National Cybersecurity Center of Excellence (NCCoE) Data Confidentiality Building Block, 6144-6146 [2020-01993]

Download as PDF 6144 Federal Register / Vol. 85, No. 23 / Tuesday, February 4, 2020 / Notices advance notice prior to implementation of the inspection program.’’ 2 Scope of Agreement See Section I, Product Coverage, of the 2019 Suspension Agreement. khammond on DSKJM1Z7X2PROD with NOTICES Notification Consistent with the 2019 Suspension Agreement, this Federal Register notice provides 60 days’ advance notice prior to the implementation of the inspection program, which has been developed by USDA, in consultation with Commerce, as specified in the 2019 Suspension Agreement. The inspection program, as outlined in Section VII.C of the 2019 Suspension Agreement, will begin 60 days from the date of publication of this notice. Beginning 60 days from the date of publication of this notice, all Fresh Tomatoes from Mexico, with the exception of Tomatoes on the Vine, Specialty tomatoes, and grape tomatoes in retail packages of 2 pounds or less, shall be subject to a USDA inspection for quality and condition defects consistent with Section VII.C of the 2019 Suspension Agreement, and in accordance with USDA procedures as determined by USDA.3 (See Section II of the 2019 Suspension Agreement for definitions of certain terms in the preceding sentence.) As provided in the 2019 Suspension Agreement, importers of tomatoes subject to inspection must request the USDA inspection and pay the associated USDA fees.4 USDA will perform inspections (an unrestricted certification) in accordance with its normal practice to determine quality, condition, and grade pursuant to the appropriate USDA standard covering fresh tomatoes and greenhouse tomatoes and using shipping point tolerances.5 After the USDA inspection, the importer will receive an inspection certificate, which must be maintained by the importer and is subject to submission to, and verification by, Commerce, consistent with the importer’s contractual obligation with the Signatory.6 If a lot of Signatory tomatoes has more defects than the tolerances established in the USDA standards, then the importer may opt either to 2 See Section VII.C.1 of the 2019 Suspension Agreement. 3 For avoidance of doubt, all loads of Fresh Tomatoes from Mexico that are inspected pursuant to a USDA marketing order are not required to also be inspected pursuant to the inspection program under this section VII.C. See id. 4 See Section VII.C.2 of the 2019 Suspension Agreement. 5 See Section VII.C.3 of the 2019 Suspension Agreement. 6 See Section VII.C.4 of the 2019 Suspension Agreement. VerDate Sep<11>2014 19:47 Feb 03, 2020 Jkt 250001 recondition and re-inspect the lot, or return it to Mexico, consistent with the requirements of the 2019 Suspension Agreement.7 Dated: January 30, 2020. Jeffrey I. Kessler, Assistant Secretary for Enforcement and Compliance. [FR Doc. 2020–02166 Filed 2–3–20; 8:45 am] BILLING CODE 3510–DS–P DEPARTMENT OF COMMERCE National Institute of Standards and Technology [Docket No.: 200113–0015] National Cybersecurity Center of Excellence (NCCoE) Data Confidentiality Building Block National Institute of Standards and Technology, Department of Commerce. ACTION: Notice. AGENCY: The National Institute of Standards and Technology (NIST) invites organizations to provide products and technical expertise to support and demonstrate security platforms for two data confidentiality projects within the Data Confidentiality Building Block. The two projects are Data Confidentiality: Identifying and Protecting Assets and Data Against Data Breaches and Data Confidentiality: Detect, Respond to, and Recover from Data Breaches. This notice is the initial step for the National Cybersecurity Center of Excellence (NCCoE) in collaborating with technology companies to address cybersecurity challenges identified under the Data Confidentiality Building Block. Participation in the building block is open to all interested organizations and organizations may participate in one or both data Confidentiality projects. DATES: Interested parties must contact NIST to request a letter of interest template to be completed and submitted to NIST. Letters of interest will be accepted on a first come, first served basis. Parties interested in participating in both data confidentiality projects must submit a separate letter of interest for each data confidentiality project. Collaborative activities will commence as soon as enough completed and signed letters of interest have been returned to address all the necessary components and capabilities, but no earlier than March 5, 2020. When the building block has been completed, NIST will post a SUMMARY: 7 See PO 00000 id. Frm 00004 Fmt 4703 Sfmt 4703 notice announcing the completion of the building block and informing the public that it will no longer accept letters of interest for this building block on the NCCoE Data Confidentiality Building Block website at https:// www.nccoe.nist.gov/projects/buildingblocks/data-security/dc-detect-identifyprotect_forDataConfidentiality: Identifying and Protecting Assets and Data Against Data Breaches, and at https://www.nccoe.nist.gov/projects/ building-blocks/data-security/dc-detectrespond-recoverfor_DataConfidentiality: Detect, Respond to and Recover from Data Breaches. ADDRESSES: The NCCoE is located at 9700 Great Seneca Highway, Rockville, MD 20850. Letters of interest must be submitted to ds-nccoe@nist.gov or via hardcopy to National Institute of Standards and Technology, NCCoE; 9700 Great Seneca Highway, Rockville, MD 20850. Organizations whose letters of interest are accepted in accordance with the process set forth in the SUPPLEMENTARY INFORMATION section of this notice will be asked to sign a separate consortium Cooperative Research and Development Agreement (CRADA) with NIST for each Data Confidentiality Building Block project. An NCCoE consortium CRADA template can be found at: https://nccoe.nist.gov/ node/138. FOR FURTHER INFORMATION CONTACT: Jennifer Cawthra via email to Jennifer.Cawthra@nist.gov; by telephone 240.328.4584; or by mail to National Institute of Standards and Technology, NCCoE; 9700 Great Seneca Highway, Rockville, MD 20850. Additional details about the Data Confidentiality Building Block are available at https:// www.nccoe.nist.gov/projects/buildingblocks/data-security. SUPPLEMENTARY INFORMATION: Background: The NCCoE, part of NIST, is a public-private collaboration for accelerating the widespread adoption of integrated cybersecurity tools and technologies. The NCCoE brings together experts from industry, government, and academia under one roof to develop practical, interoperable cybersecurity approaches that address the real-world needs of complex Information Technology (IT) systems. By accelerating dissemination and use of these integrated tools and technologies for protecting IT assets, the NCCoE will enhance trust in U.S. IT communications, data, and storage systems; reduce risk for companies and individuals using IT systems; and encourage development of innovative, job-creating cybersecurity products and services. E:\FR\FM\04FEN1.SGM 04FEN1 Federal Register / Vol. 85, No. 23 / Tuesday, February 4, 2020 / Notices Process: NIST is soliciting responses from all sources of relevant security capabilities (see below) to enter into a Cooperative Research and Development Agreement (CRADA) to provide products and technical expertise to support and demonstrate security platforms for the Data Confidentiality Building Block. The full building block can be viewed at: https:// www.nccoe.nist.gov/projects/buildingblocks/data-security. Interested parties should contact NIST using the information provided in the khammond on DSKJM1Z7X2PROD with NOTICES FOR FURTHER INFORMATION CONTACT section of this notice. NIST will then provide each interested party with a letter of interest template, which the party must complete, certify that it is accurate, and submit to NIST. NIST will contact interested parties if there are questions regarding the responsiveness of the letters of interest to the building block objective or requirements identified below. NIST will select participants who have submitted complete letters of interest on a first come, first served basis within each category of product components or capabilities listed below up to the number of participants in each category necessary to carry out this building block. However, there may be continuing opportunity to participate even after initial activity commences. Selected participants will be required to enter into a consortium CRADA with NIST (for reference, see ADDRESSES section above). NIST published a notice in the Federal Register on October 19, 2012 (77 FR 64314) inviting U.S. companies to enter into National Cybersecurity Excellence Partnerships (NCEPs) in furtherance of the NCCoE. For this demonstration project, NCEP partners will not be given priority for participation. Building Block Objective: Establish tools and procedures to defend, detect, and respond to data confidentiality events. A detailed description of the Data Confidentiality Building Block is available at: https://www.nccoe.nist.gov/ projects/building-blocks/data-security. Requirements: Each responding organization’s letter of interest should identify which security platform component(s) or capability(ies) it is offering. Responding organizations must submit a separate letter of interest and sign a separate consortium CRADA for each project the responding organization is interested in joining. Letters of interest should not include company proprietary information, and all components and capabilities must be commercially available. Components are listed in section 3 of each of the data VerDate Sep<11>2014 17:48 Feb 03, 2020 Jkt 250001 confidentiality projects (1) Data Confidentiality: Identifying and Protecting Assets and Data Against Data Breaches, and (2) Data Confidentiality: Detect, and Respond to, and Recover from Data Breaches. (for reference, please see the link in the PROCESS section above) and include, but are not limited to: • For Data Confidentiality: Identifying and Protecting Assets and Data Against Data Breaches: • Log collection, collation, and correlation • Network protection solution • Network mapping • Network segmentation • Network protection • Browser isolation • User access controls • Data management • Data discovery • Data inventory • Data protection • Protection at rest * Including file- and system-level encryption • Protection in transit • Protection in use • Protection against the use of removable media • Policy enforcement • For Data Confidentiality: Detect, and Respond to and Recover from Data Breaches: • Monitoring • File • Network • Users • Event detection • Exfiltration activity • Unauthorized activity • Anomalous activity • Log collection, collation, and correlation of all activities within the enterprise • Reporting capability • Capability to mitigate data loss Each responding organization’s letter of interest should identify how their products address one or more of the following desired solution characteristics in section 3 of each of the Data Confidentiality projects (1) Data Confidentiality: Identifying and Protecting Assets and Data Against Data Breaches, and (2) Data Confidentiality: Detect, Respond to, and Recover from Data Breaches (for reference, please see the link in the PROCESS section above): 1. For Data Confidentiality: Identifying and Protecting Assets and Data Against Data Breaches: • Identify and inventory data and data flows. • Protect against confidentiality attacks on hosts. • Protect against confidentiality attacks that occur on the network. PO 00000 Frm 00005 Fmt 4703 Sfmt 4703 6145 • Protect against confidentiality attacks that occur on enterprise components. • Protect enterprise data at rest, in transit, and in use. • Protect the network and remote access capabilities. • Provide logging and audit capabilities. • Provide user access controls to data. • Provide user authentication mechanisms. 2. For Data Confidentiality: Detect, Respond to, and Recover from Data Breaches: • Monitor the enterprise’s user and data activity. • Detect unauthorized data flows, user behavior, and data access. • Report unauthorized activity with respect to users and data in transit, at rest, or in use to centralized monitoring and reporting software. • Analyze the impact of unauthorized behavior and malicious behavior on the network or end points. Determine if a loss of data confidentiality is occurring or has occurred. • Mitigate the impact of such losses of data confidentiality by facilitating an effective response to a data breach scenario. • Contain the effects of a data breach so that more data is not exposed. • Facilitate the recovery effort from data breaches by providing detailed information as to the scope and severity of the breach. Responding organizations need to understand and, in their letters of interest, commit to provide: 1. Access for all participants’ project teams to component interfaces and the organization’s experts necessary to make functional connections among security platform components 2. Support for development and demonstration of the Data Confidentiality Building Block in NCCoE facilities which will be conducted in a manner consistent with the following standards and guidance: FIPS 200, FIPS 201, SP 800–53, FIPS 140–2, SP 800–37, SP 800–57, SP 800– 61, SP 800–83, SP 800–150, SP 800–160, and SP 800–184. Additional details about the Data Confidentiality Building Block are available at: https://nccoe.nist.gov/ projects/building-blocks/data-security. NIST cannot guarantee that all of the products proposed by respondents will be used in the demonstration. Each prospective participant will be expected to work collaboratively with NIST staff and other project participants under the terms of the consortium CRADA in the development of the Data Confidentiality Building Block. Prospective E:\FR\FM\04FEN1.SGM 04FEN1 6146 Federal Register / Vol. 85, No. 23 / Tuesday, February 4, 2020 / Notices participants’ contribution to the collaborative effort will include assistance in establishing the necessary interface functionality, connection and set-up capabilities and procedures, demonstration harnesses, environmental and safety conditions for use, integrated platform user instructions, and demonstration plans and scripts necessary to demonstrate the desired capabilities. Each participant will train NIST personnel, as necessary, to operate its product in capability demonstrations. Following successful demonstrations, NIST will publish a description of the security platform and its performance characteristics sufficient to permit other organizations to develop and deploy security platforms that meet the security objectives of the Data Confidentiality Building Block. These descriptions will be public information. Under the terms of the consortium CRADA, NIST will support development of interfaces among participants’ products by providing IT infrastructure, laboratory facilities, office facilities, collaboration facilities, and staff support to component composition, security platform documentation, and demonstration activities. The dates of the demonstration of the Data Confidentiality Building Block capability will be announced on the NCCoE website at least two weeks in advance at https://nccoe.nist.gov/. The expected outcome of the demonstration is to improve data integrity within the enterprise. Participating organizations will gain from the knowledge that their products are interoperable with other participants’ offerings. For additional information on the NCCoE governance, business processes, and NCCoE operational structure, visit the NCCoE website https:// nccoe.nist.gov/. Kevin A. Kimball, Chief of Staff. [FR Doc. 2020–01993 Filed 2–3–20; 8:45 am] BILLING CODE 3510–13–P DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration khammond on DSKJM1Z7X2PROD with NOTICES [RTID 0648–XR094] Marine Mammals; Issuance of Permits National Marine Fisheries Service (NMFS), National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice; issuance of permits. AGENCY: VerDate Sep<11>2014 17:48 Feb 03, 2020 Jkt 250001 Notice is hereby given that individuals and institutions have been issued Letters of Confirmation for activities conducted under the General Authorization for Scientific Research on marine mammals. See SUPPLEMENTARY INFORMATION for a list of names and address of recipients. ADDRESSES: The Letters of Confirmation and related documents are available for review upon written request or by appointment in the following office: Permits and Conservation Division, Office of Protected Resources, NMFS, 1315 East-West Highway, Room 13705, Silver Spring, MD 20910; phone (301) 427–8401; fax (301) 713–0376. FOR FURTHER INFORMATION CONTACT: Office of Protected Resources, Permits and Conservation Division, (301) 427– 8401. SUMMARY: The requested Letters of Confirmation have been issued under the authority of the Marine Mammal Protection Act of 1972, as amended (16 U.S.C. 1361 et seq.), and the regulations governing the taking and importing of marine mammals (50 CFR part 216). The General Authorization allows for bona fide scientific research that may result only in taking by Level B harassment of marine mammals. The following Letters of Confirmation (LOC) were issued in Fiscal Year 2019 (October 1, 2018–September 30, 2019). File No. 21910: Issued to California Wildlife Center (Principal Investigator: Jennifer Brent), 26026 Pimma Road, Calabassas, CA 91302, on October 1, 2018, to obtain baseline data on marine mammal health and populations in remote areas of Malibu to better aid future studies on ocean stock health and to identify previously unreported cases of human interaction and previously tagged animal migration. This work specifically targets the U.S. stock of California sea lion (Zalophus californianus), the California breeding stock of northern elephant seal (Mirounga angustirostris), and the California stock of harbor seal (Phoca vitulina). The LOC expires on September 30, 2023. File No. 19826–03: Issued to Deanna Rees, Naval Undersea Warfare Center, Division Newport, 1176 Howell Street, Newport, RI 02841, on November 1, 2018, to conduct surveys of gray (Halichoerus grypus atlantica) (Western North Atlantic stock), harbor (Western North Atlantic stock), and harp (Pagophilus groenlandicus) (Western North Atlantic stock) seals in the northeast. The amended LOC adds aerial surveys of pinnipeds via vertical take-off and landing unmanned aircraft SUPPLEMENTARY INFORMATION: PO 00000 Frm 00006 Fmt 4703 Sfmt 4703 systems (UAS). The LOC expires on January 31, 2021. File No. 22198–01: Issued to Samuel Wasser, Ph.D., Center for Conservation Biology, University of Washington, Seattle, WA 98195, on November 21, 2018, extended the expiration date of the LOC for one year. Research activities include vessel surveys targeting killer whales (Orcinus orca, West Coast Transient stock) within the inland waters of Washington State. The objectives do not change from those previously authorized under LOC No. 22198. The amended LOC clarifies the expiration date relative to the effective date of new Permit No. 22141 (84 FR 22111, May 16, 2019); the LOC subsequently expired on April 30, 2019. File No. 18218–03: Issued to Dolphin Research Center, (Principal Investigator: Armando Rodriguez), 58763 Overseas Highway, Grassy Key, FL 33050, on November 29, 2018, extended the expiration date of the LOC for one year. The research includes close approach, photo-identification, behavioral observations, passive acoustics, and focal follows of coastal and bottlenose dolphins (Tursiops truncatus) (Florida Bay Stock) in coastal waters of the middle Florida Keys. The objectives do not change from those previously authorized under LOC No.18218–02. The LOC was subsequently terminated on February 5, 2019, when a new LOC (No. 22587, see below) was issued to Dolphin Research Center. File No. 22081: Issued to Institute for Marine Mammal Studies (Principal Investigator: Mobashir Solangi, Ph.D.), P.O. Box 207, Gulfport, MS 39502, on December 3, 2018, to study cetaceans during vessel and aerial surveys using photo-identification, behavioral observations, photography, filming, and passive acoustic recordings. Research may occur from Lake Borgne, Louisiana to the Alabama/Mississippi state line, including Mississippi, Chandeleur, and Breton Sounds and adjacent waters. The target species is bottlenose dolphins; however research would also occur if any of the following species were observed: Atlantic spotted dolphin (Stenella frontalis), pantropical spotted dolphin (S. attenuata), spinner dolphin (S. longirostris), and pygmy sperm whale (Kogia breviceps). The LOC expires on December 1, 2023. File No. 22587: Issued to Dolphin Research Center (Principal Investigator: Armando Rodriguez), 58763 Overseas Highway, Grassy Key, FL 33050, on February 5, 2019 to continue vessel surveys for close approach, photoidentification, behavioral observations, passive acoustics, and focal follows of E:\FR\FM\04FEN1.SGM 04FEN1

Agencies

[Federal Register Volume 85, Number 23 (Tuesday, February 4, 2020)]
[Notices]
[Pages 6144-6146]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2020-01993]


-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Institute of Standards and Technology

[Docket No.: 200113-0015]


National Cybersecurity Center of Excellence (NCCoE) Data 
Confidentiality Building Block

AGENCY: National Institute of Standards and Technology, Department of 
Commerce.

ACTION: Notice.

-----------------------------------------------------------------------

SUMMARY: The National Institute of Standards and Technology (NIST) 
invites organizations to provide products and technical expertise to 
support and demonstrate security platforms for two data confidentiality 
projects within the Data Confidentiality Building Block. The two 
projects are Data Confidentiality: Identifying and Protecting Assets 
and Data Against Data Breaches and Data Confidentiality: Detect, 
Respond to, and Recover from Data Breaches. This notice is the initial 
step for the National Cybersecurity Center of Excellence (NCCoE) in 
collaborating with technology companies to address cybersecurity 
challenges identified under the Data Confidentiality Building Block. 
Participation in the building block is open to all interested 
organizations and organizations may participate in one or both data 
Confidentiality projects.

DATES: Interested parties must contact NIST to request a letter of 
interest template to be completed and submitted to NIST. Letters of 
interest will be accepted on a first come, first served basis. Parties 
interested in participating in both data confidentiality projects must 
submit a separate letter of interest for each data confidentiality 
project. Collaborative activities will commence as soon as enough 
completed and signed letters of interest have been returned to address 
all the necessary components and capabilities, but no earlier than 
March 5, 2020. When the building block has been completed, NIST will 
post a notice announcing the completion of the building block and 
informing the public that it will no longer accept letters of interest 
for this building block on the NCCoE Data Confidentiality Building 
Block website at https://www.nccoe.nist.gov/projects/building-blocks/data-security/dc-detect-identify-protect_forDataConfidentiality: 
Identifying and Protecting Assets and Data Against Data Breaches, and 
at https://www.nccoe.nist.gov/projects/building-blocks/data-security/dc-detect-respond-recoverfor_DataConfidentiality: Detect, Respond to 
and Recover from Data Breaches.

ADDRESSES: The NCCoE is located at 9700 Great Seneca Highway, 
Rockville, MD 20850. Letters of interest must be submitted to [email protected] or via hardcopy to National Institute of Standards and 
Technology, NCCoE; 9700 Great Seneca Highway, Rockville, MD 20850. 
Organizations whose letters of interest are accepted in accordance with 
the process set forth in the SUPPLEMENTARY INFORMATION section of this 
notice will be asked to sign a separate consortium Cooperative Research 
and Development Agreement (CRADA) with NIST for each Data 
Confidentiality Building Block project. An NCCoE consortium CRADA 
template can be found at: https://nccoe.nist.gov/node/138.

FOR FURTHER INFORMATION CONTACT: Jennifer Cawthra via email to 
[email protected]; by telephone 240.328.4584; or by mail to 
National Institute of Standards and Technology, NCCoE; 9700 Great 
Seneca Highway, Rockville, MD 20850. Additional details about the Data 
Confidentiality Building Block are available at https://www.nccoe.nist.gov/projects/building-blocks/data-security.

SUPPLEMENTARY INFORMATION: 
    Background: The NCCoE, part of NIST, is a public-private 
collaboration for accelerating the widespread adoption of integrated 
cybersecurity tools and technologies. The NCCoE brings together experts 
from industry, government, and academia under one roof to develop 
practical, interoperable cybersecurity approaches that address the 
real-world needs of complex Information Technology (IT) systems. By 
accelerating dissemination and use of these integrated tools and 
technologies for protecting IT assets, the NCCoE will enhance trust in 
U.S. IT communications, data, and storage systems; reduce risk for 
companies and individuals using IT systems; and encourage development 
of innovative, job-creating cybersecurity products and services.

[[Page 6145]]

    Process: NIST is soliciting responses from all sources of relevant 
security capabilities (see below) to enter into a Cooperative Research 
and Development Agreement (CRADA) to provide products and technical 
expertise to support and demonstrate security platforms for the Data 
Confidentiality Building Block. The full building block can be viewed 
at: https://www.nccoe.nist.gov/projects/building-blocks/data-security.
    Interested parties should contact NIST using the information 
provided in the FOR FURTHER INFORMATION CONTACT section of this notice. 
NIST will then provide each interested party with a letter of interest 
template, which the party must complete, certify that it is accurate, 
and submit to NIST. NIST will contact interested parties if there are 
questions regarding the responsiveness of the letters of interest to 
the building block objective or requirements identified below. NIST 
will select participants who have submitted complete letters of 
interest on a first come, first served basis within each category of 
product components or capabilities listed below up to the number of 
participants in each category necessary to carry out this building 
block. However, there may be continuing opportunity to participate even 
after initial activity commences. Selected participants will be 
required to enter into a consortium CRADA with NIST (for reference, see 
ADDRESSES section above). NIST published a notice in the Federal 
Register on October 19, 2012 (77 FR 64314) inviting U.S. companies to 
enter into National Cybersecurity Excellence Partnerships (NCEPs) in 
furtherance of the NCCoE. For this demonstration project, NCEP partners 
will not be given priority for participation.
    Building Block Objective: Establish tools and procedures to defend, 
detect, and respond to data confidentiality events.
    A detailed description of the Data Confidentiality Building Block 
is available at: https://www.nccoe.nist.gov/projects/building-blocks/data-security.
    Requirements: Each responding organization's letter of interest 
should identify which security platform component(s) or capability(ies) 
it is offering. Responding organizations must submit a separate letter 
of interest and sign a separate consortium CRADA for each project the 
responding organization is interested in joining. Letters of interest 
should not include company proprietary information, and all components 
and capabilities must be commercially available. Components are listed 
in section 3 of each of the data confidentiality projects (1) Data 
Confidentiality: Identifying and Protecting Assets and Data Against 
Data Breaches, and (2) Data Confidentiality: Detect, and Respond to, 
and Recover from Data Breaches. (for reference, please see the link in 
the PROCESS section above) and include, but are not limited to:
     For Data Confidentiality: Identifying and Protecting 
Assets and Data Against Data Breaches:

 Log collection, collation, and correlation
 Network protection solution
 Network mapping
 Network segmentation
 Network protection
 Browser isolation
 User access controls
 Data management
 Data discovery
 Data inventory
 Data protection
 Protection at rest
* Including file- and system-level encryption
 Protection in transit
 Protection in use
 Protection against the use of removable media
 Policy enforcement
 For Data Confidentiality: Detect, and Respond to and Recover 
from Data Breaches:
 Monitoring
 File
 Network
 Users
 Event detection
 Exfiltration activity
 Unauthorized activity
 Anomalous activity
 Log collection, collation, and correlation of all activities 
within the enterprise
 Reporting capability
 Capability to mitigate data loss
    Each responding organization's letter of interest should identify 
how their products address one or more of the following desired 
solution characteristics in section 3 of each of the Data 
Confidentiality projects (1) Data Confidentiality: Identifying and 
Protecting Assets and Data Against Data Breaches, and (2) Data 
Confidentiality: Detect, Respond to, and Recover from Data Breaches 
(for reference, please see the link in the PROCESS section above):
    1. For Data Confidentiality: Identifying and Protecting Assets and 
Data Against Data Breaches:
     Identify and inventory data and data flows.
     Protect against confidentiality attacks on hosts.
     Protect against confidentiality attacks that occur on the 
network.
     Protect against confidentiality attacks that occur on 
enterprise components.
     Protect enterprise data at rest, in transit, and in use.
     Protect the network and remote access capabilities.
     Provide logging and audit capabilities.
     Provide user access controls to data.
     Provide user authentication mechanisms.
    2. For Data Confidentiality: Detect, Respond to, and Recover from 
Data Breaches:
     Monitor the enterprise's user and data activity.
     Detect unauthorized data flows, user behavior, and data 
access.
     Report unauthorized activity with respect to users and 
data in transit, at rest, or in use to centralized monitoring and 
reporting software.
     Analyze the impact of unauthorized behavior and malicious 
behavior on the network or end points. Determine if a loss of data 
confidentiality is occurring or has occurred.
     Mitigate the impact of such losses of data confidentiality 
by facilitating an effective response to a data breach scenario.
     Contain the effects of a data breach so that more data is 
not exposed.
     Facilitate the recovery effort from data breaches by 
providing detailed information as to the scope and severity of the 
breach.
    Responding organizations need to understand and, in their letters 
of interest, commit to provide:
    1. Access for all participants' project teams to component 
interfaces and the organization's experts necessary to make functional 
connections among security platform components
    2. Support for development and demonstration of the Data 
Confidentiality Building Block in NCCoE facilities which will be 
conducted in a manner consistent with the following standards and 
guidance: FIPS 200, FIPS 201, SP 800-53, FIPS 140-2, SP 800-37, SP 800-
57, SP 800-61, SP 800-83, SP 800-150, SP 800-160, and SP 800-184.
    Additional details about the Data Confidentiality Building Block 
are available at: https://nccoe.nist.gov/projects/building-blocks/data-security.
    NIST cannot guarantee that all of the products proposed by 
respondents will be used in the demonstration. Each prospective 
participant will be expected to work collaboratively with NIST staff 
and other project participants under the terms of the consortium CRADA 
in the development of the Data Confidentiality Building Block. 
Prospective

[[Page 6146]]

participants' contribution to the collaborative effort will include 
assistance in establishing the necessary interface functionality, 
connection and set-up capabilities and procedures, demonstration 
harnesses, environmental and safety conditions for use, integrated 
platform user instructions, and demonstration plans and scripts 
necessary to demonstrate the desired capabilities. Each participant 
will train NIST personnel, as necessary, to operate its product in 
capability demonstrations. Following successful demonstrations, NIST 
will publish a description of the security platform and its performance 
characteristics sufficient to permit other organizations to develop and 
deploy security platforms that meet the security objectives of the Data 
Confidentiality Building Block. These descriptions will be public 
information.
    Under the terms of the consortium CRADA, NIST will support 
development of interfaces among participants' products by providing IT 
infrastructure, laboratory facilities, office facilities, collaboration 
facilities, and staff support to component composition, security 
platform documentation, and demonstration activities.
    The dates of the demonstration of the Data Confidentiality Building 
Block capability will be announced on the NCCoE website at least two 
weeks in advance at https://nccoe.nist.gov/. The expected outcome of the 
demonstration is to improve data integrity within the enterprise. 
Participating organizations will gain from the knowledge that their 
products are interoperable with other participants' offerings.
    For additional information on the NCCoE governance, business 
processes, and NCCoE operational structure, visit the NCCoE website 
https://nccoe.nist.gov/.

Kevin A. Kimball,
Chief of Staff.
[FR Doc. 2020-01993 Filed 2-3-20; 8:45 am]
 BILLING CODE 3510-13-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.