National Cybersecurity Center of Excellence (NCCoE) Data Classification Practices: Facilitating Data-Centric Security Management, 56252-56254 [2021-21979]
Download as PDF
jspears on DSK121TN23PROD with NOTICES1
56252
Federal Register / Vol. 86, No. 193 / Friday, October 8, 2021 / Notices
to assemble’’ (RTA) wooden cabinets
and vanities, also commonly known as
‘‘flat packs,’’ except to the extent such
merchandise is already covered by the
scope of antidumping and
countervailing duty orders on
Hardwood Plywood from the People’s
Republic of China. See Certain
Hardwood Plywood Products from the
People’s Republic of China: Amended
Final Determination of Sales at Less
Than Fair Value, and Antidumping
Duty Order, 83 FR 504 (January 4, 2018);
Certain Hardwood Plywood Products
from the People’s Republic of China:
Countervailing Duty Order, 83 FR 513
(January 4, 2018). RTA wooden cabinets
and vanities are defined as cabinets or
vanities packaged so that at the time of
importation they may include: (1)
Wooden components required to
assemble a cabinet or vanity (including
drawer faces and doors); and (2) parts
(e.g., screws, washers, dowels, nails,
handles, knobs, adhesive glues) required
to assemble a cabinet or vanity. RTAs
may enter the United States in one or in
multiple packages.
Subject merchandise also includes
wooden cabinets and vanities and inscope components that have been
further processed in a third country,
including but not limited to one or more
of the following: Trimming, cutting,
notching, punching, drilling, painting,
staining, finishing, assembly, or any
other processing that would not
otherwise remove the merchandise from
the scope of the Order if performed in
the country of manufacture of the inscope product.
Excluded from the scope of this
Order, if entered separate from a
wooden cabinet or vanity are:
(1) Aftermarket accessory items which
may be added to or installed into an
interior of a cabinet and which are not
considered a structural or core
component of a wooden cabinet or
vanity. Aftermarket accessory items may
be made of wood, metal, plastic,
composite material, or a combination
thereof that can be inserted into a
cabinet and which are utilized in the
function of organization/accessibility on
the interior of a cabinet; and include:
• Inserts or dividers which are placed
into drawer boxes with the purpose of
organizing or dividing the internal
portion of the drawer into multiple
areas for the purpose of containing
smaller items such as cutlery, utensils,
bathroom essentials, etc.
• Round or oblong inserts that rotate
internally in a cabinet for the purpose
of accessibility to foodstuffs, dishware,
general supplies, etc.
(2) Solid wooden accessories
including corbels and rosettes, which
VerDate Sep<11>2014
17:07 Oct 07, 2021
Jkt 256001
serve the primary purpose of decoration
and personalization.
(3) Non-wooden cabinet hardware
components including metal hinges,
brackets, catches, locks, drawer slides,
fasteners (nails, screws, tacks, staples),
handles, and knobs.
(4) Medicine cabinets that meet all of
the following five criteria are excluded
from the scope: (1) Wall mounted; (2)
assembled at the time of entry into the
United States; (3) contain one or more
mirrors; (4) be packaged for retail sale at
time of entry; and (5) have a maximum
depth of seven inches.
Also excluded from the scope of the
Order are:
(1) All products covered by the scope
of the antidumping duty order on
Wooden Bedroom Furniture from the
People’s Republic of China. See Notice
of Amended Final Determination of
Sales at Less Than Fair Value and
Antidumping Duty Order: Wooden
Bedroom Furniture from the People’s
Republic of China, 70 FR 329 (January
4, 2005).
(2) All products covered by the scope
of the antidumping and countervailing
duty orders on Hardwood Plywood from
the People’s Republic of China. See
Certain Hardwood Plywood Products
from the People’s Republic of China:
Amended Final Determination of Sales
at Less Than Fair Value, and
Antidumping Duty Order, 83 FR 504
(January 4, 2018); Certain Hardwood
Plywood Products from the People’s
Republic of China: Countervailing Duty
Order, 83 FR 513 (January 4, 2018).
Imports of subject merchandise are
classified under Harmonized Tariff
Schedule of the United States (HTSUS)
statistical numbers 9403.40.9060 and
9403.60.8081. The subject component
parts of wooden cabinets and vanities
may be entered into the United States
under HTSUS statistical number
9403.90.7080. Although the HTSUS
subheadings are provided for
convenience and customs purposes, the
written description of the scope of this
Order is dispositive.
Final Results of the Antidumping Duty
Changed Circumstances Review
For the reasons stated in the Initiation
and Preliminary Results, and because
we received no comments from
interested parties, Commerce continues
to find that Goldenhome is the
successor-in-interest to Xiamen
Goldenhome for AD purposes. As a
result of this determination, we
determine that Goldenhome should
receive the AD cash deposit rate
applicable to Xiamen Goldenhome.
Consequently, Commerce will instruct
U.S. Customs and Border Protection to
PO 00000
Frm 00014
Fmt 4703
Sfmt 4703
suspend liquidation of all shipments of
subject merchandise exported by
Goldenhome and entered, or withdrawn
from warehouse, for consumption on or
after the publication date of this notice
in the Federal Register at the current
AD cash-deposit rate applicable to
Xiamen Goldenhome.3 This cash
deposit requirement shall remain in
effect until further notice.
Notification to Interested Parties
This notice is published in
accordance with sections 751(b)(1) and
777(i) of the Act, and 19 CFR 351.216(e)
and 351.221(c)(3).
Dated: October 4, 2021.
Christian Marsh,
Acting Assistant Secretary for Enforcement
and Compliance.
[FR Doc. 2021–22031 Filed 10–7–21; 8:45 am]
BILLING CODE 3510–DS–P
DEPARTMENT OF COMMERCE
National Institute of Standards and
Technology
[Docket No. 210915–0187]
National Cybersecurity Center of
Excellence (NCCoE) Data
Classification Practices: Facilitating
Data-Centric Security Management
National Institute of Standards
and Technology, Department of
Commerce.
ACTION: Notice.
AGENCY:
The National Institute of
Standards and Technology (NIST)
invites organizations to provide letters
of interest describing products and
technical expertise to support and
demonstrate security platforms for the
Data Classification Practices:
Facilitating Data-Centric Security
Management project. This notice is the
initial step for the National
Cybersecurity Center of Excellence
(NCCoE) in collaborating with
technology companies to address
cybersecurity challenges identified
under the Data Classification Practices:
Facilitating Data-Centric Security
Management project. Participation in
the project is open to all interested
organizations.
SUMMARY:
Collaborative activities will
commence as soon as enough completed
and signed letters of interest have been
returned to address all the necessary
components and capabilities, but no
earlier than November 8, 2021.
DATES:
3 See
E:\FR\FM\08OCN1.SGM
Order, 85 FR at 22127.
08OCN1
Federal Register / Vol. 86, No. 193 / Friday, October 8, 2021 / Notices
The NCCoE is located at
9700 Great Seneca Highway, Rockville,
MD 20850. Letters of interest must be
submitted to data-nccoe@nist.gov or via
hardcopy to National Institute of
Standards and Technology, NCCoE;
9700 Great Seneca Highway, Rockville,
MD 20850. Interested parties can access
the letter of interest template by visiting
https://www.nccoe.nist.gov/projects/
building-blocks/data-classification and
completing the letter of interest
webform. NIST will announce the
completion of the selection of
participants and inform the public that
it is no longer accepting letters of
interest for this project at https://
www.nccoe.nist.gov/projects/buildingblocks/data-classification.
Organizations whose letters of interest
are accepted will be asked to sign a
consortium Cooperative Research and
Development Agreement (CRADA) with
NIST. An NCCoE consortium CRADA
template can be found at: https://
nccoe.nist.gov/library/nccoeconsortium-crada-example.
FOR FURTHER INFORMATION CONTACT:
William Newhouse via telephone at
301–975–0232; by email to data-nccoe@
nist.gov; or by mail to National Institute
of Standards and Technology, NCCoE;
9700 Great Seneca Highway, Rockville,
MD 20850. Additional details about the
Data Classification Practices:
Facilitating Data-Centric Security
Management project are available at
https://www.nccoe.nist.gov/projects/
building-blocks/data-classification.
SUPPLEMENTARY INFORMATION:
Background: The NCCoE, part of
NIST, is a public-private collaboration
for accelerating the widespread
adoption of integrated cybersecurity
tools and technologies. The NCCoE
brings together experts from industry,
government, and academia under one
roof to develop practical, interoperable
cybersecurity approaches that address
the real-world needs of complex
Information Technology (IT) systems.
By accelerating dissemination and use
of these integrated tools and
technologies for protecting IT assets, the
NCCoE will enhance trust in U.S. IT
communications, data, and storage
systems; reduce risk for companies and
individuals using IT systems; and
encourage development of innovative,
job-creating cybersecurity products and
services.
Process: NIST is soliciting responses
from all sources of relevant security
capabilities (see below) to enter into a
Cooperative Research and Development
Agreement (CRADA) to provide
products and technical expertise to
support and demonstrate security
jspears on DSK121TN23PROD with NOTICES1
ADDRESSES:
VerDate Sep<11>2014
17:07 Oct 07, 2021
Jkt 256001
platforms for the Data Classification
Practices: Facilitating Data-Centric
Security Management project. The full
project can be viewed at: https://
www.nccoe.nist.gov/projects/buildingblocks/data-classification.
Interested parties can access the
template for a letter of interest by
visiting the project website at https://
www.nccoe.nist.gov/projects/buildingblocks/data-classification and
completing the letter of interest
webform. On completion of the
webform, interested parties will receive
access to the letter of interest template,
which the party must complete, certify
as accurate, and submit to NIST by
email or hardcopy. NIST will contact
interested parties if there are questions
regarding the responsiveness of the
letters of interest to the project objective
or requirements identified below. NIST
will select participants who have
submitted complete letters of interest on
a first come, first served basis within
each category of product components or
capabilities listed below up to the
number of participants in each category
necessary to carry out this project.
When the project has been completed,
NIST will post a notice on the Data
Classification Practices: Facilitating
Data-Centric Security Management
project website at https://
www.nccoe.nist.gov/projects/buildingblocks/data-classification announcing
the completion of the project and
informing the public that it will no
longer accept letters of interest for this
project. Completed letters of interest
should be submitted to NIST and will be
accepted on a first come, first served
basis. There may be continuing
opportunity to participate even after
initial activity commences for
participants who were not selected
initially or have submitted the letter of
interest after the selection process.
Selected participants will be required to
enter into a consortium CRADA with
NIST (for reference, see ADDRESSES
section above).
Project Objective: Data-centric
security management aims to enhance
protection of information (data)
regardless of where the data resides or
with whom it is shared. This requires
that organizations know what data they
have, what its characteristics are, and
what security and privacy requirements
it needs to meet so the necessary
protections can be achieved.
Standardized mechanisms for
communicating data characteristics and
protection requirements are needed to
support zero trust architectures by
making data-centric security
management feasible at scale.
PO 00000
Frm 00015
Fmt 4703
Sfmt 4703
56253
The project’s objective is to develop
technology-agnostic recommended
practices for defining data
classifications and data handling
rulesets and for communicating them to
others. This project will inform, and
may identify opportunities to improve,
existing cybersecurity and privacy risk
management processes by helping with
communicating data classifications and
data handling rulesets. It will not
replace current risk management
practices, laws, regulations, or
mandates. The project will define the
approach for the solution, independent
of the supporting technologies, services,
architectures, operational environments,
etc. As part of this, a proof-of-concept
implementation of the defined approach
will be attempted. The proof-of-concept
will include limited data discovery,
analysis, classification, and labeling
capabilities, as well as a rudimentary
method for expressing how data with a
particular label should be handled for
each use case scenario. In support of
this phase of the project, basic
terminology and concepts will be
defined based on existing practices and
guidance to provide a common language
for discussing data classification. The
proposed proof-of-concept solution(s)
will integrate commercial and open
source products that leverage
cybersecurity standards and
recommended practices to demonstrate
the use case scenarios detailed in the
Data Classification Practices:
Facilitating Data-Centric Security
Management project description
available at: https://www.nccoe.nist.gov/
projects/building-blocks/dataclassification. This project will result in
a publicly available NIST Cybersecurity
Practice Guide as a Special Publication
1800 series, a detailed implementation
guide of the practical steps needed to
implement a cybersecurity reference
design that addresses this challenge.
Requirements for Letters of Interest:
Each responding organization’s letter of
interest should identify which security
platform component(s) or capability(ies)
it is offering. Letters of interest should
not include company proprietary
information, and all components and
capabilities must be commercially
available. Components are listed in
section 3 of the Data Classification
Practices: Facilitating Data-Centric
Security Management project
description at https://
www.nccoe.nist.gov/projects/buildingblocks/data-classification and include,
but are not limited to:
Core Components:
• Endpoints:
Æ Client Devices—Various PCs
(desktops or laptops) and mobile
E:\FR\FM\08OCN1.SGM
08OCN1
jspears on DSK121TN23PROD with NOTICES1
56254
Federal Register / Vol. 86, No. 193 / Friday, October 8, 2021 / Notices
devices will be involved in data
creation, storage, transmission,
retention, and destruction, as well as
data-centric security management. Some
client devices will be managed by the
organization. Some will be used by the
organization’s employees, while others
will be used by people from other
organizations.
Æ Client Device Apps—The client
devices will have commercial-off-theshelf (COTS) apps used for data
lifecycle activities, such as word
processing software and email client
software.
Æ Additional Devices—Examples of
additional types of devices that could be
utilized are networked printers and
Internet of Things (IoT) devices.
• Network/Infrastructure Devices—
The architecture will include devices
such as firewalls, routers, or switches
that are needed for network
functionality and network traffic
restriction, as well as the software for
managing those devices.
• Services and Applications—The
architecture will include several types
of services and applications that are
involved in data lifecycle activities for
one or more of the scenarios. The
following are examples of possible
service and application types:
Æ Enterprise Services/Applications:
Email, collaboration, file sharing, web
conferencing, file/data backup, code
repositories, content management
systems.
Æ Data Services/Applications: Data
processing, data analytics, artificial
intelligence/machine learning services.
Æ Business Services/Applications: A
variety of system-to-system and humanto-system business applications, both
COTS and custom-written, including
those that produce and/or consume
data.
• Data Classification Solutions—The
architecture will include several types
of components used to perform data
classification responsibilities, such as
data discovery, inventory, analysis,
classification, and labeling.
Each responding organization’s letter
of interest should identify how its
products help address one or more of
the following desired security
characteristics and properties in section
3 of the Data Classification Practices:
Facilitating Data-Centric Security
Management at https://
www.nccoe.nist.gov/projects/buildingblocks/data-classification:
• All data is discovered and analyzed
to determine how it should be
classified.
• All data classification and data
handling ruleset creation, modification,
and deletion is restricted to authorized
VerDate Sep<11>2014
17:07 Oct 07, 2021
Jkt 256001
personnel only, with all actions logged
and auditable and with all
communications protected.
• For all data classifications and data
handling rulesets, there is a mechanism
for verifying the integrity of the policy
or ruleset.
• Data classification labels or tags are
assigned to all data.
• For all data classification labels or
tags assigned to data, there is a
mechanism for verifying the integrity of
the label or tag.
In their letters of interest, responding
organizations need to acknowledge the
importance of and commit to provide:
1. Access for all participants’ project
teams to component interfaces and the
organization’s experts necessary to make
functional connections among security
platform components.
2. Support for development and
demonstration of the Data Classification
Practices: Facilitating Data-Centric
Security Management project, which
will be conducted in a manner
consistent with the following standards
and guidance: FIPS 199, NISTIR 8112,
FIPS 200, SP 800–37, SP 800–53, SP
800–60, SP 800–63, SP 800–154, SP
800–171, SP 800–207, the NIST
Cybersecurity Framework, and the NIST
Privacy Framework.
Additional details about the Data
Classification Practices: Facilitating
Data-Centric Security Management
project are available at https://
www.nccoe.nist.gov/projects/buildingblocks/data-classification.
NIST cannot guarantee that all of the
products proposed by respondents will
be used in the demonstration. Each
prospective participant will be expected
to work collaboratively with NIST staff
and other project participants under the
terms of the consortium CRADA in the
development of the Data Classification
Practices: Facilitating Data-Centric
Security Management project.
Prospective participants’ contribution to
the collaborative effort will include
assistance in establishing the necessary
interface functionality, connection and
set-up capabilities and procedures,
demonstration harnesses, environmental
and safety conditions for use, integrated
platform user instructions, and
demonstration plans and scripts
necessary to demonstrate the desired
capabilities. Each participant will train
NIST personnel, as necessary, to operate
its product in capability
demonstrations. Following successful
demonstrations, NIST will publish a
description of the security platform and
its performance characteristics sufficient
to permit other organizations to develop
and deploy security platforms that meet
the security objectives of the Data
PO 00000
Frm 00016
Fmt 4703
Sfmt 4703
Classification Practices: Facilitating
Data-Centric Security Management
project. These descriptions will be
public information.
Under the terms of the consortium
CRADA, NIST will support
development of interfaces among
participants’ products by providing IT
infrastructure, laboratory facilities,
office facilities, collaboration facilities,
and staff support to component
composition, security platform
documentation, and demonstration
activities.
The dates of the demonstration of the
Data Classification Practices:
Facilitating Data-Centric Security
Management project capability will be
announced on the NCCoE website at
least two weeks in advance at https://
nccoe.nist.gov/. The expected outcome
will demonstrate how the components
of the Data Classification Practices:
Facilitating Data-Centric Security
Management project architecture can
provide security capabilities to mitigate
identified risks related to data
throughout its lifecycle. Participating
organizations will gain from the
knowledge that their products are
interoperable with other participants’
offerings.
For additional information on the
NCCoE governance, business processes,
and NCCoE operational structure, visit
the NCCoE website https://
nccoe.nist.gov/.
Alicia Chambers,
NIST Executive Secretariat.
[FR Doc. 2021–21979 Filed 10–7–21; 8:45 am]
BILLING CODE 3510–13–P
DEPARTMENT OF COMMERCE
National Oceanic and Atmospheric
Administration
[RTID 0648–XB403]
Fisheries of the Caribbean, Gulf of
Mexico, and South Atlantic; Exempted
Fishing Permit
National Marine Fisheries
Service (NMFS), National Oceanic and
Atmospheric Administration (NOAA),
Commerce.
ACTION: Notice of receipt of an
application for an exempted fishing
permit; request for comments.
AGENCY:
NMFS announces the receipt
of an application for an exempted
fishing permit (EFP) from Dr. Matthew
Ajermian of Harbor Branch
Oceanographic Institute of Florida
Atlantic University (FAU). If granted,
the EFP would authorize the captain
SUMMARY:
E:\FR\FM\08OCN1.SGM
08OCN1
Agencies
[Federal Register Volume 86, Number 193 (Friday, October 8, 2021)]
[Notices]
[Pages 56252-56254]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2021-21979]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
National Institute of Standards and Technology
[Docket No. 210915-0187]
National Cybersecurity Center of Excellence (NCCoE) Data
Classification Practices: Facilitating Data-Centric Security Management
AGENCY: National Institute of Standards and Technology, Department of
Commerce.
ACTION: Notice.
-----------------------------------------------------------------------
SUMMARY: The National Institute of Standards and Technology (NIST)
invites organizations to provide letters of interest describing
products and technical expertise to support and demonstrate security
platforms for the Data Classification Practices: Facilitating Data-
Centric Security Management project. This notice is the initial step
for the National Cybersecurity Center of Excellence (NCCoE) in
collaborating with technology companies to address cybersecurity
challenges identified under the Data Classification Practices:
Facilitating Data-Centric Security Management project. Participation in
the project is open to all interested organizations.
DATES: Collaborative activities will commence as soon as enough
completed and signed letters of interest have been returned to address
all the necessary components and capabilities, but no earlier than
November 8, 2021.
[[Page 56253]]
ADDRESSES: The NCCoE is located at 9700 Great Seneca Highway,
Rockville, MD 20850. Letters of interest must be submitted to [email protected] or via hardcopy to National Institute of Standards and
Technology, NCCoE; 9700 Great Seneca Highway, Rockville, MD 20850.
Interested parties can access the letter of interest template by
visiting https://www.nccoe.nist.gov/projects/building-blocks/data-classification and completing the letter of interest webform. NIST will
announce the completion of the selection of participants and inform the
public that it is no longer accepting letters of interest for this
project at https://www.nccoe.nist.gov/projects/building-blocks/data-classification. Organizations whose letters of interest are accepted
will be asked to sign a consortium Cooperative Research and Development
Agreement (CRADA) with NIST. An NCCoE consortium CRADA template can be
found at: https://nccoe.nist.gov/library/nccoe-consortium-crada-example.
FOR FURTHER INFORMATION CONTACT: William Newhouse via telephone at 301-
975-0232; by email to [email protected]; or by mail to National
Institute of Standards and Technology, NCCoE; 9700 Great Seneca
Highway, Rockville, MD 20850. Additional details about the Data
Classification Practices: Facilitating Data-Centric Security Management
project are available at https://www.nccoe.nist.gov/projects/building-blocks/data-classification.
SUPPLEMENTARY INFORMATION:
Background: The NCCoE, part of NIST, is a public-private
collaboration for accelerating the widespread adoption of integrated
cybersecurity tools and technologies. The NCCoE brings together experts
from industry, government, and academia under one roof to develop
practical, interoperable cybersecurity approaches that address the
real-world needs of complex Information Technology (IT) systems. By
accelerating dissemination and use of these integrated tools and
technologies for protecting IT assets, the NCCoE will enhance trust in
U.S. IT communications, data, and storage systems; reduce risk for
companies and individuals using IT systems; and encourage development
of innovative, job-creating cybersecurity products and services.
Process: NIST is soliciting responses from all sources of relevant
security capabilities (see below) to enter into a Cooperative Research
and Development Agreement (CRADA) to provide products and technical
expertise to support and demonstrate security platforms for the Data
Classification Practices: Facilitating Data-Centric Security Management
project. The full project can be viewed at: https://www.nccoe.nist.gov/projects/building-blocks/data-classification.
Interested parties can access the template for a letter of interest
by visiting the project website at https://www.nccoe.nist.gov/projects/building-blocks/data-classification and completing the letter of
interest webform. On completion of the webform, interested parties will
receive access to the letter of interest template, which the party must
complete, certify as accurate, and submit to NIST by email or hardcopy.
NIST will contact interested parties if there are questions regarding
the responsiveness of the letters of interest to the project objective
or requirements identified below. NIST will select participants who
have submitted complete letters of interest on a first come, first
served basis within each category of product components or capabilities
listed below up to the number of participants in each category
necessary to carry out this project. When the project has been
completed, NIST will post a notice on the Data Classification
Practices: Facilitating Data-Centric Security Management project
website at https://www.nccoe.nist.gov/projects/building-blocks/data-classification announcing the completion of the project and informing
the public that it will no longer accept letters of interest for this
project. Completed letters of interest should be submitted to NIST and
will be accepted on a first come, first served basis. There may be
continuing opportunity to participate even after initial activity
commences for participants who were not selected initially or have
submitted the letter of interest after the selection process. Selected
participants will be required to enter into a consortium CRADA with
NIST (for reference, see ADDRESSES section above).
Project Objective: Data-centric security management aims to enhance
protection of information (data) regardless of where the data resides
or with whom it is shared. This requires that organizations know what
data they have, what its characteristics are, and what security and
privacy requirements it needs to meet so the necessary protections can
be achieved. Standardized mechanisms for communicating data
characteristics and protection requirements are needed to support zero
trust architectures by making data-centric security management feasible
at scale.
The project's objective is to develop technology-agnostic
recommended practices for defining data classifications and data
handling rulesets and for communicating them to others. This project
will inform, and may identify opportunities to improve, existing
cybersecurity and privacy risk management processes by helping with
communicating data classifications and data handling rulesets. It will
not replace current risk management practices, laws, regulations, or
mandates. The project will define the approach for the solution,
independent of the supporting technologies, services, architectures,
operational environments, etc. As part of this, a proof-of-concept
implementation of the defined approach will be attempted. The proof-of-
concept will include limited data discovery, analysis, classification,
and labeling capabilities, as well as a rudimentary method for
expressing how data with a particular label should be handled for each
use case scenario. In support of this phase of the project, basic
terminology and concepts will be defined based on existing practices
and guidance to provide a common language for discussing data
classification. The proposed proof-of-concept solution(s) will
integrate commercial and open source products that leverage
cybersecurity standards and recommended practices to demonstrate the
use case scenarios detailed in the Data Classification Practices:
Facilitating Data-Centric Security Management project description
available at: https://www.nccoe.nist.gov/projects/building-blocks/data-classification. This project will result in a publicly available NIST
Cybersecurity Practice Guide as a Special Publication 1800 series, a
detailed implementation guide of the practical steps needed to
implement a cybersecurity reference design that addresses this
challenge.
Requirements for Letters of Interest: Each responding
organization's letter of interest should identify which security
platform component(s) or capability(ies) it is offering. Letters of
interest should not include company proprietary information, and all
components and capabilities must be commercially available. Components
are listed in section 3 of the Data Classification Practices:
Facilitating Data-Centric Security Management project description at
https://www.nccoe.nist.gov/projects/building-blocks/data-classification
and include, but are not limited to:
Core Components:
Endpoints:
[cir] Client Devices--Various PCs (desktops or laptops) and mobile
[[Page 56254]]
devices will be involved in data creation, storage, transmission,
retention, and destruction, as well as data-centric security
management. Some client devices will be managed by the organization.
Some will be used by the organization's employees, while others will be
used by people from other organizations.
[cir] Client Device Apps--The client devices will have commercial-
off-the-shelf (COTS) apps used for data lifecycle activities, such as
word processing software and email client software.
[cir] Additional Devices--Examples of additional types of devices
that could be utilized are networked printers and Internet of Things
(IoT) devices.
Network/Infrastructure Devices--The architecture will
include devices such as firewalls, routers, or switches that are needed
for network functionality and network traffic restriction, as well as
the software for managing those devices.
Services and Applications--The architecture will include
several types of services and applications that are involved in data
lifecycle activities for one or more of the scenarios. The following
are examples of possible service and application types:
[cir] Enterprise Services/Applications: Email, collaboration, file
sharing, web conferencing, file/data backup, code repositories, content
management systems.
[cir] Data Services/Applications: Data processing, data analytics,
artificial intelligence/machine learning services.
[cir] Business Services/Applications: A variety of system-to-system
and human-to-system business applications, both COTS and custom-
written, including those that produce and/or consume data.
Data Classification Solutions--The architecture will
include several types of components used to perform data classification
responsibilities, such as data discovery, inventory, analysis,
classification, and labeling.
Each responding organization's letter of interest should identify
how its products help address one or more of the following desired
security characteristics and properties in section 3 of the Data
Classification Practices: Facilitating Data-Centric Security Management
at https://www.nccoe.nist.gov/projects/building-blocks/data-classification:
All data is discovered and analyzed to determine how it
should be classified.
All data classification and data handling ruleset
creation, modification, and deletion is restricted to authorized
personnel only, with all actions logged and auditable and with all
communications protected.
For all data classifications and data handling rulesets,
there is a mechanism for verifying the integrity of the policy or
ruleset.
Data classification labels or tags are assigned to all
data.
For all data classification labels or tags assigned to
data, there is a mechanism for verifying the integrity of the label or
tag.
In their letters of interest, responding organizations need to
acknowledge the importance of and commit to provide:
1. Access for all participants' project teams to component
interfaces and the organization's experts necessary to make functional
connections among security platform components.
2. Support for development and demonstration of the Data
Classification Practices: Facilitating Data-Centric Security Management
project, which will be conducted in a manner consistent with the
following standards and guidance: FIPS 199, NISTIR 8112, FIPS 200, SP
800-37, SP 800-53, SP 800-60, SP 800-63, SP 800-154, SP 800-171, SP
800-207, the NIST Cybersecurity Framework, and the NIST Privacy
Framework.
Additional details about the Data Classification Practices:
Facilitating Data-Centric Security Management project are available at
https://www.nccoe.nist.gov/projects/building-blocks/data-classification.
NIST cannot guarantee that all of the products proposed by
respondents will be used in the demonstration. Each prospective
participant will be expected to work collaboratively with NIST staff
and other project participants under the terms of the consortium CRADA
in the development of the Data Classification Practices: Facilitating
Data-Centric Security Management project. Prospective participants'
contribution to the collaborative effort will include assistance in
establishing the necessary interface functionality, connection and set-
up capabilities and procedures, demonstration harnesses, environmental
and safety conditions for use, integrated platform user instructions,
and demonstration plans and scripts necessary to demonstrate the
desired capabilities. Each participant will train NIST personnel, as
necessary, to operate its product in capability demonstrations.
Following successful demonstrations, NIST will publish a description of
the security platform and its performance characteristics sufficient to
permit other organizations to develop and deploy security platforms
that meet the security objectives of the Data Classification Practices:
Facilitating Data-Centric Security Management project. These
descriptions will be public information.
Under the terms of the consortium CRADA, NIST will support
development of interfaces among participants' products by providing IT
infrastructure, laboratory facilities, office facilities, collaboration
facilities, and staff support to component composition, security
platform documentation, and demonstration activities.
The dates of the demonstration of the Data Classification
Practices: Facilitating Data-Centric Security Management project
capability will be announced on the NCCoE website at least two weeks in
advance at https://nccoe.nist.gov/. The expected outcome will
demonstrate how the components of the Data Classification Practices:
Facilitating Data-Centric Security Management project architecture can
provide security capabilities to mitigate identified risks related to
data throughout its lifecycle. Participating organizations will gain
from the knowledge that their products are interoperable with other
participants' offerings.
For additional information on the NCCoE governance, business
processes, and NCCoE operational structure, visit the NCCoE website
https://nccoe.nist.gov/.
Alicia Chambers,
NIST Executive Secretariat.
[FR Doc. 2021-21979 Filed 10-7-21; 8:45 am]
BILLING CODE 3510-13-P