Nist Data privacy
Nist Data privacy
Nist Data privacy
Data Confidentiality:
Detect, Respond to, and Recover
from Data Breaches
Includes Executive Summary (A); Approach, Architecture, and Security Characteristics (B);
and How-To Guides (C)
William Fisher
R. Eugene Craft
Michael Ekstrom
Julian Sexton
John Sweetnam
February 2024
FINAL
William Fisher
National Cybersecurity Center of Excellence
NIST
R. Eugene Craft
Michael Ekstrom
Julian Sexton
John Sweetnam
The MITRE Corporation
McLean, Virginia
FINAL
February 2024
Data Confidentiality:
Detect, Respond to, and Recover from Data Breaches
Volume A:
Executive Summary
William Fisher
National Cybersecurity Center of Excellence
NIST
R. Eugene Craft
Michael Ekstrom
Julian Sexton
John Sweetnam
The MITRE Corporation
McLean, Virginia
February 2024
FINAL
It is essential for an organization to identify and protect assets to prevent breaches. And in the event a
data breach occurs, it is essential that an organization be able to detect the ongoing breach themselves,
as well as begin to execute a response and recovery plan that leverages security technology and
controls.
BENEFITS
The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and
Technology (NIST) developed this guide to help organizations implement strategies in response to data
confidentiality attacks. This NIST Cybersecurity Practice Guide demonstrates how organizations can
develop and implement appropriate actions to detect, respond and recover from a data confidentiality
cybersecurity event. It includes numerous technology and security recommendations to improve your
organization’s cybersecurity posture.
APPROACH
This publication is part of a series of projects that seek to
provide guidance to improve an organization’s data security
in the context of the CIA triad. The CIA triad represents the
three pillars of information security: confidentiality,
integrity, and availability. This practice guide focuses on data
confidentiality: the property that data has not been
disclosed in an unauthorized fashion. Data confidentiality
concerns data in storage, during processing, and while in
transit. (Note: These definitions are from NIST Special
Publication (SP) 800-12 Rev 1, An Introduction to
Information Security.)
NIST SP 1800-29A: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 1
This guide applies data confidentiality principles through the
lens of the NIST Cybersecurity Framework version 1.1.
Specifically this practice guide focuses on the latter three of
those functions, informing organizations on how to detect,
respond to, and recover from a data confidentiality attack, and
manage data confidentiality risks. A complementary project and
accompanying practice guide (SP1800-28) addresses data
confidentiality through the lens of the principles of identify and
protect.
The NCCoE developed and implemented an example solution that incorporates multiple systems
working in concert to detect, respond to, and recover from data confidentiality cybersecurity events.
The solution will demonstrate the ability to detect an ongoing data breach, as well as recommending
technical and policy remediations against the same. This document highlights both the security and
privacy characteristics of the example solution by considering common data security use cases an
organization might seek to address and by enumerating problematic data actions that might impact
privacy.
While the NCCoE used a suite of commercial products to address this challenge, this guide does not
endorse these particular products, nor does it guarantee compliance with any regulatory initiatives. Your
organization's information security experts should identify the products that will best integrate with
your existing tools and IT system infrastructure. Your organization can adopt this solution or one that
adheres to these guidelines in whole, or you can use this guide as a starting point for tailoring and
implementing parts of a solution.
Business decision makers, including chief information security and technology officers can use this
part of the guide, NIST SP 1800-29A: Executive Summary, to understand the drivers for the guide, the
cybersecurity challenge we address, our approach to solving this challenge, and how the solution could
benefit your organization.
Technology, security, and privacy program managers who are concerned with how to identify,
understand, assess, and mitigate risk can use NIST SP 1800-29B: Approach, Architecture, and Security
NIST SP 1800-29A: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 2
Characteristics, which describes what we built and why, including the risk analysis performed and the
security/privacy control mappings.
IT professionals who want to implement an approach like this can make use of NIST SP 1800-29C: How-
To Guides, which provide specific product installation, configuration, and integration instructions for
building the example implementation, allowing you to replicate all or parts of this project.
COLLABORATORS
Collaborators participating in this project submitted their capabilities in response to an open call in the
Federal Register for all sources of relevant security capabilities from academia and industry (vendors
and integrators). Those respondents with relevant capabilities or product components signed a
Cooperative Research and Development Agreement (CRADA) to collaborate with NIST in a consortium to
build this example solution.
Certain commercial entities, equipment, products, or materials may be identified by name or company
logo or other insignia in order to acknowledge their participation in this collaboration or to describe an
experimental procedure or concept adequately. Such identification is not intended to imply special
status or relationship with NIST or recommendation or endorsement by NIST or NCCoE; neither is it
intended to imply that the entities, equipment, products, or materials are necessarily the best available
for the purpose.
NIST SP 1800-29A: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 3
NIST SPECIAL PUBLICATION 1800-29B
Data Confidentiality:
Detect, Respond to, and Recover from Data Breaches
Volume B:
Approach, Architecture, and Security Characteristics
William Fisher
National Cybersecurity Center of Excellence
NIST
R. Eugene Craft
Michael Ekstrom
Julian Sexton
John Sweetnam
The MITRE Corporation
McLean, Virginia
February 2024
FINAL
National Institute of Standards and Technology Special Publication 1800-29B, Natl. Inst. Stand. Technol.
Spec. Publ. 1800-28B, 58 pages, (February 2024), CODEN: NSPUE2
FEEDBACK
As a private-public partnership, we are always seeking feedback on our practice guides. We are
particularly interested in seeing how businesses apply NCCoE reference designs in the real world. If you
have implemented the reference design, or have questions about applying it in your environment,
please email us at ds-nccoe@nist.gov.
All comments are subject to release under the Freedom of Information Act.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches ii
NATIONAL CYBERSECURITY CENTER OF EXCELLENCE
The National Cybersecurity Center of Excellence (NCCoE), a part of the National Institute of Standards
and Technology (NIST), is a collaborative hub where industry organizations, government agencies, and
academic institutions work together to address businesses’ most pressing cybersecurity issues. This
public-private partnership enables the creation of practical cybersecurity solutions for specific
industries, as well as for broad, cross-sector technology challenges. Through consortia under
Cooperative Research and Development Agreements (CRADAs), including technology partners—from
Fortune 50 market leaders to smaller companies specializing in information technology security—the
NCCoE applies standards and best practices to develop modular, adaptable example cybersecurity
solutions using commercially available technology. The NCCoE documents these example solutions in
the NIST Special Publication 1800 series, which maps capabilities to the NIST Cybersecurity Framework
and details the steps needed for another entity to re-create the example solution. The NCCoE was
established in 2012 by NIST in partnership with the State of Maryland and Montgomery County,
Maryland.
To learn more about the NCCoE, visit https://www.nccoe.nist.gov/. To learn more about NIST, visit
https://www.nist.gov.
The documents in this series describe example implementations of cybersecurity practices that
businesses and other organizations may voluntarily adopt. These documents do not describe regulations
or mandatory practices, nor do they carry statutory authority.
ABSTRACT
Attacks that target data are of concern to companies and organizations across many industries. Data
breaches represent a threat that can have monetary, reputational, and legal impacts. This guide seeks to
provide guidance around the threat of data breaches, exemplifying standards and technologies that are
useful for a variety of organizations defending against this threat. Specifically, this guide seeks to help
organizations detect, respond, and recover from a data confidentiality attack.
KEYWORDS
asset management; cybersecurity framework; data breach; data confidentiality; data protection; detect;
malicious actor; malware; ransomware; recover; respond
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches iii
ACKNOWLEDGMENTS
We are grateful to the following individuals for their generous contributions of expertise and time.
Name Organization
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches iv
Name Organization
The Technology Partners/Collaborators who participated in this build submitted their capabilities in
response to a notice in the Federal Register. Respondents with relevant capabilities or product
components were invited to sign a Cooperative Research and Development Agreement (CRADA) with
NIST, allowing them to participate in a consortium to build this example solution. We worked with:
Dispel Dispel
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches v
DOCUMENT CONVENTIONS
The terms “shall” and “shall not” indicate requirements to be followed strictly to conform to the
publication and from which no deviation is permitted. The terms “should” and “should not” indicate that
among several possibilities, one is recommended as particularly suitable without mentioning or
excluding others, or that a certain course of action is preferred but not necessarily required, or that (in
the negative form) a certain possibility or course of action is discouraged but not prohibited. The terms
“may” and “need not” indicate a course of action permissible within the limits of the publication. The
terms “can” and “cannot” indicate a possibility and capability, whether material, physical, or causal.
As of the date of publication and following call(s) for the identification of patent claims whose
use may be required for compliance with the guidance or requirements of this publication, no
such patent claims have been identified to ITL.
No representation is made or implied by ITL that licenses are not required to avoid patent
infringement in the use of this publication.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches vi
Contents
1 Summary ............................................................................................ 1
1.1 Challenge .....................................................................................................................3
1.2 Solution........................................................................................................................3
1.3 Benefits ........................................................................................................................3
2 How to Use This Guide ........................................................................ 4
2.1 Typographic Conventions ............................................................................................5
3 Approach ............................................................................................ 5
3.1 Audience ......................................................................................................................6
3.2 Scope ...........................................................................................................................6
3.3 Assumptions ................................................................................................................6
3.4 Privacy Considerations .................................................................................................7
3.5 Risk Assessment ...........................................................................................................8
3.5.1 Security Risk Assessment .............................................................................................. 9
3.5.2 Privacy Risk Assessment ............................................................................................... 9
3.6 Technologies ..............................................................................................................10
4 Architecture ...................................................................................... 11
4.1 Architecture Description ............................................................................................11
5 Security & Privacy Characteristic Analysis ......................................... 12
5.1 Assumptions and Limitations .....................................................................................12
5.2 Security Scenarios ......................................................................................................12
5.2.1 Exfiltration of Encrypted Data..................................................................................... 13
5.2.2 Spear Phishing Campaign ............................................................................................ 13
5.2.3 Ransomware ............................................................................................................... 14
5.2.4 Accidental Email .......................................................................................................... 15
5.2.5 Lost Laptop.................................................................................................................. 16
5.2.6 Privilege Misuse .......................................................................................................... 16
5.2.7 Eavesdropping............................................................................................................. 17
5.3 Privacy Scenarios .......................................................................................................18
5.3.1 User Login with Multifactor Authentication ............................................................... 19
5.3.2 Authentication to Virtual Desktop Interface Solution ................................................23
5.3.3 Monitoring by Network Detection Solution ............................................................... 26
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches vii
5.3.4 Monitoring by Logging Solution .................................................................................. 30
List of Figures
Figure 1-1 Data Security Project Mapping ............................................................................................ 2
Figure 3-1 Cybersecurity and Privacy Risk Relationship ........................................................................ 8
Figure 4-1 Data Confidentiality Detect, Respond, and Recover High-Level Architecture ...................... 11
Figure 5-1 Multifactor Authentication Data Flow Diagram ................................................................. 20
Figure 5-2 Virtual Desktop Interface Data Flow Diagram .................................................................... 23
List of Tables
Table 3-1 Products and Technologies ................................................................................................. 10
Table 5-1 Exfiltration of Encrypted Data Security Scenario ................................................................. 13
Table 5-2 Spear Phishing Campaign Security Scenario ........................................................................ 13
Table 5-3 Ransomware Security Scenario ........................................................................................... 14
Table 5-4 Accidental Email Security Scenario ...................................................................................... 15
Table 5-5 Lost Laptop Security Scenario ............................................................................................. 16
Table 5-6 Privilege Misuse Security Scenario ...................................................................................... 16
Table 5-7 Eavesdropping Security Scenario ........................................................................................ 17
Table 5-8 User Login With Multifactor Authentication Data Actions ................................................... 21
Table 5-9 User Login with Multifactor Authentication Problematic Data Action ................................. 22
Table 5-10 Virtual Desktop Interface Data Actions ............................................................................. 24
Table 5-11 Virtual Desktop Interface Problematic Data Actions .......................................................... 25
Table 5-12 Network Detection Data Actions ....................................................................................... 28
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches viii
Table 5-13 Network Detection Problematic Data Actions ................................................................... 29
Table 5-14 Logging Data Actions......................................................................................................... 31
Table 5-15 Logging Problematic Data Actions ..................................................................................... 32
Table 6-1 Security Control Map .......................................................................................................... 42
Table 6-2 Privacy Control Map ........................................................................................................... 45
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches ix
1 Summary
In our data-driven world, organizations must prioritize cybersecurity and privacy as part of their business
risk management strategy. Specifically, data confidentiality remains a challenge as attacks against an
organization’s data can compromise emails, employee records, financial records, and customer
information—impacting business operations, revenue, and reputation.
The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and
Technology (NIST) developed an example solution to address data security and privacy needs. This
project fits within a larger series of Data Security projects that are organized by the elements of the
Confidentiality, Integrity, Availability (CIA) triad, and the NIST Cybersecurity Framework’s (CSF) Core
Functions: Identify, Protect, Detect, Respond, and Recover.
Note: This project was initiated before the release of the DRAFT NIST CSF 2.0 and thus does not
include the newly added GOVERN function. The DRAFT NIST CSF 2.0 defines Govern as “Establish and
monitor the organization’s cybersecurity risk management strategy, expectations, and policy”. The
govern function cuts across the other CSF functions. Though this document focuses on technical
capabilities, it’s intended that those capabilities would support an organizational governance
function in managing data confidentiality attack risk.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches
1
Figure 1-1 Data Security Project Mapping
The goals of this NIST Cybersecurity Practice Guide are to assist organizations in detecting, responding
to, and recovering from data confidentiality events. This guide will help organizations:
In addition to the guidance provided in these documents, NIST has many resources available to help
organizations detect, respond to and recover from data confidentiality attacks:
NIST Special Publication 1800-25, Identifying and Protecting Assets from Ransomware and Other
Destructive Events [2]
NIST Special Publication 1800-26, Detecting and Responding to Ransomware and Other
Destructive Events [3]
NIST Special Publication 1800-11, Recovering from Ransomware and other Destructive Events [4]
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches
2
NIST Special Publication 800-83, Guide to Malware Incident Prevention and Handling for
Desktops and Laptops [5]
NIST Special Publication 800-46, Guide to Enterprise Telework, Remote Access, and Bring Your
Own Device (BYOD) Security [6]
NIST Special Publication 1800-184, Guide for Cybersecurity Event Recovery [7]
NIST Privacy Framework [8]
NIST Cybersecurity Framework [9]
NIST Interagency Report 8374, Ransomware Risk Management: A Cybersecurity Framework
Profile [10]
1.1 Challenge
Fundamentally, data confidentiality is a challenge because all data exists to be accessible by some
number of authorized people or systems. Data access only becomes a data breach when that access is
by an unauthorized person or system. The quantity and diversity of an organization’s data, the varying
methods of data access (on-site versus remote, computer versus mobile device) and the potential for
the compromise of valid user credentials all challenge an organization’s ability to maintain the
confidentiality of their data. NIST SP 1800-29 focuses on the Detect, Respond, and Recover functions of
the NIST Cybersecurity Framework and addresses the challenges related to categorizing authorized and
unauthorized data access. Once that ontology is developed, this document helps organizations address
detecting, responding to, and recovering from a loss of data confidentiality.
Additional challenges arise when defining what it means to “respond to” or “recover from” a data
breach. In the NCCoE’s previous work on Data Integrity (1800-25, 1800-26, and 1800-11), it was possible
to define recovery as a rollback of the compromised data to a point in time before it was altered. With
respect to a loss of data confidentiality, there is no such process by which to “undo” the effects of such a
loss—once digital data is in the hands of an unauthorized user, there is no guaranteed method by which
to get all copies of the data back. This leaves an organization and the affected individuals with non-
technical mitigations for the consequences of the breach (financial, reputational, etc.), as well as the
ability of the organization to apply the lessons learned to technical improvements earlier in the timeline
to prevent against future breaches.
1.2 Solution
The NCCoE developed this two-part solution to address considerations for both data security and data
privacy to help organizations manage the risk of a data confidentiality attack. The work in 1800-28
addressed an organization’s needs prior to a loss of data confidentiality (by focusing on the NIST CSF
Functions of Identify and Protect) while this guide’s focus is on the actions of an organization during and
after a loss of data confidentiality (the remaining NIST CSF Functions of Detect, Respond, and Recover).
The solution utilizes commercially available tools to provide certain relevant capabilities such as event
detection, log correlation, incident response information, and credential management among others.
1.3 Benefits
Organizations can use this guide to help:
Evaluate their data confidentiality concerns.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches
3
Determine whether their data security needs align with the challenges described in these
documents.
Conduct a gap analysis to determine the distance between the organization’s current state and
desired state with respect to data confidentiality.
Perform an assessment of the feasibility of implementing any number of these solutions.
Determine a business continuity analysis to identify potential impacts on business operations as
a result of a loss of data confidentiality.
Business decision makers, including chief security and technology officers, will be interested in the
Executive Summary, NIST SP 1800-29A, which describes the following topics:
Section 3.5, Risk Assessment, provides a description of the risk analysis we performed
Appendix D, Security Control Map, maps the security characteristics of this example solution to
cybersecurity standards and best practices
You might share the Executive Summary, NIST SP 1800-29A, with your leadership team members to help
them understand the importance of adopting standards-based solutions to detect and respond to losses
in data confidentiality.
IT professionals who want to implement an approach like this will find the whole practice guide useful.
You can use the how-to portion of the guide, NIST SP 1800-29C, to replicate all or parts of the build
created in our lab. The how-to portion of the guide provides specific product installation, configuration,
and integration instructions for implementing the example solution. We do not re-create the product
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches
4
manufacturers’ documentation, which is generally widely available. Rather, we show how we
incorporated the products together in our environment to create an example solution.
This guide assumes that IT professionals have experience implementing security products within the
enterprise. While we have used a suite of commercial products to address this challenge, this guide does
not endorse these particular products. Your organization can adopt this solution or one that adheres to
these guidelines in whole, or you can use this guide as a starting point for tailoring and implementing
parts of detecting, responding to, and recovering from a loss of data confidentiality. Your organization’s
security experts should identify the products that will best integrate with your existing tools and IT
system infrastructure. We hope that you will seek products that are congruent with applicable standards
and best practices. Section 3.6, Technologies, lists the products we used and maps them to the
cybersecurity controls provided by this reference solution.
A NIST Cybersecurity Practice Guide does not describe “the” solution, but a possible solution.
Comments, suggestions, and success stories will improve subsequent versions of this guide. Please
contribute your thoughts to ds-nccoe@nist.gov.
3 Approach
The NCCoE is developing a set of data confidentiality projects mapped to the five Functions of the NIST
Cybersecurity Framework. This project centers on detecting, responding to, and recovering from
potential threats to confidentiality. Our commercial collaboration partners have volunteered to provide
the products for the example solution for the problems raised in each of our use cases. Through this
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches
5
collaboration, our goal is to create actionable recommendations for organizations and individuals trying
to solve data confidentiality issues.
3.1 Audience
The architecture of this project and accompanying documentation targets three distinct groups of
readers. The first is those personally managing, implementing, installing and configuring IT security
solutions for their organization. The walkthroughs of installation and configuration of the chosen
commercial products In Volume C of this guide, as well as any of our notes on lessons learned, work to
ease the challenge of implementing security best practices. This guide also serves as a starting point for
those addressing these security issues for the first time, and a reference for experienced admins who
want to do better.
The second group are those tasked with establishing broader security policies for their organizations.
Reviewing the threats each organization needs to account for and their potential solutions allows for
more robust and efficient security policy to be generated with greater ease.
The final group are those individuals responsible for the legal ramifications of breaches of
confidentiality. Many organizations have legal obligations to protect the personal data or personally
identifiable information they handle, and the ramifications for failing to at least adequately attempt to
protect that data can have severe consequences for the privacy of individuals and follow on
consequences for the organizations as a whole.
This guide will allow potential adopters to assess the feasibility of implementing data confidentiality best
practices within the IT systems of their own organization.
3.2 Scope
This document provides guidance on detecting, responding to, and recovering from a loss of data
confidentiality. Refer to Figure 1-1 to understand how this document fits within the larger set of NCCoE
Data Security projects, as organized by the CIA triad and the functions of the NIST Cybersecurity
Framework.
3.3 Assumptions
The technical solution developed at the NCCoE and represented in this guide does not incorporate the
non-technical aspects of managing the confidentiality of an organization’s data. The non-technical
components could include (but are not limited to):
The solution was developed in a laboratory environment and is limited in the size and scale of
data
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches
6
Only a subset of products relevant to data confidentiality are included in this project; therefore,
organizations should consider the guiding principles of this document when evaluating their
organization’s needs against the product landscape at the time of their IT implementation.
In today’s digital landscape, consumers conduct much of their lives on the internet. Data processing,
which includes any operations taken with data, including the collection, usage, storage, and sharing of
data by organizations, can result in privacy problems for individuals. Privacy risks can evolve with
changes in technology and associated data processing. How organizations treat privacy has a direct
bearing on their perceived trustworthiness. Recognizing the evolving privacy impacts of technology on
individuals, governments across the globe are working to address their concerns through new or
updated laws and regulations.
Following an open and transparent development process, NIST published the NIST Privacy Framework,
Version 1.0 to help organizations better identify and manage their privacy risks, build trust with
customers and partners, and meet their compliance obligations. The Privacy Framework Core provides
privacy outcomes that organizations may wish to achieve as part of a privacy risk management program.
The Privacy Framework also discusses privacy engineering objectives that can be used to help
organizations prioritize their privacy risk management activities. The privacy engineering objectives are:
Predictability: Enabling reliable assumptions by individuals, owners, and operators about data
and their processing by a system
Manageability: Providing the capability for granular administration of data, including collection,
alteration, deletion, and selective disclosure
Disassociability: Enabling the processing of data or events without association to individuals or
devices beyond the operational requirements of the system
It is important for individuals and organizations to understand the relationship between cybersecurity
and privacy. As noted in Section 1.2.1 of the NIST Privacy Framework [8], having a general understanding
of the different origins of cybersecurity and privacy risks is important for determining the most effective
solutions to address the risks. Figure 3-1 illustrates this relationship, showing that some privacy risks
arise from cybersecurity risks, and some are unrelated to cybersecurity risks.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches
7
Figure 3-1 Cybersecurity and Privacy Risk Relationship
Though a data confidentially breach may lead to privacy problems for individuals, it is important to note
that privacy risks can arise without a cybersecurity incident. For example, an organization might process
data in ways that violates an individual’s privacy without that data having been breached or
compromised through a security incident. This type of issue can occur under a variety of scenarios, such
as when data is stored for extended periods, beyond the need for which the information was initially
collected.
Privacy risks arise from privacy events—the occurrence or potential occurrence of problematic data
actions. The NIST Privacy Framework defines problematic data actions as data actions that may cause an
adverse effect for individuals. Problematic data actions might arise by data processing simply for mission
or business purposes. Privacy risk is the likelihood that individuals will experience problems resulting
from data processing, and the impact should they occur [11]. As reflected in the overlap of Figure 3-1,
analyzing these risks in parallel with cybersecurity risks can help organizations understand the full
consequences of impacts of data confidentiality breaches. Section 5.3 demonstrates scenarios where
privacy risks may arise and potential mitigations.
Based on the reference architecture, this build considered the data actions that potentially cause
problematic data actions.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches
8
The NCCoE recommends that any discussion of risk management, particularly at the enterprise level,
begins with a comprehensive review of NIST SP 800-37 Revision 2, Risk Management Framework for
Information Systems and Organizations [12]—material that is available to the public. The Risk
Management Framework (RMF) [13] guidance proved to be invaluable in giving us a baseline to assess
risks, from which we developed the project, the security characteristics of the build, and this guide.
The following threats were considered during the development of the data confidentiality solution:
Organizations should consider the impact in the event that a data confidentiality breach occurs including
potential decline in organizational trust and credibility affecting employees, customers, partners,
stakeholders as well as financial impacts due to loss of proprietary or other sensitive information.
As part of identifying privacy risks in this build, problematic data actions were correlated to observed
privacy risks. In many cases, the security capabilities in this build will help mitigate privacy risks, but
organizations should use caution to implement these capabilities in a way that does not introduce new
privacy risks.
Section 5.3 discusses problematic data actions and privacy considerations for this build.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches
9
3.6 Technologies
Table 3-1 lists the technologies used in this project, and provides a mapping among the generic application term, the specific product used, and
the security control(s) that the product provides. Refer to Table 6-1 for an explanation of the NIST Cybersecurity Framework Subcategory
identifiers. Table 3-1 also provides the Privacy Framework Subcategory identifiers, which are explained in Appendix E.
User Access Control Cisco DUO • Revokes compromised RC.RP-1 PR.AC-P1, PR.AC-P6
credentials
Dispel • Provides remote access to DE.AE-3, DE.CM-3, PR.AC-P3
Network Protection network DE.CM-7, RS.MI-2
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 10
4 Architecture
This section presents the high-level architecture and a set of capabilities used in our data confidentiality
reference design to detect, respond, and recover from data confidentiality events.
Each of the capabilities implemented plays a role in mitigating data confidentiality attacks:
• Data Protection involves maintaining the confidentiality and integrity of proprietary data, even
in the event of a security breach or outright theft.
• Event Detection and Monitoring focuses on becoming aware of potential intrusions by tracking
the events that may indicate a breach of security and alerting the relevant administrators.
• Log collection, collation and correlation refers to the proper monitoring of activity on a system,
and the analysis of that activity for any potential anomalous patterns or events.
• User access controls work to regulate and restrict the level of access different users have, so
that they can perform their work without providing unnecessary access that can be turned to
more malicious ends.
• Network protection provides protection for security architecture and enterprise components,
as well as providing additional network and authentication logging data for analysis.
These capabilities work together to detect malicious activity, respond appropriately, and aid in
recovering both the system’s security and any corrupted data. The data protection capability works to
encrypt and manage encryption keys for the data. This data protection is critical as a line of defense
against breaches; encryption ensures that data captured in a breach is effectively unusable by the
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 11
adversary. The monitoring capability analyzes network traffic to detect abnormal or malicious network
activity and the user accounts affected by it. The event detection capability similarly detects
unauthorized data access and other software related events which may be related to data breaches,
such as the usage of USBs, printers, and email to transfer sensitive files. The anomalies detected by the
event detection and monitoring capabilities can provide warnings of a potential breach, triggering
responses which the organization has set in place.
The log collection, collation, and correlation capability collect data from other capabilities to provide
administrators with an overview of organizational health and knowledge about potential and actual data
breaches. This larger view of the entire network enables administrators to determine the extent of the
damage to the organization, the status of the containment of the security breach, and whether the
remnants of the security breach have been successfully removed. In combination with the access control
capability, these can be used to revoke compromised user credentials, and restrict the access of
uncompromised accounts related to the breach.
NOTE: The below scenarios map to the DRAFT NIST CSF 2.0. For a mapping to the NIST CSF 1.1 please
see Security Control Map in Appendix D.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 12
5.2.1 Exfiltration of Encrypted Data
Table 5-1 Exfiltration of Encrypted Data Security Scenario
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 13
DE.AE-02, DE.AE-03, DE.CM-01, DE.CM-03, DE.CM-06, DE.CM-09, RS.MA-
Associated DRAFT CSF
02, RS.AN-03, RS.CO-02, RS.CO-03, RS.MI-01, RS.MI-02
2.0 Subcategories
Organizational This scenario illustrates the compromise of valid, privileged credentials
Response through a spear phishing email. The user may report this themselves if they
retroactively realize it was a phishing attack, or they may not. The
organization will need to detect the compromised account and assess any
unauthorized access or data exfiltration.
The Network Monitoring and Logging capabilities are used to watch for
Detect
those anomalous behaviors most often associated with compromised
accounts.
Respond The Mitigation capability demonstrated in this project allows for rapid
disabling of account privileges in the event of compromised credentials,
preventing further access to additional sensitive data.
Recover The Logging and Reporting capabilities provided a detailed picture of all
sensitive data accessed by the compromised account, which will allow the
organization to determine what liability it holds and what affected parties
will need to be notified.
5.2.3 Ransomware
Table 5-3 Ransomware Security Scenario
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 14
Respond The Mitigation capability for this scenario will allow for rapid disabling and
secure re-enabling of compromised accounts once the relevant member
accounts are detected. The Reporting capability is designed to quickly
notify security teams of necessary actions, such as isolating the system
from the network and securing any data not yet attacked by the
ransomware.
Recover The scenario build doesn’t possess any technical capabilities for literal
recovery of the stolen data, as the scenario predicates the data has already
been successfully stolen, but the Logging capabilities should allow a
detailed review of what was taken. This will allow for post-incident review
of security flaws and notification of anyone inside or outside the
organization affected by the security breach.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 15
5.2.5 Lost Laptop
Table 5-5 Lost Laptop Security Scenario
A user has lost their work laptop, which contains proprietary information. It
Description
is unknown if the laptop was targeted for its data and access credentials by
a malicious actor, or if the incident was an unfortunate accident. For the
purposes of this scenario, we assume the user of the laptop has reported
the missing system on their own.
DE.CM-03, DE.CM-09, DE.AE-06, RS.MA-01, RS.AN-03, RS.AN-08, RS.CO-2
Associated DRAFT CSF
2.0 Subcategories
Organizational In the event of a lost laptop, it is likely that the loss will be reported by the
Response user, as the user will directly lose their ability to work. The organization
must determine the data that was on the laptop, the security posture of
the laptop, and the access the laptop provided to the organization’s
network, so that the loss can be accurately assessed, and further data loss
can be prevented.
In many cases, the user will need to report their own laptop lost or stolen.
Detect
While the Logging and Monitoring components can identify if the laptop is
a security risk by verifying if the laptop attempts to connect to the network,
it may be impossible to detect whether the data on the laptop has been
accessed once network connectivity is lost. The Logging and Reporting
capabilities create a record that can detect if data has been inappropriately
accessed from laptops that are reported missing, based on user logins and
activity.
Respond The Mitigation capability of this scenario should allow for remote wiping of
proprietary data from laptops, should they attempt to reconnect to the
organization’s network. The Reporting capability is designed to quickly
notify security teams so they can flag the laptop as missing and assess from
backups what data is exposed.
Recover This scenario build does not contain the capability for physical recovery of
lost laptops. However, Logging and Reporting capabilities can determine
what data was on the lost laptop, and the individuals who might be
affected by the potential exposure of the laptop’s contents.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 16
Organizational It is unlikely that a malicious insider will advertise their misdoings - it falls
Response to the organization to discover the insider behavior and protect assets from
them. Through proper access control and encryption of sensitive files,
organizations can hinder the insider’s attempt to exfiltrate useful data. It is
unlikely that an organization will be able to completely stop a determined
insider through technical means, however; organizations should use the
technical capabilities they have to limit the exfiltration, while also gathering
information about the extent of the loss to aid in the pursuit of legal
resolutions to the incident.
The Event Detection capability of the scenario is designed to watch for
Detect
users accessing data they are not authorized for, the insertion of USB
drives, and even the activation of printers.
Respond The Reporting capability, combined with Event Detection, allows for
security administrators to be quickly notified of potentially malicious
actions. They can then respond by utilizing the Mitigation capability to
restrict User Access Controls for any suspected insider accounts.
Mitigation capabilities also exist to restrict copying and printing
functionality.
Recover The Logging capability in this scenario tracks user access to sensitive data,
allowing for a full accounting of potentially compromised proprietary data.
5.2.7 Eavesdropping
Table 5-7 Eavesdropping Security Scenario
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 17
Respond If the activities of the malicious host are allowed to continue, further loss of
data can occur. Because of this, it is important to stop the interception of
data quickly. In the event that the attacker is in the building, or even
reading the data themselves as they intercept it, swift mitigation of the leak
is necessary. Through the Mitigation component, we can contain or
disconnect the malicious host from the network, to learn more information
about it and prevent the leak. This can happen automatically or manually,
depending on the reliability of the anomaly detection software.
Recover The Logging and Reporting capabilities allow for the full accounting of the
traffic and data the man-in-the-middle system touched before its detection
and removal from the network, allowing for the notification of all affected
parties.
Organizations may collect information affecting privacy when implementing cybersecurity or privacy-
based controls. For example, an organization might implement multi-factor authentication (MFA) using
information such as a mobile phone number. Even though collecting this information helps to protect
systems and data by supporting capabilities like non-repudiation and system auditing, it may also
generate privacy risks.
When implementing cybersecurity or privacy-based controls, organizations should consider the benefit a
user realizes, both from the use of a service and the securing of that service before processing
information affecting privacy. This benefit can be weighed against the risk posed to both individuals and
the organization should a privacy event occur.
For example, using the MFA example mentioned above, users may feel compelled to provide
information affecting privacy, such as their personal phone number for SMS (short messaging service)
authentication, to gain access to systems or services. However, if the user is accessing publicly-available
information, the risk of the misuse of information from collecting personal phone numbers may be
greater than the security benefit for protecting the low-sensitivity information. Additionally, if given the
option, users may elect to use alternative authentication methods that are less privacy-invasive, such as
using a work phone number over a personal number or a hardware MFA authenticator over SMS
authentication. The NIST Privacy Risk Assessment Methodology (PRAM)refers to this problematic data
action, where the user is compelled to provide information disproportionate to the purpose or outcome
of the transaction, as induced disclosure.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 18
Organizations should consider these types of risks as they design and implement systems. As
demonstrated in the scenarios below, risk mitigations should be implemented within the design to limit
privacy risks. These privacy risk mitigations might include the following, among others:
• Understand where and how information is processed, including collection practices and system
components that store and transmit this information (data flows and mapping)
• Understand the risks and benefits of collecting different data elements to determine if it should
not be collected
• Keep data only as long as needed for its function and destroy or de-identify it otherwise using
proper data lifecycle management practices and in accordance with applicable laws and policies
• Keep personal data segregated in a different repository, when practicable
• Encrypt data at rest, in transit, and in use
• Use role-based access controls
• Consider what measures should be taken to address predictability and manageability before
deciding whether data can be used beyond its initial expected and agreed upon use
• Implement privacy-enhancing technologies to increase disassociability while retaining
confidentiality and the capability to process data for mission or business purposes
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 19
Figure 5-1 Multifactor Authentication Data Flow Diagram
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 20
Table 5-8 User Login With Multifactor Authentication Data Actions
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 21
Table 5-9 User Login with Multifactor Authentication Problematic Data Action
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 22
5.3.2 Authentication to Virtual Desktop Interface Solution
The reference architecture in this document demonstrates a Virtual Desktop Interface (VDI) solution to facilitate secure access to organizational
resources and data. Organizations may allow users’ personal devices to access corporate resources using the VDI solution. Organizations should
consider the privacy risk of installing VDI software on personally owned devices, information revealed by the VDI protocol, and monitoring of
user activity while in the virtual environment.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 23
Table 5-10 Virtual Desktop Interface Data Actions
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 24
Table 5-11 Virtual Desktop Interface Problematic Data Actions
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 25
5.3.3 Monitoring by Network Detection Solution
Network detection solutions monitor network traffic to identify network patterns that may indicate
malicious or harmful activity on a system or network. As part of this monitoring, network data may be
duplicated, sent to third party applications or centralized. The transmission and use of this data for
network monitoring may reveal more about users than necessary for security purposes, which raises
privacy risk.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 26
Figure 5-3 Network Detection Data Flow Diagram
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 27
Table 5-12 Network Detection Data Actions
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 28
Table 5-13 Network Detection Problematic Data Actions
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 29
5.3.4 Monitoring by Logging Solution
This reference architecture generates logs used to aid in response and recovery activities. These logs are essential for proper data management
and incident response. However, organizations should consider the privacy implications of data processing activities related to logging and
montioring.
Data processing throughout the security architecture, and the logs generated by user activities, can interact with and create information that
affects the privacy of users. The use of a logging solution requires that data and metadata about user’s activity be generated and stored in an
additional location. Depending on the details and scope of the logging tool, this can extend the effective domain of information that affects
privacy used by those tools. Some examples of information affecting privacy utilized in such transactions is given below:
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 30
Table 5-14 Logging Data Actions
IP Addresses IP Addresses are stored and transferred by enterprise IP addresses can be used to determine rough locations for
systems as well as the Logging Solution. They are user-owned machines. Additionally, IP Addresses can be
transferred by and through the Security Solutions. common across logs from many security tools, allowing for
anonymized data to be re-identified and can enable tracking
or surveillance in unintended ways.
Device Device Identifiers are stored and transferred by enterprise Under certain circumstances, Device Identifiers, such as
Identifiers systems as well as the Logging Solution. They are MAC (media access control) addresses, can be used to
transferred by and through the Security Solutions. identify individuals from data that has been de-identified, or
allow for privacy-impacting correlations to be made
between data logs.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 31
Table 5-15 Logging Problematic Data Actions
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 32
6 Future Build Considerations
As shown in Figure 1-1, the NCCoE Data Security work that remains to be addressed within the
framework of the CIA triad is that of Data Availability. The Data Security team plans to evaluate the
current landscape of Data Availability challenges that organizations face and determine future relevant
projects to address those needs.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 33
Appendix A List of Acronyms
BYOD Bring Your Own Device
COBIT Control Objectives for Information and Related Technologies
CIA Confidentiality Integrity Availability
CIS Center for Internet Security
CNSSI Committee on National Security Systems Instruction
CRADA Cooperative Research And Development Agreement
CSC Critical Security Controls
CSF Cybersecurity Framework
FIPS Federal Information Processing Standard
HTTPS Hypertext Transfer Protocol Secure
IEC International Electrotechnical Commission
IP Internet Protocol
ISA International Society of Automation
ISO International Organization for Standardization
IT Information Technology
ITL Information Technology Laboratory
MAC Media Access Control
MFA Multi Factor Authentication
NCCoE National Cybersecurity Center of Excellence
NIST National Institute of Standards and Technology
NIST IR NIST Interagency or Internal Report
PII Personally Identifiable Information
PRAM Privacy Risk Assessment Methodology
RDP Remote Desktop Protocol
RMF Risk Management Framework
SMS Short Messaging Service
SP Special Publication
URL Uniform Resource Location
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 34
USB Universal Series Bus
VDI Virtual Desktop Interface
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 35
Appendix B Glossary
Access Control The process of granting or denying specific requests to 1) obtain
and use information and related information processing services
and 2) enter specific physical facilities (e.g., federal buildings,
military establishments, border crossing entrances).
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 36
Control The means of managing risk, including policies, procedures,
guidelines, practices, or organizational structures, which can be of
an administrative, technical, management, or legal nature.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 37
Incident An occurrence that actually or potentially jeopardizes the
confidentiality, integrity, or availability of an information system or
the information the system processes, stores, or transmits or that
constitutes a violation or imminent threat of violation of security
policies, security procedures, or acceptable use policies.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 38
Risk The level of impact on organizational operations (including mission,
functions, image, or reputation), organizational assets, or
individuals resulting from the operation of an information system
given the potential impact of a threat and the likelihood of that
threat occurring.
Security Policy A set of rules that governs all aspects of security-relevant system
and system component behavior.
Spear Phishing A colloquial term that can be used to describe any highly targeted
phishing attack.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 39
Appendix C References
[1] W. Barker, Guideline for Identifying an Information System as a National Security System,
National Institute of Standards and Technology (NIST) Special Publication (SP) 800-59,
Gaithersburg, Md., Aug. 2003, 17 pp. Available: https://doi.org/10.6028/NIST.SP.800-59.
[2] T. McBride et. al, Data Integrity: Identifying and Protecting Assets Against Ransomware and
Other Destructive Events, National Institute of Standards and Technology (NIST) Special
Publication (SP) 1800-25, Gaithersburg, Md., Dec. 2020, 488 pp. Available:
https://doi.org/10.6028/NIST.SP.1800-25.
[3] T. McBride et. al, Data Integrity: Detecting and Responding to Ransomware and Other
Destructive Events, National Institute of Standards and Technology (NIST) Special Publication
(SP) 1800-26, Gaithersburg, Md., Dec. 2020, 441 pp. Available:
https://doi.org/10.6028/NIST.SP.1800-26.
[4] T. McBride et. al, Data Integrity: Recovering from Ransomware and Other Destructive Events,
National Institute of Standards and Technology (NIST) Special Publication (SP) 1800-11,
Gaithersburg, Md., Sep. 2020, 377 pp. Available: https://doi.org/10.6028/NIST.SP.1800-11.
[5] M. Souppaya and K. Scarfone, Guide to Malware Incident Prevention and Handling for
Desktops and Laptops, National Institute of Standards and Technology (NIST) Special
Publication (SP) 800-83 Revision 1, Gaithersburg, Md., July 2013, 36 pp. Available:
https://doi.org/10.6028/NIST.SP.800-83r1.
[6] M. Souppaya and K. Scarfone, Guide to Enterprise Telework, Remote Access, and Bring Your
Own Devise (BYOD) Security, National Institute of Standards and Technology (NIST) Special
Publication (SP) 800-46 Revision 2, Gaithersburg, Md., July 2016, 43 pp. Available:
https://doi.org/10.6028/NIST.SP.800-46r2.
[7] M. Bartok et. al, Guide for Cybersecurity Event Recovery, National Institute of Standards and
Technology (NIST) Special Publication (SP) 800-184, Gaithersburg, Md., Dec. 2016, 45 pp.
Available: https://doi.org/10.6028/NIST.SP.800-184.
[10] W. Barker et. al, Ransomware Risk Management: A Cybersecurity Framework Profile, NIST
Interagency Report 8374, Gaithersburg, Md., Feb. 2022, 23 pp. Available:
https://doi.org/10.6028/NIST.IR.8374.
[11] S. Brooks et. al, An Introduction to Privacy Engineering and Risk Management in Federal
Systems, NIST Interagency Report 8062, Gaithersburg, Md., Jan. 2017, 41 pp. Available:
https://doi.org/10.6028/NIST.IR.8062.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 40
[12] Joint Task Force, Risk Management Framework for Information Systems and Organizations,
National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37
Revision 2, Gaithersburg, Md., Dec. 2018, 164 pp. Available:
https://doi.org/10.6028/NIST.SP.800-37r2.
[14] Joint Task Force Transformation Initiative, Guide for Conducting Risk Assessments, National
Institute of Standards and Technology (NIST) Special Publication (SP) 800-30 Revision 1,
Gaithersburg, Md., Sep. 2012, 83 pp. Available: https://doi.org/10.6028/NIST.SP.800-30r1.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 41
Appendix D Security Control Map
The following table lists the NIST Cybersecurity Framework Functions, Categories, and Subcategories
addressed by this project and maps them to relevant NIST standards, industry standards, and controls
and best practices.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 42
Cybersecurity Framework v1.1 Standards & Best Practices
Function Category Subcategory Informative References
Security DE.CM-1: The network is CIS CSC 1, 7, 8, 12, 13, 15, 16
Continuous monitored to detect potential COBIT 5 DSS01.03, DSS03.05,
Monitoring cybersecurity events DSS05.07
(DE.CM) ISA 62443-3-3:2013 SR 6.2
NIST SP 800-53 Rev. 4 AC-2, AU-12,
CA-7, CM3, SC-5, SC-7, SI-4
DE.CM-3: Personnel activity is CIS CSC 5, 7, 14, 16
monitored to detect potential COBIT 5 DSS05.07
cybersecurity events ISA 62443-3-3:2013 SR 6.2
ISO/IEC 27001:2013 A.12.4.1, A.12.4.3
NIST SP 800-53 Rev. 4 AC-2, AU-12,
AU-13, CA-7, CM-10, CM-11
DE.CM-4: Malicious code is CIS CSC 4, 7, 8, 12
detected COBIT 5 DSS05.01
ISA 62443-2-1:2009 4.3.4.3.8
ISA 62443-3-3:2013 SR 3.2
ISO/IEC 27001:2013 A.12.2.1
NIST SP 800-53 Rev. 4 SI-3, SI-8
DE.CM-7: Monitoring for CIS CSC 1, 2, 3, 5, 9, 12, 13, 15, 16
unauthorized personnel, COBIT 5 DSS05.02, DSS05.05
connections, devices, and ISO/IEC 27001:2013 A.12.4.1,
software is performed A.14.2.7, A.15.2.1
NIST SP 800-53 Rev. 4 AU-12, CA-7,
CM-3, CM-8, PE-3, PE-6, PE-20, SI-4
RESPON Communicatio RS.CO-2: Incidents are reported CIS CSC 19
D (RS) ns (RS.CO) consistent with established COBIT 5 DSS01.03
criteria ISA 62443-2-1:2009 4.3.4.5.5
ISO/IEC 27001:2013 A.6.1.3, A.16.1.2
NIST SP 800-53 Rev. 4 AU-6, IR-6, IR-8
Analysis RS.AN-3: Forensics are performed COBIT 5 APO12.06, DSS03.02,
(RS.AN) DSS05.07
ISA 62443-3-3:2013 SR 2.8, SR 2.9, SR
2.10, SR 2.11, SR 2.12, SR 3.9, SR 6.1
ISO/IEC 27001:2013 A.16.1.7
NIST SP 800-53 Rev. 4 AU-7, IR-4
Mitigation RS.MI-2: Incidents are mitigated CIS CSC 4, 19
(RS.MI) COBIT 5 APO12.06
ISA 62443-2-1:2009 4.3.4.5.6,
4.3.4.5.10
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 43
Cybersecurity Framework v1.1 Standards & Best Practices
Function Category Subcategory Informative References
ISO/IEC 27001:2013 A.12.2.1, A.16.1.5
NIST SP 800-53 Rev. 4 IR-4
RECOVE Recover RC.RP-1: Recovery plan is CIS CSC 10
R (RC) (RC.RP) executed during or after a COBIT 5 APO12.06, DSS02.05,
cybersecurity incident DSS03.04
ISO/IEC 27001:2013 A.16.1.5
NIST SP 800-53 Rev. 4 CP-10, IR-4, IR-8
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 44
Appendix E Privacy Control Map
The following table lists the NIST Privacy Framework Functions, Categories and Subcategories addressed
by this project and maps them to relevant NIST standards, industry standards, and controls and best
practices.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 45
Privacy Framework 1.0 Standards and Best Practices
Function Category Subcategory Informative Refences
the assessed risk and
of unauthorized devices.
access.
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 46
Privacy Framework 1.0 Standards and Best Practices
Function Category Subcategory Informative Refences
organizatio
nal risks).
NIST SP 1800-29B: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 47
NIST SPECIAL PUBLICATION 1800-29C
Data Confidentiality:
Detect, Respond to, and Recover from Data
Breaches
Volume C:
How-To Guides
William Fisher
National Cybersecurity Center of Excellence
NIST
R. Eugene Craft
Michael Ekstrom
Julian Sexton
John Sweetnam
The MITRE Corporation
McLean, Virginia
February 2024
FINAL
While NIST and the NCCoE address goals of improving management of cybersecurity and privacy risk
through outreach and application of standards and best practices, it is the stakeholder’s responsibility to
fully perform a risk assessment to include the current threat, vulnerabilities, likelihood of a compromise,
and the impact should the threat be realized before adopting cybersecurity measures such as this
recommendation.
National Institute of Standards and Technology Special Publication 1800-29C, Natl. Inst. Stand. Technol.
Spec. Publ. 1800-29C, 67 pages, (February 2024), CODEN: NSPUE2
FEEDBACK
As a private-public partnership, we are always seeking feedback on our practice guides. We are
particularly interested in seeing how businesses apply NCCoE reference designs in the real world. If you
have implemented the reference design, or have questions about applying it in your environment,
please email us at ds-nccoe@nist.gov.
All comments are subject to release under the Freedom of Information Act.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches ii
NATIONAL CYBERSECURITY CENTER OF EXCELLENCE
The National Cybersecurity Center of Excellence (NCCoE), a part of the National Institute of Standards
and Technology (NIST), is a collaborative hub where industry organizations, government agencies, and
academic institutions work together to address businesses’ most pressing cybersecurity issues. This
public-private partnership enables the creation of practical cybersecurity solutions for specific
industries, as well as for broad, cross-sector technology challenges. Through consortia under
Cooperative Research and Development Agreements (CRADAs), including technology partners—from
Fortune 50 market leaders to smaller companies specializing in information technology security—the
NCCoE applies standards and best practices to develop modular, adaptable example cybersecurity
solutions using commercially available technology. The NCCoE documents these example solutions in
the NIST Special Publication 1800 series, which maps capabilities to the NIST Cybersecurity Framework
and details the steps needed for another entity to re-create the example solution. The NCCoE was
established in 2012 by NIST in partnership with the State of Maryland and Montgomery County,
Maryland.
To learn more about the NCCoE, visit https://www.nccoe.nist.gov/. To learn more about NIST, visit
https://www.nist.gov.
The documents in this series describe example implementations of cybersecurity practices that
businesses and other organizations may voluntarily adopt. These documents do not describe regulations
or mandatory practices, nor do they carry statutory authority.
ABSTRACT
Attacks that target data are of concern to companies and organizations across many industries. Data
breaches represent a threat that can have monetary, reputational, and legal impacts. This guide seeks to
provide guidance around the threat of data breaches, exemplifying standards and technologies that are
useful for a variety of organizations defending against this threat. Specifically, this guide identifies
standards and technologies that are relevant in the detection, response, and recovery phases of a data
breach.
KEYWORDS
asset management; cybersecurity framework; data breach; detect; data confidentiality; data protection;
malicious actor; malware; ransomware; recover; respond
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches iii
ACKNOWLEDGMENTS
We are grateful to the following individuals for their generous contributions of expertise and time.
Name Organization
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches iv
Name Organization
The Technology Partners/Collaborators who participated in this build submitted their capabilities in
response to a notice in the Federal Register. Respondents with relevant capabilities or product
components were invited to sign a Cooperative Research and Development Agreement (CRADA) with
NIST, allowing them to participate in a consortium to build this example solution. We worked with:
Dispel Dispel
DOCUMENT CONVENTIONS
The terms “shall” and “shall not” indicate requirements to be followed strictly to conform to the
publication and from which no deviation is permitted. The terms “should” and “should not” indicate that
among several possibilities, one is recommended as particularly suitable without mentioning or
excluding others, or that a certain course of action is preferred but not necessarily required, or that (in
the negative form) a certain possibility or course of action is discouraged but not prohibited. The terms
“may” and “need not” indicate a course of action permissible within the limits of the publication. The
terms “can” and “cannot” indicate a possibility and capability, whether material, physical, or causal.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches v
PATENT DISCLOSURE NOTICE
NOTICE: The Information Technology Laboratory (ITL) has requested that holders of patent
claims whose use may be required for compliance with the guidance or requirements of this
publication disclose such patent claims to ITL. However, holders of patents are not obligated to
respond to ITL calls for patents and ITL has not undertaken a patent search in order to identify
which, if any, patents may apply to this publication.
As of the date of publication and following call(s) for the identification of patent claims whose
use may be required for compliance with the guidance or requirements of this publication, no
such patent claims have been identified to ITL.
No representation is made or implied by ITL that licenses are not required to avoid patent
infringement in the use of this publication.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches vi
Contents
1 Introduction ........................................................................................ 1
1.1 How to Use this Guide .................................................................................................1
1.2 Build Overview .............................................................................................................2
1.3 Typographic Conventions ............................................................................................2
1.4 Logical Architecture Summary .....................................................................................3
2 Product Installation Guides ................................................................. 4
2.1 FireEye Helix ................................................................................................................4
2.1.1 Installing the Communications Broker.......................................................................... 4
2.1.2 Forwarding Event Logs from Windows 2012 R2 ........................................................... 6
2.2 PKWARE PKProtect ......................................................................................................9
2.2.1 Configure PKWARE with Active Directory..................................................................... 9
2.2.2 Create a New Administrative User.............................................................................. 11
2.2.3 Install Prerequisites..................................................................................................... 12
2.2.4 Install the PKProtect Agent ......................................................................................... 15
2.2.5 Configure Discovery and Reporting ............................................................................ 18
2.3 Cisco Duo ...................................................................................................................23
2.3.1 Installing Cisco Duo ..................................................................................................... 23
2.3.2 Registering a Duo User................................................................................................ 30
2.4 Cisco Stealthwatch .....................................................................................................31
2.4.1 Configure Stealthwatch Flow Collector ...................................................................... 31
2.4.2 Configure Stealthwatch Management Console .......................................................... 34
2.4.3 Add Stealthwatch Flow Collector to the Management Console.................................43
2.5 Dispel .........................................................................................................................49
2.5.1 Installation .................................................................................................................. 49
2.5.2 Configuring IP Addresses ............................................................................................ 52
2.5.3 Configuring Network ................................................................................................... 54
2.5.4 Adding a Device .......................................................................................................... 55
2.6 Integration: FireEye Helix and Cisco Stealthwatch .....................................................58
2.6.1 Configure the Helix Communications Broker ............................................................. 58
2.6.2 Configure Stealthwatch to Forward Events ................................................................ 59
2.7 Integration: FireEye Helix and PKWARE PKProtect ....................................................61
2.7.1 Configure the Helix Communications Broker ............................................................. 62
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches vii
2.7.2 Configure PKWARE PKProtect to Forward Events ......................................................62
2.8 Integration: FireEye Helix and Dispel .........................................................................64
2.9 Integration: Dispel and Cisco DUO .............................................................................64
Appendix A List of Acronyms ................................................................. 65
List of Figures
Figure 1-1 Data Confidentiality Detect, Respond, and Recover High-Level Architecture ........................ 3
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches viii
1 Introduction
The following volumes of this guide show information technology (IT) professionals and security
engineers how we implemented this example solution. We cover all of the products employed in this
reference design. We do not re-create the product manufacturers’ documentation, which is presumed
to be widely available. Rather, these volumes show how we incorporated the products together in our
lab environment.
Note: These are not comprehensive tutorials. There are many possible service and security configurations
for these products that are out of scope for this reference design.
Business decision makers, including chief security and technology officers, will be interested in the
Executive Summary, NIST SP 1800-29A, which describes the following topics:
IT professionals who want to implement an approach like this will find this whole practice guide useful.
You can use this How-To portion of the guide, NIST SP 1800-29C, to replicate all or parts of the build
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 1
created in our lab. This How-To portion of the guide provides specific product installation, configuration,
and integration instructions for implementing the example solution. We do not recreate the product
manufacturers’ documentation, which is generally widely available. Rather, we show how we
incorporated the products together in our environment to create an example solution.
This guide assumes that IT professionals have experience implementing security products within the
enterprise. While we have used a suite of commercial products to address this challenge, this guide does
not endorse these particular products. Your organization can adopt this solution or one that adheres to
these guidelines in whole, or you can use this guide as a starting point for tailoring and implementing
parts of the ability to detect, respond to, and recover from a loss of data confidentiality. Your
organization’s security experts should identify the products that will best integrate with your existing
tools and IT system infrastructure. We hope that you will seek products that are congruent with
applicable standards and best practices. Section 3.6, Technologies, lists the products that we used and
maps them to the cybersecurity controls provided by this reference solution.
A NIST Cybersecurity Practice Guide does not describe “the” solution but a possible solution. Comments,
suggestions, and success stories will improve subsequent versions of this guide. Please contribute your
thoughts to ds-nccoe@nist.gov.
The NCCoE worked with members of the Data Confidentiality Community of Interest to develop a
diverse (but non-comprehensive) set of security scenarios against which to test the reference
implementation. These are detailed in Volume B, Section 5.2.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 2
Typeface/Symbol Meaning Example
Monospace Bold command-line user input service sshd start
contrasted with computer
output
blue text link to other parts of the doc- All publications from NIST’s NCCoE
ument, a web Uniform Re- are available at
source Locator (URL) or an https://www.nccoe.nist.gov.
email address
Figure 1-1 Data Confidentiality Detect, Respond, and Recover High-Level Architecture
• Data Protection (PKWARE) involves maintaining the confidentiality and integrity of proprietary
data, even in the event of a security breach or outright theft.
• Event Detection and Monitoring (Stealthwatch) focuses on becoming aware of potential
intrusions by tracking the events that may indicate a breach of security and alerting the relevant
administrators.
• Log collection, collation and correlation (FireEye) refers to the proper monitoring of activity on
a system, and the analysis of that activity for any potential anomalous patterns or events.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 3
• User access controls (Cisco Duo) work to regulate and restrict the level of access different users
have, so that they can perform their work without providing unnecessary access that can be
turned to more malicious ends.
• Network Protection (Dispel) ensures that hosts on the network only communicate in allowed
ways, preventing side-channel attacks and attacks that rely on direct communication between
hosts. Furthermore, it protects against potentially malicious hosts joining or observing traffic
(encrypted or decrypted) traversing the network.
In this setup, we detail the installation of a communications broker that will be used to collect logs from
the enterprise and forward them to the cloud deployment. This installation took place on a CentOS 7
Virtual Machine.
2. Navigate to the folder containing the installer and run the following.
> sudo yum localinstall ./cbs-installer_1.4.2-9.x86_64.rpm
7. Copy the zip file to the Helix Communications Broker certificate directory.
> sudo cp bootstrap.zip /opt/tap-nxlog/cert
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 4
> cd /opt/tap-nxlog/cert
14. Enter the receiver URL provided in the Helix welcome email.
18. Select the Internet Protocol (IP) address of the machine where logs should be sent.
19. Enter 512 for the port number where logs should be sent.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 5
20. Select OK and press Enter.
2. Run nxlog-ce-2.10.2150.msi.
3. Click Next.
4. Check the box next to I accept the terms in the License Agreement.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 6
5. Click Next.
6. Click Next.
7. Click Install.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 7
8. Click Finish.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 8
Panic Soft
#NoFreeOnExit TRUE
Moduledir %ROOT%\modules
CacheDir %ROOT%\data
Pidfile %ROOT%\data\nxlog.pid
SpoolDir %ROOT%\data
<Extension _syslog>
Module xm_syslog
</Extension>
<Input in>
Module im_msvistalog
# For windows 2003 and earlier use the following:
# Module im_mseventlog
</Input>
<Output out>
Module om_tcp
Host 192.168.1.206
Port 512
Exec to_syslog_snare();
</Output>
<Route 1>
Path in => out
</Route>
12. You can verify that this connection is working by checking the logs in data\nxlog.log, and
by noting an increase in events on the Helix Dashboard.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 9
2. Once logged in, you can and should change the password to this administrative account by click-
ing Change Password in the top right corner.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 10
5. Enter the Kerberos Realm, NetBIOS Domain, as well as the username and password of an ad-
ministrative user on the domain.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 11
3. Enter the username of a user on the domain that should be able to login through the PKWARE
management portal (this is meant for administrators only).
5. Click Save.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 12
4. Select Current User.
5. Click Next.
6. Click Browse.
8. Click Next.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 13
9. Click Finish.
11. Repeat steps 1 through 10 but select Personal instead of Trusted Root Certification Au-
thorities.
12. Repeat steps 1 through 11 for each certificate that needs to be installed.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 14
13. Rename agent-registry.txt to agent-registry.reg.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 15
2. Click Next.
4. Click Next.
5. Select Typical.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 16
6. Click Next.
7. Click Install.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 17
8. Click Finish.
9. If a window to login is not automatically shown, you can right click the PKProtect icon in the
Windows taskbar and click Log in. If a window is automatically shown, click Log in.
10. Login using the username of the account in the domain, in email format (such as admin-
istrator@domain.id).
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 18
2. Click Add Discovery.
4. Select a pattern for the rule to discover. In this case, we are setting up a rule to detect social se-
curity numbers in files for reporting/remediation.
5. The Threshold field refers to how many of those patterns must be present in a document for the
rule to be applied.
6. Click Save.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 19
8. Click Add.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 20
14. Navigate to Archive > Assignments.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 21
16. Enter a Name for the Assignment.
19. Enter the names of the Active Directory users or groups this rule should apply to.
20. Enter the folders for this rule to search in Local Paths.
21. Use Whitelist and Blacklist to specify file types that should or should not be considered.
22. Enter the interval for this rule to run in Sweep Interval.
24. Select the Discovery rule created earlier under Smart Filter Bundles.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 22
25. Select the Remediation Action created earlier under Remediation Action.
27. This rule will now run automatically, reporting and encrypting files that match its discov-
ery conditions.
In the following section, we demonstrate the installation of Cisco Duo on an internal system in such a
way that Remote Desktop Protocol (RDP) and local login to that system are protected by multifactor
authentication.
2. Then connect to the internet, if not connected already, and go to the Duo Admin login page at
https://admin.duosecurity.com/.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 23
3. Login with your admin credentials and dual factor authentication to reach the administrator
dashboard.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 24
6. Search for, or scroll down to, Microsoft RDP.
7. Click Protect.
8. The next screen will provide policy configuration options, as well as the Integration Key, Secret
Key, and API hostname, which are required information for the next step. Either keep this win-
dow open or copy down those three pieces of information.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 25
9. Download the Duo Authentication for Windows Logon installer package, located at
https://dl.duosecurity.com/duo-win-login-latest.exe.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 26
13. Click Next.
14. Copy in the Integration and Secret Keys into the relevant fields and click Next.
16. Configure Duo’s integration options according to the needs of your organization. Note
that Bypass Duo authentication when offline will allow users to skip the two-factor authentica-
tion when offline, which increases the availability of their files but may increase risk.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 27
17. Click Next.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 28
20. Leave Enable UAC Elevation Protection unchecked.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 29
23. Click Finish.
24. Installation should now be complete. Users registered on the Duo Dashboard with a
linked phone will be allowed access to the system.
2. Click Add New > User from the drop-down menu on the right.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 30
4. Click Add User.
5. This will lead you to that user’s information page, where additional information (full name,
email, phone number) and Duo authenticators (phone numbers, Two-Factor Authentication
(2FA) hardware tokens, WebAuthn, etc.) can be associated with that username. Note: A user will
not be able to log into a Duo protected system unless the user is registered and has an authenti-
cation device associated with their username.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 31
3. Select OK and press Enter.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 32
7. Select OK and press Enter.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 33
9. Select Password and press Enter.
10. Change the password from the default password to a secure password.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 34
3. Select OK and press Enter.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 35
5. Select OK and press Enter.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 36
7. Select Password and press Enter.
9. Navigate to the Stealthwatch Management Console from a web browser. The URL will be
https://<<address of Stealthwatch MC>>.
10. Login using the default username and password (should be provided by product ven-
dor).
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 37
11. Click Continue.
12. Change the password for the admin account (this is the account used to log in to the
web interface).
14. Change the password for the root account (this is the account used to log in to the com-
mand line console).
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 38
15. Click Next.
17. Enter the domain for Stealthwatch, and the IP addresses Stealthwatch will be monitor-
ing.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 39
18. Click Next.
19. Add the Domain Name System (DNS) server(s) Stealthwatch should be using.
21. Enter the Network Time Protocol (NTP) server(s) Stealthwatch should use.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 40
22. Click Next.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 41
24. After it restarts, log in again, and click Continue.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 42
26. Click Go to Dashboard.
2. Login using the default username and password (should be provided by product vendor).
3. Click Continue.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 43
4. Change the passwords for the admin and root accounts.
5. Click Next.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 44
8. Click Next.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 45
12. Click Next.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 46
14. After it restarts, log in again, and click Continue.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 47
17. Accept the certificate by clicking Yes.
18. Enter the username and password for the Stealthwatch Management Console.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 48
21. Click Next.
2.5 Dispel
Dispel is a network protection and user access tool that we used to provide a Virtual Desktop
Infrastructure (VDI) capability. A typical deployment of Dispel is done in a largely managed fashion, with
a specific deployment being tailored to a network setup. The deployment in the NCCoE laboratory may
not be the best setup for any given network. The NCCoE deployment was done on an Ubuntu host with
north and south-facing network interfaces, placing the device in-line between the enterprise systems
and the external network.
2.5.1 Installation
1. Deploy an Ubuntu machine with the provided specifications, ensuring that a provided optical
disk image is attached to the device.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 49
2. Login with username “dispel” and the password provided.
4. Press enter on the following three prompts, modifying any default options as desired.
6. Press enter on the remaining prompts, modifying any default options as desired.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 50
7. Enter and re-enter a new password for the user dispel.
9. Power off the machine, remove the provided optical disk image, and power it back on.
10. Log in with the user “dispel” and the new password set in step 9.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 51
11. Type in the command > ifconfig | grep inet. Verify the output to make sure it
matches the desired network configuration. If not, see the next section.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 52
2. Type in the command > configure.
3. Type in the command > del interfaces ethernet eth0, or whichever interface you are
currently modifying.
4. Type in the command > set interfaces ethernet eth0 address followed by the de-
sired IP address in CIDR notation, modifying for the desired interface as appropriate.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 53
7. Type in the command > exit.
1. Type in the command > configure to the Dispel wicket device after logging in.
2. Type in the command > set protocols static route 0.0.0/0 next-hop fol-
lowed by the IP address of the router you wish to forward to.
6. On the designated router or firewall, ensure User Datagram Protocol (UDP) is allowed from the
Dispel device on the provided port. For the NCCoE deployment, port 1194 was utilized. A target
destination for the traffic will be provided by Dispel.
7. Modify the IP addresses of the south-side network interface to properly align with your net-
work. See the “Configuring IP Addresses” section above.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 54
2.5.4 Adding a Device
1. On the workstation in question, ensure that ping and RDP are accessible, including allowing such
connections through a local firewall.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 55
4. Under the Add Device window, fill out all fields, including Facility, Wicket, Name, Make, Model,
IP, and Protocol.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 56
6. Under Access for that device, search for the user(s) that will have access to that device. Verify
they have the correct access settings.
7. If a user is not already a member of the region, click on Members in the sidebar and click Invite.
Fill out relevant information for this individual and click Invite this Member.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 57
2.6 Integration: FireEye Helix and Cisco Stealthwatch
In the following section, Cisco Stealthwatch will be configured to forward logs to an on-premise Helix
Communications Broker. Cisco Stealthwatch, as a network monitoring solution, can provide logs
relevant to malicious network activity, potential data egress, as well as contextual information that can
aid in the early detection of confidentiality events and the assessment of damage after an attack on
confidentiality has occurred. An integration with the logging capability is useful for contextualizing
information provided by other tools, generating alerts, and providing historical archives for reporting
and compliance purposes.
3. Select syslog.
4. Select udp.
5. Select the IP address of the network interface that should receive logs.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 58
7. Select OK and press Enter.
4. Click the three dots next to Send to Syslog and click Edit.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 59
8. Click Save.
10. On the Actions tab, you can use some of the existing rules or create your own.
11. To create your own, click Add New Rule. For the purposes of this example, we select
FlowCollector System Alarm.
14. Click the plus sign under “Rule is triggered if”. You can select conditions for the rule to
trigger, based on severity, processing time, and type.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 60
15. Enable Send to Syslog in the Associated Actions section. You can enable syslog mes-
sages for when the alarm becomes active and inactive.
16. You can also configure email alerts through this interface to improve the response time
for incidents (this is a separate Action that needs to be edited on the Actions tab).
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 61
attack. An integration with the logging capability is useful for contextualizing information provided by
other tools, generating alerts, and providing historical archives for reporting and compliance purposes.
This section assumes the Helix Communications Broker has already been installed.
3. Select bsd.
4. Select tcp.
5. Select the IP address of the network interface that should receive logs.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 62
4. Next to Dashboard Elasticsearch Target, click Internal.
7. Click Save.
10. Enter the URL and port of the Helix Communications Broker that was just configured.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 63
12. Verify that PKWARE logs now show up in Helix.
1. This integration has two primary components. The first, configuring the route, is done locally on
the Dispel wicket. This can be done using the following commands. Ensure that you replace the
<subnet> and the <gateway> such that the Dispel wicket can accurately route to the Helix Com-
munications Broker.
> config
2. The second component is configured server-side and involves informing the Dispel wicket via
config file the actual port and location of the Helix Communications Broker. Instructions are not
included for this, as in this integration, it was necessary to perform this integration remotely via
the Dispel team.
In this particular integration, no extra work was required other than installing Cisco Duo (see Section
2.3) on systems to control remote desktop access between Dispel machines and the other machines.
However, it is important for organizations to check that this integration works and is present to ensure
that multifactor authentication is being applied to users who are logging in remotely.
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 64
Appendix A List of Acronyms
SIEM Security Information and Event Management
RDP Remote Desktop Protocol
IP Internet Protocol
TCP Transmission Control Protocol
SMC Stealthwatch Management Console
DNS Domain Name Service
NTP Network Time Protocol
2FA Two Factor Authentication
SFC Stealthwatch Flow Collector
UDP User Datagram Protocol
NIST SP 1800-29C: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches 65