Navigating New Security Requirements under DOJ’s Bulk Data Regulations: Is NIST Compliance Enough?
Navigating New Security Requirements under DOJ’s Bulk Data Regulations: Is NIST Compliance Enough?
Question: My organization adheres to the NIST Cybersecurity Framework (version 2.0). Am I ready to process Restricted Transactions?
Answer: No, adhering to the NIST Cybersecurity Framework (CSF) does not necessarily mean you comply with the Cybersecurity and Infrastructure Security Agency’s (CISA) Security Requirements for Restricted Transactions[1] (Security Requirements). Although the Security Requirements are based upon specific subcategories of the NIST Cybersecurity Framework (CSF) Core and the Privacy Framework (PF) Core, in many cases, the Security Requirements go beyond the NIST standards.
While the Security Requirements only apply to Covered Systems[2] and Covered Data,[3] many of the Security Requirements are stricter than the NIST standards that CISA references. We discuss below the key areas and actions where subject companies may need to go beyond the NIST CSF and PF to meet the Security Requirements by April 8, 2025 (the effective date for the Bulk Sensitive Data Regulations).
Organizational- and System-Level Requirements: The Security Requirements are organized into two categories: (1) Organizational- and System-Level Requirements and (2) Data-Level Requirements. Security Requirements in the first category are mandatory; all of the Organizational- and System-Level Requirements must be implemented before a company can participate in Restricted Transactions. We discuss below non-exclusive examples where subject companies may need to implement controls beyond the NIST CSF to meet the Security Requirements:
Organizational-Level
System-Level
For all Covered Systems:
Data-Level Requirements: The Data-Level Requirements are somewhat flexible because subject companies may choose any combination of the listed data mitigation strategies so long as they are sufficient to fully and effectively prevent access to Covered Data that is linkable, identifiable, unencrypted, or decryptable (using commonly available technology) by covered persons and/or countries of concern.
In addition to the requirement to fully and effectively prevent access to Covered Data, and similar to the Organizational- and System-Level Requirements, there are also areas where subject companies may need to go beyond the NIST PF to meet the Security Requirements:
[1] The Security Requirements are set forth by CISA. “Restricted Transactions” and other terms are defined in the Bulk Sensitive Data Regulations.
[2] A Covered System:
An Information System means a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.
[3] Covered Data means government-related data or bulk U.S. sensitive personal data.
[4] For the purposes of this requirement, CISA considers comprehensive encryption to mean cryptographic algorithms, ciphers, and protocols that are ordinarily accepted by U.S. persons with significant expertise in cryptography as being sufficient to provide confidentiality and integrity protections to sensitive data against compromise by currently known techniques and a level of computing power that is reasonably foreseeable to be available to any person, organization, or country in the near future. CISA considers U.S. government-approved encryption algorithms, ciphers, and protocols to meet this standard, but organizations may determine that other algorithms, ciphers, and protocols also qualify. For connections made using Transport Layer Security (TLS), only version 1.2 or higher is considered comprehensive encryption.