 
and Development Agreement (CRADA) to provide products and technical 
expertise to support and demonstrate security platforms for the Domain 
Name System-Based Security for Electronic Mail Building Block. The full 
building block description can be viewed at: http://nccoe.nist.gov/DNSSecuredEmail.
    Interested parties should contact NIST using the information 
provided in the FOR FURTHER INFORMATION CONTACT section of this notice. 
NIST will then provide each interested party with a letter of interest 
template, which the party must complete, certify that it is accurate, 
and submit to NIST and which identifies the organization requesting 
participation in the Domain Name System-Based Security for Electronic 
Mail Building Block and the capabilities and components that are being 
offered to the collaborative effort. NIST will contact interested 
parties if there are questions regarding the responsiveness of the 
letters of interest to the building block objective or requirements 
identified below and to obtain additional information. NIST will select 
participants who have submitted complete letters of interest on a first 
come, first served basis within each category of product components or 
capabilities listed below up to the number of participants in each 
category necessary to carry out the Domain Name System-Based Security 
for Electronic Mail Building Block. However, there may be continuing 
opportunity to participate even after initial activity commences. 
Selected participants will be required to enter into a consortium CRADA 
with NIST (for reference, see ADDRESSES section above). NIST published 
a notice in the Federal Register on October 19, 2012 (77 FR 64314) 
inviting U.S. companies to enter into National Cybersecurity Excellence 
Partnerships (NCEPs) in furtherance of the NCCoE. For this 
demonstration project, NCEP partners will not be given priority for 
participation.

Building Block Objective

    Both public and private sector business operations are heavily 
reliant on electronic mail (email) exchanges. The need to protect 
business plans and tactics, the integrity of transactions, financial 
and other proprietary information, and privacy of employees and clients 
are only four of the factors that motivate organizations to secure 
their email exchanges. Whether the security service desired is 
authentication of the source of an email message, assurance that the 
message has not been altered by an unauthorized party, or 
confidentiality of message contents, cryptographic functions are 
usually employed in providing the service. Economies of scale and a 
need for uniform security implementation drive most enterprises to rely 
on mail

[[Page 60364]]

servers to provide security to the members of an enterprise rather than 
end-to-end security mechanisms operated by individual users. Most 
current server-based email security mechanisms are vulnerable to, and 
have been defeated by, attacks on the integrity of the cryptographic 
implementations on which they depend. The consequences frequently 
involve unauthorized parties being able to read or modify supposedly 
secure information, or to use email as a vector for inserting malware 
into the system that is intended to deny access to critical information 
or processes or to damage or destroy system components and/or 
information. Improved email security can help protect organizations and 
individuals against these consequences and also serve as a marketing 
discriminator for email service providers as well as improve the 
trustworthiness of enterprise email exchanges.
    Domain Name System Security Extensions (DNSSEC) for the Domain Name 
System (DNS) are technical mechanisms employed by internet service 
providers to protect against unauthorized modification to network 
management information and connections to devices operated by 
untrustworthy parties. DNS-based Authentication of Named Entities 
(DANE) is a protocol that securely associates domain names with 
cryptographic certificates and related security information so that 
they can't be fraudulently modified or replaced to breach the security 
of Internet exchanges. In spite of the dangers of failure to 
authenticate the identities of network devices, adoption of DNSSEC has 
been slow. Demonstration of DANE-supported applications such as 
reliably secure email may support increased user demand for domain name 
system security. Follow-on projects might include HTTPS, IOT, IPSEC 
keys in DNS, and DNS service discovery.
    The current project will demonstrate a proof of concept security 
platform composed of off the shelf components that provides trustworthy 
mail server-to-mail server email exchanges across organizational 
boundaries. The DANE protocol will be used to authenticate servers and 
certificates in two roles in the DNS-Based Security for Email Project: 
(1) By binding the X.509 certificates used for Transport Layer Security 
(TLS) to DNS names verified by DNSSEC and supporting the use of these 
certificates in the mail server-to-mail server communication; and (2) 
by binding the X.509 certificates used for Secure Secure/Multipurpose 
Internet Mail Extensions (S/MIME) to email addresses encoded as DNS 
names verified by DNSSEC. These bindings support trust in the use of S/
MIME certificates in the end-to-end email communication. The resulting 
building block will encrypt email traffic between servers, allow 
individual email users to digitally sign and/or encrypt email messages 
to other end users, and allow individual email users to obtain other 
users' certificates in order to validate signed email or send encrypted 
email. The project will include an email sending policy consistent with 
a stated privacy policy that can be parsed by receiving servers so that 
receiving servers can apply the correct security checks and report back 
the correctness of the email stream. Documentation of the resulting 
platform will include statements of the security and privacy policies 
and standards (e.g., Executive Orders, NIST standards and guidelines, 
IETF RFCs) supported, technical specifications for hardware and 
software, implementation requirements, and a mapping of implementation 
requirements to the applicable policies, standards, and best practices.
    The secure email project will involve composition of a variety of 
components that will be provided by a number of different vendors. 
Client systems, DNS/DNSSEC services, mail transfer agents, and 
certificate providers (CAs) are generally involved. Collaborators are 
being sought to provide components and expertise for DNS resolvers 
(stub and recursive) for DNSSEC, authoritative DNS servers for DNSSEC 
signed zones, mail servers and mail security components, extended 
validation and domain validation TLS certificates.
    This project will result in one or more demonstration prototype 
DNS-based secure email platforms, a publicly available NIST 
Cybersecurity Practice Guide that explains how to employ the 
platform(s) to meet security and privacy requirements, and platform 
documentation necessary to compose a DNS-based email security platform 
from off the shelf components.
    A detailed description of the Domain Name System-Based Security for 
Electronic Mail Building Block is available at: http://nccoe.nist.gov/DNSSecuredEmail.
    Requirements: Each responding organization's letter of interest 
should identify which security platform component(s) or capability(ies) 
it is offering. Letters of interest should not include company 
proprietary information, and all components and capabilities must be 
commercially available. Components are listed in section eight of the 
Domain Name System-Based Security for Electronic Mail Building Block 
description (for reference, please see the link in the PROCESS section 
above) and include, but are not limited to:

 Client systems
 DNS/DNSSEC services
 Mail transfer agents
 DNS resolvers (stub and recursive) for DNSSEC validation
 Authoritative DNS servers for DNSSEC signed zones
 Mail server/mail security systems
 S/MIME certificates
 Extended validation and domain validation TLS certificates

    Each responding organization's letter of interest should identify 
how their product(s) address one or more of the desired solution 
characteristics in section five of the Domain Name System-Based 
Security for Electronic Mail Building Block description (for reference, 
please see the link in the PROCESS section above).
    Additional details about the Domain Name System-Based Security for 
Electronic Mail Building Block are available at: http://nccoe.nist.gov/DNSSecuredEmail.
    NIST cannot guarantee that all of the products proposed by 
respondents will be used in the demonstration. Each prospective 
participant will be expected to work collaboratively with NIST staff 
and other project participants under the terms of the consortium CRADA 
in the development of the Domain Name System-Based Security for 
Electronic Mail Building Block. Prospective participants' contribution 
to the collaborative effort will include assistance in establishing the 
necessary interface functionality, connection and set-up capabilities 
and procedures, demonstration harnesses, environmental and safety 
conditions for use, integrated platform user instructions, and 
demonstration plans and scripts necessary to demonstrate the desired 
capabilities. Each participant will train NIST personnel, as necessary, 
to operate its product in capability demonstrations. Following 
successful demonstrations, NIST will publish a description of the 
security platform and its performance characteristics sufficient to 
permit other organizations to develop and deploy security platforms 
that meet the security objectives of the Domain Name System-Based 
Security for Electronic Mail Building Block. These descriptions will be 
public information.
    Under the terms of the consortium CRADA, participants will commit 
to providing:

1. Access for all participants' project teams to component interfaces 
and

[[Page 60365]]

the organization's experts necessary to make functional connections 
among security platform components
2. Support for development and demonstration of the Domain Name System-
Based Security for Electronic Mail Building Block in NCCoE facilities 
which will be conducted in a manner consistent with Federal 
requirements (e.g., FIPS 200, FIPS 201, SP 800-53, and SP 800-63)

    In addition, NIST will support development of interfaces among 
participants' products by providing IT infrastructure, laboratory 
facilities, office facilities, collaboration facilities, and staff 
support to component composition, security platform documentation, and 
demonstration activities.
    The dates of the demonstration of the Domain Name System-Based 
Security for Electronic Mail Building Block capability will be 
announced on the NCCoE Web site at least two weeks in advance at http://nccoe.nist.gov/. The expected outcome of the demonstration is to 
improve domain name system-based security for electronic mail within 
the enterprise. Participating organizations will gain from the 
knowledge that their products are interoperable with other 
participants' offerings.
    For additional information on the NCCoE governance, business 
processes, and NCCoE operational structure, visit the NCCoE Web site 
http://nccoe.nist.gov/.

Richard Cavanagh,
Acting Associate Director for Laboratory Programs.
[FR Doc. 2015-25304 Filed 10-5-15; 8:45 am]
BILLING CODE 3510-13-P