Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the...

24
Privacy Engineering at NIST

Transcript of Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the...

Page 1: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Privacy Engineering at NIST

Page 2: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security, safety, reliability, etc. • Privacy must be considered one of the attributes

How can we know if systems are trustworthy? • Repeatable and measurable approaches help provide a sufficient base of

evidence

• Privacy needs a body of guidance for repeatable and measurable approachessimilarto otherattributesof trustworthiness

Page 3: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Information Security and Privacy: Boundaries and Overlap

Page 4: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Processing PII Can Create Problems for Individuals

Page 5: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Identifying Risk A measure of the extent to which an entity is threatened by a potential circumstance or event

A function of: • Likelihood of occurrence • Adverse impact that would occur

Security Risk = Vulnerability * Threat * Impact

Page 6: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

System Privacy Risk Model Privacy Risk = Likelihood of a Problematic Data Action * Impact of a

Problematic Data Action

Likelihood is a contextual analysis that a data action is likely to create a problem for a representative set of individuals

Note: Contextual analysis is based on the data action performed by the system, the PII being processed, and a set of contextual considerations

Impact is an analysis of the indirect costs to an organization

should the problem occur

Page 7: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Risk Management Risk can never be eliminated, so it must be managed.

RiskResponses RiskDecisions

• Accept Risk • Organization-wide process • Avoid risk • Optimization factors • Mitigate risk include: mission objectives;

other risk areas (financial, • Transfer/share risk legal, etc.)

Page 8: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Frame Business

Assess Privacy Risk

Design Privacy Controls

Monitor Change Objectives

Frame Org Privacy

Governance

Assess System Design

Privacy Risk Assessment

Page 9: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Systems Engineering •An important objective is to deliver systems that are deemed trustworthy

•Balances the often conflicting design constraints of performance, cost, schedule, and effectivenesstooptimizethesolution whileproviding an acceptable level of risk. •Holistic processthatmustaccountfor theneedsand expectationsof stakeholders is particularly relevant for privacy. “Privacy engineers” can take individuals’ privacy interests into account, resulting in asystem that may be less likely to create problems for them.

Page 10: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Frame Business Objectives Frame the business objectives for the system(s), including the organizational needs served.

• Describe the functionality of your system(s).

Frame Business Objectives

Frame Org Privacy

Governance

Assess System Design

Assess Privacy Risk

Design Privacy Controls

Monitor Change

• Describe the business needs that your system(s) serve. • Describe how your system will be marketed, with respect to any

privacy-preserving functionality.

Page 11: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Frame Privacy Governance Frame the organizational privacy governance by identifying privacy-related legal obligations, principles, organizational goalsand other commitments.

• LegalEnvironment:Identify any privacy-related statutory,

Frame Business Objectives

Frame Org Privacy

Governance

Assess System Design

Assess Privacy Risk

Design Privacy Controls

Monitor Change

regulatory, contractual and/or other frameworks within which the pilot must operate.

• Identify any privacy-related principles or other commitments to which the organization adheres (FIPPs, Privacy by Design, etc.).

• Identify any privacy goals that are explicit or implicit in the organization’s vision and/or mission.

• Identify any privacy-related policies or statements within the organization, or business unit.

Page 12: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Data Key:1. Self-asserted full name, validated email, user profile access2. Driver’s license (DOB, photo, legal name, physical attributes, address, signature, license number), Social Security card,cellular number3. DOB, legal name, address, SSN, cellular number4. Name, address, cellular number5. Token identifier6. Transactional information7. Username8. One-time password (OTP)9. User identifier

ACMEIDP

(3)

(1,3,4,5,6)

CloudStorageProvider

(5)(3,4)

GovernmentBenefits

7 8

(9)

(7,9,6)

Assess System Design – Data Actions Generation/

Transformation Retention/ Disclosure/ Logging

Disposal Collection Transfer

LEGEND

(2)

User

(4)

OTP Provider

Social Media Site

Govt. Storage

User

( , ) (8)

(1)

Third Party in-person

identity proofing

Individual

Data Store

Web Application

ACME

Third Party

Government

Cell phone

Documents

Frame Business Objectives

Frame Org Privacy

Governance

Assess System Design

Assess Privacy Risk

Design Privacy Controls

Monitor Change

Page 13: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Assess System Design - Context Monitor Change

Assess System Design

Assess PrivacyRisk

Design Privacy Controls

Frame Business Objectives

FrameOrg Privacy

Governance

Page 14: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Assess Privacy Risk Design Privacy Controls

Monitor Change

Frame Business Objectives

Frame Org Privacy

Governance

Assess System Design

Assess Privacy Risk

Page 15: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Assess Privacy Risk Problem Prioritization Heat Map

50

45

A B

R

D

E

F

G

HI

J

K

L

M

O

P

Q

C U

V

W

DD

AA

BB

CC

Z

EE

S 40

35

N X 30

25

20

15 Y

10 T

5

0 0 1 2 3 4 5 6 7 8 9 10

Likelihood

Frame Business Objectives

Frame Org Privacy

Governance

Assess System Design

Assess Privacy Risk

Design Privacy Controls

Monitor Change

Impact

Page 16: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

NISTPrivacy EngineeringObjectives

• Design characteristics or properties of the system

• Support policy through mapping of system capabilities • Support control mapping

enabling reliable assumptions by individuals, owners, and operators about PII and its processing by a system

Manageability

Disassociability

Predictability

providing the capability for granular administration of PII including alteration, deletion, and selectivedisclosure

enabling the processing of PII or events without association to individuals or devices beyond theoperational requirements of the system

Page 17: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

A Driver for System Capabilities

Page 18: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Putting It All Together

Page 19: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Guidance Roadmap

Page 20: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

800-53 Current Drivers •OMB update in July 2016 to Circular A-130clarified that federalagencies’ obligationswith respect to managing privacy risk and information resources extends beyond compliance with privacy laws, regulations, and policies, and that agencies must apply the NIST Risk Management Framework (NIST RMF) to their privacy programs and Information Systems.

•NIST Special Publication (SP) 800-53Security and Privacy Controlsfor FederalInformation Systems and Organizations is in the revision 5 cycle now.

Page 21: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

800-53 Rev. 5 Proposed Control Families Control Identifiers and Family Names

ID FAMILY ID FAMILY

AC Access Control MP Media Protection

AT Awareness and Training PA Privacy Authorization

AU Audit and Accountability PE Physical and Environmental Protection

CA Assessment and Authorization PL Planning

CM Configuration Management PM Program Management

CP Contingency Planning PS Personnel Security

IA Identification and Authentication RA Risk Assessment

IP Individual Participation SA System and Services Acquisition

IR Incident Response SC System and Communications Protection

MA Maintenance SI System and Information Integrity

Page 22: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Proposed New Privacy Families Privacy Authorization Individual Participation

PA-1 Privacy Authorization Policy and Procedures IP-1 Individual Participation Policy and Procedures

PA-2 Authority to Collect IP-2 Consent

PA-3 Purpose Specification IP-3 Redress

PA-4 Information Sharing with Third Parties IP-4 Privacy Notice

IP-5 Privacy Act Statements

IP-6 Individual Access

Page 23: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Proposed PM Control Family Security & Integrated Controls Privacy Controls

Information Security Program Plan

Senior Information Security Officer

Information Security and Privacy Resources

Plan of Action and Milestones Process

System Inventory

Information Security and Privacy Measures of Performance

Enterprise Architecture

Critical Infrastructure Plan

Risk Management Strategy

Authorization Process

Mission and Business Process Definition

Insider Threat Program

Information Security and Privacy Workforce

Testing, Training, and Monitoring

Contacts with Groups and Associations

Threat Awareness Program

Agency Privacy Program Plan

Senior Agency Official for Privacy

System of Records Notices

Dissemination of Privacy Program Information

Accounting of Disclosures

Data Quality Management

Data Management Board

Data Integrity Board

Minimization of Personally IdentifiableInformation in Testing, Training, and Research

Individual AccessControl

Complaint Management

Inventory of Personally IdentifiableInformation

Privacy Reporting

Page 24: Privacy Engineering at NIST · Frame Business Objectives Frame the business objectives for the system(s), including the organizationalneeds served. • Describe the functionality

Resources Ellen Nadeau

[email protected]

NIST Privacy Engineering Website: https://www.nist.gov/programs-projects/privacy-engineering

NIST Internal Report 8062

https://doi.org/10.6028/NIST.IR.8062