National Cybersecurity Center of Excellence (NCCoE) Data Integrity Building Block, 18504-18506 [2018-08829]

Download as PDF 18504 Federal Register / Vol. 83, No. 82 / Friday, April 27, 2018 / Notices The typical New Construction Program Participant Review Materials package will contain the following: 1. New Construction Program Quick Start Document. 2. New Construction Program User Guide. 3. New Construction Program Address List Template. 4. Geographic Update Partnership Software (GUPS). 5. New Construction Program Map PDFs (for geocoding purposes only). 6. New Construction Program spatial shapefiles (for geocoding purposes only). Participants must submit their New Construction Program address list to the Census Bureau within 45 calendar days of receipt of the New Construction Program materials. The New Construction Program addresses must be returned in the Census Bureau’s predefined format, and each address must be geocoded or assigned to the census tract and block in which it is located as shown on the New Construction Program PDF or digital (shapefile) maps. This stage will occur between August and September 2019. The average estimated time burden to add, review, and submit the New Construction Program address list to the Census Bureau is 47 hours per participant. New Construction Program Address Updates From September through November 2019, the Census Bureau will process all files received from participants. Files that are submitted in the proper format and with complete geocoding data are compared against the Census Bureau’s census address list, extracted from the MAF, to check for any addresses already on the list. The Census Bureau will add the addresses to the census address list and MAF, if needed, and mail decennial census forms to any participantsupplied addresses that were not already in the census address list. The census enumeration process will determine the final housing unit status and population for each unit. Closeout The Census Bureau provides a closeout letter to governments that registered to participate and provided updates as well as a thank you letter to governments that provided updates. Closeout occurs between December 2019 and January 2020. II. Method of Collection The Census Bureau will collect the New Construction Program participants’ contact information and product media preference when participants fill out the electronic or printed forms. To prepare and submit their list of new living quarters addresses, the New Construction Program participants can opt to receive: • GUPS with Census Bureau spatial data. • PDF maps. Participants may also use their own software to create a computer-readable list of addresses in the prescribed format. Participants will use the Census Bureau provided maps or spatial data as a reference for assigning census tract and block codes (geocodes) for each submitted address. III. Data OMB Control Number: 0607–XXXX. Form Number(s): NC_RForm_2020. Type of Review: Regular submission. Affected Public: Federally recognized tribes, states, local governments (counties, incorporated places, functioning minor civil divisions). Estimated Number of Respondents: Program Invitation: 32,000. Participant Material Review: 6,550. Estimated Time per Response: Program Invitation: 1 hour. Participant Material Review: 47 hours. Estimated Total Hour Burden: Program Invitation: 32,000 hours. Participant Material Review: 307,850 hours. Estimated Total Annual Burden Hours: 339,850 hours. Estimated number of respondents Stage of review Estimated time per response (hours) Total estimated hour burden Program Invitation ...................................................................................................... Participant Material Review ....................................................................................... 32,000 6,550 1 47 32,000 307,850 Total .................................................................................................................... .............................. .............................. 339,850 hours. Estimated Total Annual Cost to Public: $0. (This is not the cost of respondents’ time, but the indirect costs respondents may incur for such things as purchases of specialized software or hardware needed to report, or expenditures for accounting or records maintenance services required specifically by the collection.) Respondent’s Obligation: Voluntary. Legal Authority: Title 13, U.S.C., Section 141(a). daltland on DSKBBV9HB2PROD with NOTICES IV. Request for Comments Comments are invited on: (a) Whether the proposed collection of information is necessary for the proper performance of the functions of the agency, including whether the information shall have practical utility; (b) the accuracy of the agency’s estimate of the burden (including hours and cost) of the VerDate Sep<11>2014 18:18 Apr 26, 2018 Jkt 244001 proposed collection of information; (c) ways to enhance the quality, utility, and clarity of the information to be collected; and (d) ways to minimize the burden of the collection of information on respondents, including through the use of automated collection techniques or other forms of information technology. Comments submitted in response to this notice will be summarized and/or included in the request for OMB approval of this information collection; they also will become a matter of public record. Sheleen Dumas, Departmental Lead PRA Officer, Office of the Chief Information Officer. [FR Doc. 2018–08964 Filed 4–26–18; 8:45 am] BILLING CODE 3510–07–P PO 00000 Frm 00004 Fmt 4703 Sfmt 4703 DEPARTMENT OF COMMERCE National Institute of Standards and Technology [Docket No.: 180301235–8235–01] National Cybersecurity Center of Excellence (NCCoE) Data Integrity Building Block National Institute of Standards and Technology, Department of Commerce. ACTION: Notice. AGENCY: The National Institute of Standards and Technology (NIST) invites organizations to provide products and technical expertise to support and demonstrate security platforms for two data integrity projects within the Data Integrity Building Block. The two projects are (1) Data SUMMARY: E:\FR\FM\27APN1.SGM 27APN1 daltland on DSKBBV9HB2PROD with NOTICES Federal Register / Vol. 83, No. 82 / Friday, April 27, 2018 / Notices Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events and (2) Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events. This notice is the initial step for the National Cybersecurity Center of Excellence (NCCoE) in collaborating with technology companies to address cybersecurity challenges identified under the Data Integrity Building Block. Participation in the building block is open to all interested organizations and organizations may participate in one or both data integrity projects. DATES: Collaborative activities will commence as soon as enough completed and signed letters of interest have been returned to address all the necessary components and capabilities, but no earlier than May 29, 2018. ADDRESSES: The NCCoE is located at 9700 Great Seneca Highway, Rockville, MD 20850. Letters of interest must be submitted to di-nccoe@nist.gov or via hardcopy to National Institute of Standards and Technology, NCCoE; 9700 Great Seneca Highway, Rockville, MD 20850. Organizations whose letters of interest are accepted in accordance with the process set forth in the SUPPLEMENTARY INFORMATION section of this notice will be asked to sign a separate consortium Cooperative Research and Development Agreement (CRADA) with NIST for each Data Integrity Building Block project. An NCCoE consortium CRADA template can be found at: https://nccoe.nist.gov/ node/138. FOR FURTHER INFORMATION CONTACT: Timothy McBride via email to timothy.mcbride@nist.gov; by telephone 301–975–0214; or by mail to National Institute of Standards and Technology, NCCoE; 9700 Great Seneca Highway, Rockville, MD 20850. Additional details about the Data Integrity Building Block are available at https://nccoe.nist.gov/ projects/building-blocks/data-integrity. SUPPLEMENTARY INFORMATION: Interested parties must contact NIST to request a letter of interest template to be completed and submitted to NIST. Letters of interest will be accepted on a first come, first served basis. Parties interested in participating in both data integrity projects must submit a separate letter of interest for each data integrity project. When the building block has been completed, NIST will post a notice announcing the completion of the building block and informing the public that it will no longer accept letters of interest for this building block on the NCCoE Data Integrity Building Block website at https://nccoe.nist.gov/ projects/building-blocks/data-integrity/ VerDate Sep<11>2014 18:18 Apr 26, 2018 Jkt 244001 identify-protect for Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events, and at https:// nccoe.nist.gov/projects/building-blocks/ data-integrity/detect-respond for Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events. Background: The NCCoE, part of NIST, is a public-private collaboration for accelerating the widespread adoption of integrated cybersecurity tools and technologies. The NCCoE brings together experts from industry, government, and academia under one roof to develop practical, interoperable cybersecurity approaches that address the real-world needs of complex Information Technology (IT) systems. By accelerating dissemination and use of these integrated tools and technologies for protecting IT assets, the NCCoE will enhance trust in U.S. IT communications, data, and storage systems; reduce risk for companies and individuals using IT systems; and encourage development of innovative, job-creating cybersecurity products and services. Process: NIST is soliciting responses from all sources of relevant security capabilities (see below) to enter into a Cooperative Research and Development Agreement (CRADA) to provide products and technical expertise to support and demonstrate security platforms for the Data Integrity Building Block. The full building block can be viewed at: https://nccoe.nist.gov/ projects/building-blocks/data-integrity. Interested parties should contact NIST using the information provided in the FOR FURTHER INFORMATION CONTACT section of this notice. NIST will then provide each interested party with a letter of interest template, which the party must complete, certify that it is accurate, and submit to NIST. NIST will contact interested parties if there are questions regarding the responsiveness of the letters of interest to the building block objective or requirements identified below. NIST will select participants who have submitted complete letters of interest on a first come, first served basis within each category of product components or capabilities listed below up to the number of participants in each category necessary to carry out this building block. However, there may be continuing opportunity to participate even after initial activity commences. Selected participants will be required to enter into a consortium CRADA with NIST (for reference, see ADDRESSES section above). NIST published a notice in the Federal Register on October 19, PO 00000 Frm 00005 Fmt 4703 Sfmt 4703 18505 2012 (77 FR 64314) inviting U.S. companies to enter into National Cybersecurity Excellence Partnerships (NCEPs) in furtherance of the NCCoE. For this demonstration project, NCEP partners will not be given priority for participation. Building Block Objective: Establish tools and procedures to defend, detect, and respond to data integrity events. A detailed description of the Data Integrity Building Block is available at: https://nccoe.nist.gov/projects/buildingblocks/data-integrity. Requirements: Each responding organization’s letter of interest should identify which security platform component(s) or capability(ies) it is offering. Responding organizations must submit a separate letter of interest and sign a separate consortium CRADA for each project the responding organization is interested in joining. Letters of interest should not include company proprietary information, and all components and capabilities must be commercially available. Components are listed in section 3 of each of the data integrity projects (1) Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events, and (2) Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events (for reference, please see the link in the PROCESS section above) and include, but are not limited to: • For Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events: • Secure storage • File integrity checking mechanisms backup capability for databases, VMs, and file systems • Vulnerability management and identification software • Signature based vulnerability detection • Behavior based vulnerability detection • Zero-day vulnerability detection • Log collection software • Asset inventory software • Asset management • Asset discovery • Maintenance software (including software versioning and distribution technology) • Software versioning • Software distribution • Update verification • For Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events • Integrity monitoring • Event detection • Malicious software detection E:\FR\FM\27APN1.SGM 27APN1 daltland on DSKBBV9HB2PROD with NOTICES 18506 Federal Register / Vol. 83, No. 82 / Friday, April 27, 2018 / Notices • Unauthorized activity detection • Anomalous activity detection • Logging and data correlation software • Reporting capability • Vulnerability management • Forensics/analytics tools • Mitigation and containment software Each responding organization’s letter of interest should identify how their products address one or more of the following desired solution characteristics in section 3 of each of the Data Integrity projects (1) Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events, and (2) Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events (for reference, please see the link in the PROCESS section above): 1 For Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events: • Inventory assets both part of the enterprise and the solution itself • Be secure against integrity attacks against hosts • Be secure against integrity attacks that occur on the network • Support secure backups • Provide protected network and remote access • Provide audit capabilities 2 For Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events: • Detect unauthorized or malicious activity on the network • Detect unauthorized or malicious mobile code (such as web technologies like JavaScript, VBScript, and other code executed but loaded from an external site) • Detect unauthorized or malicious executables • Detect unauthorized or malicious behavior • Report unauthorized or malicious activity on the network • Report unauthorized or malicious mobile code events • Report unauthorized or malicious executables • Report unauthorized or malicious behavior • Analyze the impact of unauthorized or malicious activity on the network • Analyze the impact of unauthorized or malicious mobile code events • Analyze the impact of unauthorized or malicious executables • Analyze the impact of unauthorized or malicious behavior • Mitigate the impact of unauthorized or malicious activity on the network VerDate Sep<11>2014 18:18 Apr 26, 2018 Jkt 244001 • Mitigate the impact of unauthorized or malicious mobile code events • Mitigate the impact of unauthorized or malicious executables • Mitigate the impact of unauthorized or malicious behavior • Contain unauthorized or malicious activity on the network • Contain unauthorized or malicious mobile code events • Contain unauthorized or malicious executables • Contain unauthorized or malicious behavior Responding organizations need to understand and, in their letters of interest, commit to provide: 1. Access for all participants’ project teams to component interfaces and the organization’s experts necessary to make functional connections among security platform components 2. Support for development and demonstration of the Data Integrity Building Block in NCCoE facilities which will be conducted in a manner consistent with the following standards and guidance: FIPS 200, FIPS 201 (for the Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events Project), SP 800–53, FIPS 140–2, SP 800–37, SP 800–57, SP 800–61, SP 800–83, SP 800–150, SP 800–160, and SP 800–184. Additional details about the Data Integrity Building Block are available at: https://nccoe.nist.gov/projects/buildingblocks/data-integrity. NIST cannot guarantee that all of the products proposed by respondents will be used in the demonstration. Each prospective participant will be expected to work collaboratively with NIST staff and other project participants under the terms of the consortium CRADA in the development of the Data Integrity Building Block. Prospective participants’ contribution to the collaborative effort will include assistance in establishing the necessary interface functionality, connection and set-up capabilities and procedures, demonstration harnesses, environmental and safety conditions for use, integrated platform user instructions, and demonstration plans and scripts necessary to demonstrate the desired capabilities. Each participant will train NIST personnel, as necessary, to operate its product in capability demonstrations. Following successful demonstrations, NIST will publish a description of the security platform and its performance characteristics sufficient to permit other organizations to develop PO 00000 Frm 00006 Fmt 4703 Sfmt 4703 and deploy security platforms that meet the security objectives of the Data Integrity Building Block. These descriptions will be public information. Under the terms of the consortium CRADA, NIST will support development of interfaces among participants’ products by providing IT infrastructure, laboratory facilities, office facilities, collaboration facilities, and staff support to component composition, security platform documentation, and demonstration activities. The dates of the demonstration of the Data Integrity Building Block capability will be announced on the NCCoE website at least two weeks in advance at https://nccoe.nist.gov/. The expected outcome of the demonstration is to improve data integrity within the enterprise. Participating organizations will gain from the knowledge that their products are interoperable with other participants’ offerings. For additional information on the NCCoE governance, business processes, and NCCoE operational structure, visit the NCCoE website https://nccoe.nist. gov/. Kevin A. Kimball, Chief of Staff. [FR Doc. 2018–08829 Filed 4–26–18; 8:45 am] BILLING CODE 3510–13–P DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration (NOAA) National Sea Grant Advisory Board (NSGAB); Public Meeting of the National Sea Grant Advisory Board Office of Oceanic and Atmospheric Research (OAR), National Oceanic and Atmospheric Administration (NOAA), Department of Commerce (DOC). ACTION: Notice of public meeting. AGENCY: This notice sets forth the schedule and proposed agenda of a forthcoming meeting of the NSGAB. NSGAB members will discuss and provide advice on the National Sea Grant College Program (Sea Grant), specifically to review and approve the 2018 Biennial Report to Congress, and any other matters as described in the agenda found on the Sea Grant website at https://seagrant.noaa.gov/WhoWeAre/ Leadership/NationalSeaGrantAdvisory Board/UpcomingAdvisory BoardMeetings.aspx. DATES: The announced meeting is scheduled for Monday, May 14, 2018, from 3:00 p.m. to 4:30 p.m. ET. SUMMARY: E:\FR\FM\27APN1.SGM 27APN1

Agencies

[Federal Register Volume 83, Number 82 (Friday, April 27, 2018)]
[Notices]
[Pages 18504-18506]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2018-08829]


-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Institute of Standards and Technology

[Docket No.: 180301235-8235-01]


National Cybersecurity Center of Excellence (NCCoE) Data 
Integrity Building Block

AGENCY: National Institute of Standards and Technology, Department of 
Commerce.

ACTION: Notice.

-----------------------------------------------------------------------

SUMMARY: The National Institute of Standards and Technology (NIST) 
invites organizations to provide products and technical expertise to 
support and demonstrate security platforms for two data integrity 
projects within the Data Integrity Building Block. The two projects are 
(1) Data

[[Page 18505]]

Integrity: Identifying and Protecting Assets Against Ransomware and 
Other Destructive Events and (2) Data Integrity: Detecting and 
Responding to Ransomware and Other Destructive Events. This notice is 
the initial step for the National Cybersecurity Center of Excellence 
(NCCoE) in collaborating with technology companies to address 
cybersecurity challenges identified under the Data Integrity Building 
Block. Participation in the building block is open to all interested 
organizations and organizations may participate in one or both data 
integrity projects.

DATES: Collaborative activities will commence as soon as enough 
completed and signed letters of interest have been returned to address 
all the necessary components and capabilities, but no earlier than May 
29, 2018.

ADDRESSES: The NCCoE is located at 9700 Great Seneca Highway, 
Rockville, MD 20850. Letters of interest must be submitted to [email protected] or via hardcopy to National Institute of Standards and 
Technology, NCCoE; 9700 Great Seneca Highway, Rockville, MD 20850. 
Organizations whose letters of interest are accepted in accordance with 
the process set forth in the SUPPLEMENTARY INFORMATION section of this 
notice will be asked to sign a separate consortium Cooperative Research 
and Development Agreement (CRADA) with NIST for each Data Integrity 
Building Block project. An NCCoE consortium CRADA template can be found 
at: https://nccoe.nist.gov/node/138.

FOR FURTHER INFORMATION CONTACT: Timothy McBride via email to 
[email protected]; by telephone 301-975-0214; or by mail to 
National Institute of Standards and Technology, NCCoE; 9700 Great 
Seneca Highway, Rockville, MD 20850. Additional details about the Data 
Integrity Building Block are available at https://nccoe.nist.gov/projects/building-blocks/data-integrity.

SUPPLEMENTARY INFORMATION: Interested parties must contact NIST to 
request a letter of interest template to be completed and submitted to 
NIST. Letters of interest will be accepted on a first come, first 
served basis. Parties interested in participating in both data 
integrity projects must submit a separate letter of interest for each 
data integrity project. When the building block has been completed, 
NIST will post a notice announcing the completion of the building block 
and informing the public that it will no longer accept letters of 
interest for this building block on the NCCoE Data Integrity Building 
Block website at https://nccoe.nist.gov/projects/building-blocks/data-integrity/identify-protect for Data Integrity: Identifying and 
Protecting Assets Against Ransomware and Other Destructive Events, and 
at https://nccoe.nist.gov/projects/building-blocks/data-integrity/detect-respond for Data Integrity: Detecting and Responding to 
Ransomware and Other Destructive Events.
    Background: The NCCoE, part of NIST, is a public-private 
collaboration for accelerating the widespread adoption of integrated 
cybersecurity tools and technologies. The NCCoE brings together experts 
from industry, government, and academia under one roof to develop 
practical, interoperable cybersecurity approaches that address the 
real-world needs of complex Information Technology (IT) systems. By 
accelerating dissemination and use of these integrated tools and 
technologies for protecting IT assets, the NCCoE will enhance trust in 
U.S. IT communications, data, and storage systems; reduce risk for 
companies and individuals using IT systems; and encourage development 
of innovative, job-creating cybersecurity products and services.
    Process: NIST is soliciting responses from all sources of relevant 
security capabilities (see below) to enter into a Cooperative Research 
and Development Agreement (CRADA) to provide products and technical 
expertise to support and demonstrate security platforms for the Data 
Integrity Building Block. The full building block can be viewed at: 
https://nccoe.nist.gov/projects/building-blocks/data-integrity.
    Interested parties should contact NIST using the information 
provided in the FOR FURTHER INFORMATION CONTACT section of this notice. 
NIST will then provide each interested party with a letter of interest 
template, which the party must complete, certify that it is accurate, 
and submit to NIST. NIST will contact interested parties if there are 
questions regarding the responsiveness of the letters of interest to 
the building block objective or requirements identified below. NIST 
will select participants who have submitted complete letters of 
interest on a first come, first served basis within each category of 
product components or capabilities listed below up to the number of 
participants in each category necessary to carry out this building 
block. However, there may be continuing opportunity to participate even 
after initial activity commences. Selected participants will be 
required to enter into a consortium CRADA with NIST (for reference, see 
ADDRESSES section above). NIST published a notice in the Federal 
Register on October 19, 2012 (77 FR 64314) inviting U.S. companies to 
enter into National Cybersecurity Excellence Partnerships (NCEPs) in 
furtherance of the NCCoE. For this demonstration project, NCEP partners 
will not be given priority for participation.
    Building Block Objective: Establish tools and procedures to defend, 
detect, and respond to data integrity events.
    A detailed description of the Data Integrity Building Block is 
available at: https://nccoe.nist.gov/projects/building-blocks/data-integrity.
    Requirements: Each responding organization's letter of interest 
should identify which security platform component(s) or capability(ies) 
it is offering. Responding organizations must submit a separate letter 
of interest and sign a separate consortium CRADA for each project the 
responding organization is interested in joining. Letters of interest 
should not include company proprietary information, and all components 
and capabilities must be commercially available. Components are listed 
in section 3 of each of the data integrity projects (1) Data Integrity: 
Identifying and Protecting Assets Against Ransomware and Other 
Destructive Events, and (2) Data Integrity: Detecting and Responding to 
Ransomware and Other Destructive Events (for reference, please see the 
link in the PROCESS section above) and include, but are not limited to:

 For Data Integrity: Identifying and Protecting Assets Against 
Ransomware and Other Destructive Events:
     Secure storage
     File integrity checking mechanisms backup capability for 
databases, VMs, and file systems
     Vulnerability management and identification software
     Signature based vulnerability detection
     Behavior based vulnerability detection
     Zero-day vulnerability detection
     Log collection software
     Asset inventory software
     Asset management
     Asset discovery
     Maintenance software (including software versioning and 
distribution technology)
     Software versioning
     Software distribution
     Update verification
 For Data Integrity: Detecting and Responding to Ransomware and 
Other Destructive Events
     Integrity monitoring
     Event detection
     Malicious software detection

[[Page 18506]]

     Unauthorized activity detection
     Anomalous activity detection
     Logging and data correlation software
     Reporting capability
     Vulnerability management
     Forensics/analytics tools
     Mitigation and containment software
    Each responding organization's letter of interest should identify 
how their products address one or more of the following desired 
solution characteristics in section 3 of each of the Data Integrity 
projects (1) Data Integrity: Identifying and Protecting Assets Against 
Ransomware and Other Destructive Events, and (2) Data Integrity: 
Detecting and Responding to Ransomware and Other Destructive Events 
(for reference, please see the link in the PROCESS section above):

1 For Data Integrity: Identifying and Protecting Assets Against 
Ransomware and Other Destructive Events:
     Inventory assets both part of the enterprise and the 
solution itself
     Be secure against integrity attacks against hosts
     Be secure against integrity attacks that occur on the 
network
     Support secure backups
     Provide protected network and remote access
     Provide audit capabilities
2 For Data Integrity: Detecting and Responding to Ransomware and Other 
Destructive Events:
     Detect unauthorized or malicious activity on the network
     Detect unauthorized or malicious mobile code (such as web 
technologies like JavaScript, VBScript, and other code executed but 
loaded from an external site)
     Detect unauthorized or malicious executables
     Detect unauthorized or malicious behavior
     Report unauthorized or malicious activity on the network
     Report unauthorized or malicious mobile code events
     Report unauthorized or malicious executables
     Report unauthorized or malicious behavior
     Analyze the impact of unauthorized or malicious activity 
on the network
     Analyze the impact of unauthorized or malicious mobile 
code events
     Analyze the impact of unauthorized or malicious 
executables
     Analyze the impact of unauthorized or malicious behavior
     Mitigate the impact of unauthorized or malicious activity 
on the network
     Mitigate the impact of unauthorized or malicious mobile 
code events
     Mitigate the impact of unauthorized or malicious 
executables
     Mitigate the impact of unauthorized or malicious behavior
     Contain unauthorized or malicious activity on the network
     Contain unauthorized or malicious mobile code events
     Contain unauthorized or malicious executables
     Contain unauthorized or malicious behavior

    Responding organizations need to understand and, in their letters 
of interest, commit to provide:

1. Access for all participants' project teams to component interfaces 
and the organization's experts necessary to make functional connections 
among security platform components
2. Support for development and demonstration of the Data Integrity 
Building Block in NCCoE facilities which will be conducted in a manner 
consistent with the following standards and guidance: FIPS 200, FIPS 
201 (for the Data Integrity: Identifying and Protecting Assets Against 
Ransomware and Other Destructive Events Project), SP 800-53, FIPS 140-
2, SP 800-37, SP 800-57, SP 800-61, SP 800-83, SP 800-150, SP 800-160, 
and SP 800-184.

    Additional details about the Data Integrity Building Block are 
available at: https://nccoe.nist.gov/projects/building-blocks/data-integrity.
    NIST cannot guarantee that all of the products proposed by 
respondents will be used in the demonstration. Each prospective 
participant will be expected to work collaboratively with NIST staff 
and other project participants under the terms of the consortium CRADA 
in the development of the Data Integrity Building Block. Prospective 
participants' contribution to the collaborative effort will include 
assistance in establishing the necessary interface functionality, 
connection and set-up capabilities and procedures, demonstration 
harnesses, environmental and safety conditions for use, integrated 
platform user instructions, and demonstration plans and scripts 
necessary to demonstrate the desired capabilities. Each participant 
will train NIST personnel, as necessary, to operate its product in 
capability demonstrations. Following successful demonstrations, NIST 
will publish a description of the security platform and its performance 
characteristics sufficient to permit other organizations to develop and 
deploy security platforms that meet the security objectives of the Data 
Integrity Building Block. These descriptions will be public 
information.
    Under the terms of the consortium CRADA, NIST will support 
development of interfaces among participants' products by providing IT 
infrastructure, laboratory facilities, office facilities, collaboration 
facilities, and staff support to component composition, security 
platform documentation, and demonstration activities.
    The dates of the demonstration of the Data Integrity Building Block 
capability will be announced on the NCCoE website at least two weeks in 
advance at https://nccoe.nist.gov/. The expected outcome of the 
demonstration is to improve data integrity within the enterprise. 
Participating organizations will gain from the knowledge that their 
products are interoperable with other participants' offerings.
    For additional information on the NCCoE governance, business 
processes, and NCCoE operational structure, visit the NCCoE website 
https://nccoe.nist.gov/.

Kevin A. Kimball,
Chief of Staff.
[FR Doc. 2018-08829 Filed 4-26-18; 8:45 am]
 BILLING CODE 3510-13-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.