Managing Data Privacy through the NIST Privacy Framework
The NIST Privacy Framework is a voluntary tool developed by the National Institute of Standards and Technology (“Privacy Framework,” 2018). When creating the NIST Privacy Framework, lessons learned from the creation of the NIST Framework for Improving Critical Infrastructure Cybersecurity were followed (National Institute of Standards and Technology, 2018). Where the NIST Cybersecurity Framework is focused on improvements to national and commercial security, the NIST Privacy Framework is focused on ensuring the ethical processing of privacy-related data.
The NIST Privacy Framework is composed of three primary systems which mirror the general structure of the NIST Cybersecurity Framework. The first system is “Core” which provides activities for an organization to accomplish to achieve specific privacy outcomes. Each outcome is associated to a subcategory based on a one-to-one mapping feature. The second system is the “Profile.” This system provides an overview of the organization’s privacy activities as a tracking mechanism to understand the drive towards desired outcomes. This also allows for iterative improvements and metrics collections. The final system is the Implementation Tier. This system provides a holistic view for the health of the system with regards to risk tolerance and business resource allocation. By combining these systems into a single program, organizations can provide improved data handling while ensuring regulatory compliance across all business functions which handle privacy data (“Privacy Framework,” 2018).
NIST seeks to accomplish three primary goals. NIST looks to build customer trust through allowing for decision making that supports an ethical perspective with regards to the product or service being offered while minimizing individual and societal privacy harms. NIST seeks to meet compliance obligations now and in the future both with the existing framework and by publishing updates such as metadata specification documents that allow for greater specificity in data collection (Grassi et al., 2018). Finally, the NIST framework is oriented towards improving privacy communications with all stakeholders internal and external to the organization.
Trust can provide a competitive advantage and most Americans believe they are being tracked by companies online regularly. In fact, six-in-ten adults believe that it is impossible to not be tracked by a company or government in a given day (Turner, 2019).
The NIST Privacy Framework utilizes a five-step process in the Core stage to accomplish the framework requirements which are defined by the Profile stage. The Identify step focuses on developing an understanding of risk for the organization when processing privacy data. The Govern step allows for development of the structures required to mitigate privacy data processing risks. The Control step is focused on ensuring data management requirements are sufficiently defined to mitigate data privacy risks. The Communicate step focuses on training and socialization of risk to others. Finally, the Protect step focuses on ensuring that the data itself is protected through security controls. By applying each step sequentially and with all categories, a privacy profile for the business can be created (“Privacy Framework,” 2018).
Using the Tier stage, the overall maturity of each core function can be set relative to the organization’s risk profile. Tier 1 is the “Partial” tier where a given function is only partially implemented due to a high risk tolerance and lack of understanding of the risk. Tier 2 is the “Risk Informed” tier where a function is partly implemented and the business understands the risks of maintaining it incomplete. Tier 3 describes a system where the function is implemented and sufficiently rigorous to be repeatable. Tier 4 describes an adaptive response where the function can cover numerous permutations of the risk as it captures many hypothetical scenarios (“Privacy Framework,” 2018). Overall, it is critical to the business to decide what level of maturity is required for each function.
The NIST Privacy Framework comes with benefits and drawbacks. NIST provides an adaptive methodology that is meant to be updated over time as opposed to the less adaptable FIPS system developed by the US government (Hiller & Russell, 2015). Additionally, the NIST Privacy Framework has been found to improve privacy during data breaches through restricting privacy inferences (Landis & Kroll, 2024). One drawback is that the NIST Privacy Framework is a completely decentralized and non-mandatory approach to privacy. However, some argue that this may make it more resilient as there is no driving law behind it which must be updated to make changes to the framework itself (Hiller & Russell, 2015). Overall, the NIST Privacy Framework is a strong, adaptable framework that is highly recommended for use in privacy protection schemes.
The below figure provides an implementation of the NIST Privacy Framework to our organization. Each core function is rated to the most applicable tier of control maturity. Each core function is also fully mapped to a profile that presents how our organization handles this measure. Specific tools are provided where applicable.
Core Function and Category |
Profile |
Identify |
|
Inventory and Mapping – Tier 3 |
|
Perform inventory of data processing systems |
Use Service Now for maintaining formal configuration
control of all IT assets including data processing servers. Utilize Wiz.io
Cloud Identity Entitlements Manager to control access to data processing
roles. Use Datadog Application Performance Monitor to monitor all services
associated with data collection and align to requirements in internal
engineering documentation. Record data inputs and outputs in data map created
in Wiz Data Governance Tool |
Business Environment – Tier 3 |
|
Identify organization's roles in data processing |
Conduct review of data map and ensure each major section
of data map aligns to organizational role. Review mission with stakeholders
and discuss if data governance policies align to mission. List systems and
rank on a scale of 1-5 graded against criticality in support of
organizational priorities |
Risk Assessment – Tier 4 |
|
Provide context for the necessity of data collection
systems |
Perform data mapping exercise and maintain map under
configuration management. Review map with executive leadership quarterly.
Perform cyber risk assessment with Information Security team once per year. |
Data Processing Ecosystem Risk Management – Tier 3 |
|
Socialize and accept policies for ecosystem risk
management |
Maintain registry of stakeholders across business
functions. Perform yearly review with stakeholders. External stakeholders
shall be maintained under contract with contracts reviewed by Legal
department every 2 years. |
Govern |
|
Governance Policies, Processes, and Procedures – Tier 3 |
|
Define organizational privacy values and instill them |
Our organization values honor, courage, and commitment.
We ensure all data collections are accomplished honestly and honorably. We
empower our employees to have the courage to report misuse of data. We are
committed to our customer privacy concerns and will resolve all issues amicably.
Privacy roles are defined in our data governance model and audited regularly.
Service accounts are maintained under Privileged Account Management to ensure
data collection servers are secured. Legal department has approved all
requirements on a yearly review basis. |
Risk Management Strategy – Tier 2 |
|
Establish risk management processes |
Hold yearly meetings with Legal and executive
stakeholders to determine organizational risk tolerance. Risk management
processes established using Operational Risk Management framework. |
Awareness and Training – Tier 3 |
|
Train workforce, senior executives, privacy personnel,
and third parties |
Established onboarding training with yearly refresher
training through Opportunity Lab LMS system |
Monitoring and Review – Tier 3 |
|
Reevaluate privacy risk regularly |
Perform yearly risk assessment with 3rd party risk
assessor. Review results with Legal department and work with Training
department to add to Lessons Learned document. Ensure that policies exist for
communicating with customers and recording customer feedback regarding
privacy policies. Review feedback quarterly. |
Control |
|
Data Processing Policies, Processes, and Procedures –
Tier 3 |
|
Record, maintain, and revoke authorizations for
processing permissions |
Maintain list of service accounts in Service Now. Grant
access only through approved Change Requests recorded in Service Now. Ensure
policies are regularly updated and available to stakeholders. Use Securiti
tool to establish data lifecycle control and data lineage control. |
Data Processing Management – Tier 3 |
|
Data elements must be available for review, transmission
in a standard format, disclosure, alteration, deletion |
Maintain data map in Securiti. Ensure that map is
available for review to authorized stakeholders. Ensure that data retention
policy accounts for secure deletion of files and multipass shred of paper
records. Ensure that data may only be transmitted by authorized individuals.
Use Datadog centralized logging system to maintain audit logs for
privacy-impacting systems. Maintain database of consumer privacy preferences
with easy update capability. Ensure that privacy selections default to an
"opt-in" approach. |
Disassociated Processing – Tier 2 |
|
Data should be decoupled from individuals |
Data was evaluated and anonymized to the maximum extent
possible. Individual names were renamed with an internal serial number which
cannot be referenced back to the original user. Data processing strictly
users user serial numbers in all situations to avoid referencing the data
subject directly. As part of anonymizing efforts, Date of Birth and Gender
were removed from data collection scheme as this was not necessary for
privacy data processing. |
Communicate |
|
Communication Policies, Processes, and Procedures – Tier
2 |
|
Establish data use transparency policies |
Data transparency policies created and stored in Service
Now repository. Public version is available on the website in the Privacy
Policy section. |
Data Processing Awareness – Tier 4 |
|
Mechanisms for communicating privacy practices are
established |
Quarterly privacy reports are available for download on
website. Report allows for direct feedback to be submitted which is
anonymized prior to collection. Users may use a special PIN provided to
reference their user serial number for data correction as required. Data
lineage is maintained in Securiti and Wiz data governance tools. Playbook for
data breach incident response has been updated with an automation script to
notify users of a privacy data impact and may be run by a designated member
of the privacy team. Retainer established with Norton Lifelock to ensure that
credit monitoring will be provided to impacted users in the event of a
breach. |
Protect |
|
Data Protection Policies, Processes, and Procedures –
Tier 3 |
|
Maintain basic configuration control, change board
management, backups, physical security, and protection of assets |
Configuration Control is maintained in Service Now. This
includes change board management. Backups are maintained using our SaaS
backup solution. Ransomware decryption protection is provided through Rubrik.
Physical security is provided through Allied Security and includes
implementing badge reader, motion-activated alerting on fencing, security
cameras, and a new mantrap to access the server room. Quarterly response and
recovery plans are executed as part of the disaster recovery exercise plan. |
Identity Management, Authentication, and Access Control –
Tier 3 |
|
Ensure identities and credentials are issued, managed,
verified, revoked, and audited for individuals and devices |
Established robust playbook for onboarding. Users are
provisioned immediately into required credentials. These credentials are
tracked and automatically audited periodically and during special conditions
such as security alerts. User devices are tracked in Service Now with highly
privileged users or users with access to privacy data being subject to more
intense audit playbooks. Upon termination, a fully automated process is run
to deprovision the user and immediately lock them out of sensitive services
and servers. Users are not permitted to have local administrator nor utilize
administrative functions on their own device. Bastion hosts and Privileged
Account Workstations are used to ensure administrative credentials are not
misused. Users are not overly provisioned with special access to ensure
adequate separation of duties. Network segregation is accomplished using both
traditional VLAN segregation and Zero Trust architecture. Any system
conducting sensitive transactions is hosted in a special segregated VLAN
where normal network traffic is blocked. |
Data Security – Tier 3 |
|
Protect data-at-rest, data-in-transit |
Maintain all privacy data on encrypted S3 buckets. Ensure
TLS 1.3 in use on all servers involving data privacy transmissions. Do not
send unencrypted data privacy packets. Maintain data privacy processing
servers on separate subnet. Ensure S3 buckets with data privacy information
have security group permissions restricting access only to the data privacy
subnet. Utilize bastion hosts for all maintenance and code update activities.
Regular Next Generation Antivirus sweeps are conducted as well as a full Stairwell
hash check on critical systems. |
Maintenance – Tier 3 |
|
Repair systems per process |
Use Service Now process to manage all device repairs. Do
not permit remote desktop tools to be installed by users under any
conditions. Only permit RDP tools to be installed by Helpdesk. Generate a
security alert for each installation and usage for sensitive endpoints.
Remote connections into sensitive systems shall require the system
administrator to log their usage each time via Slack message into security
channel. |
Protective Technology – Tier 4 |
|
Restrict removable media as necessary |
Restrict USB access via GPO, Intune Policy objects, and
Endpoint Detection and Response rules. Perform monthly audit of active
directory roles to ensure least privilege. Utilize intrusion
detection/prevention system on all privacy subnets with gateway detection
rules. Ensure that all privacy data processing servers are maintained on
high-availability Type1 hypervisor ruleset. |
References:
Grassi, P. A., Lefkovitz, N. B., Nadeau, E. M., Galluzzo, R. J., & Dinh, A. T. (2018). Attribute metadata: A proposed schema for evaluating federated attributes (NIST IR 8112; p. NIST IR 8112). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.IR.8112
Hiller, J. S., & Russell, R. S. (2015). Modalities for Cyber Security and Privacy Resilience: The NIST Approach.
Landis, C. B., & Kroll, J. A. (2024). Mitigating Inference Risks with the NIST Privacy Framework. Proceedings on Privacy Enhancing Technologies, 2024(1), 217–231. https://doi.org/10.56553/popets-2024-0013
National Institute of Standards and Technology. (2018). Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1 (NIST CSWP 04162018; p. NIST CSWP 04162018). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.CSWP.04162018
Privacy Framework. (2018). NIST. https://www.nist.gov/privacy-framework
Turner, B. A., Lee Rainie, Monica Anderson, Andrew Perrin, Madhu Kumar and Erica. (2019, November 15). Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information. Pew Research Center: Internet, Science & Tech. https://www.pewresearch.org/internet/2019/11/15/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information/
Member discussion