Top Banner
NIST Privacy Engineering: Risk Model and Assessment NIST Information Security and Privacy Advisory Board June 28, 2017
28

NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

May 22, 2018

Download

Documents

haxuyen
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

NIST Privacy Engineering: Risk Model and AssessmentNIST Information Security and Privacy Advisory BoardJune 28, 2017

Page 2: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Trustworthy Systems: Foundational to a Digital Society

What makes systems trustworthy?• Multiple attributes of trustworthiness include security, safety, reliability, etc.• Privacy must be considered one of the attributes

How can we know if systems are trustworthy?• Repeatable and measurable approaches help provide a sufficient base of

evidence• Privacy needs a body of guidance for repeatable and measurable approaches

similar to other attributes of trustworthiness

Page 3: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Friction in Our Digital World

45% of online households reported that privacy or security concerns stopped them from:*

• Conducting financial transactions;• Buying goods or services; • Posting on social networks; or • Expressing opinions on controversial or political issues via the Internet.

*July 2015 data collected for NTIA at https://www.ntia.doc.gov/blog/2016/first-look-internet-use-2015

Page 4: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Primary Federal Driver

OMB July 2016 update to Circular A-130:

• Agencies’ obligations with respect to managing privacy risk and information resources extend beyond compliance with privacy laws, regulations, and policies

• Agencies must apply the NIST Risk Management Framework in their privacy programs

Page 5: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Federal Security and Privacy Legal FoundationsFISMA – Federal Information Security Management Act

• Requires implementation of “information security protections commensurate with the risk and magnitude of the harm”

The Privacy Act of 1974• Establishes a code of fair information practices that governs the

collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by federal agencies.

Page 6: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

NISTIR 8062

An Introduction to Privacy Engineering and

Risk Management in Federal Systems

Page 7: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Information Security and Privacy: Boundaries and Overlap

Page 8: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Risk Model

Risk models define the risk factors to be assessed

and the relationships among those factors.

Risk factors are inputs to

determining levels of risk.

Page 9: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Risk factors:

Likelihood |Vulnerability | Threat | Impact

Security Risk Model

Page 10: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Processing PII Can Create Problems for Individuals

Page 11: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

NIST Working Model for System Privacy Risk

Privacy Risk Factors: Likelihood |Problematic Data Action |Impact

Likelihood is a contextual analysis that a data action is

likely to create a problem for a representative set of individuals

Note: Contextual analysis is based on the data action performed by the system, the PII being processed, and a set of contextual considerations

Impact is an analysis of the costs should the problem occur

Page 12: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

NIST Privacy Engineering Objectives• Design characteristics or properties of the system• Support policy through mapping of system capabilities• Support control mapping

Page 13: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

A Driver for System Capabilities

Page 14: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Putting It All Together

Page 15: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Frame Business

Objectives

Frame Org Privacy

Governance

Assess System Design

Assess Privacy Risk

Select Privacy

Controls

Monitor Change

Privacy Risk Assessment MethodologyApplying the Privacy Risk Model

Page 16: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Primary Benefits

Informed Risk Decisions

Communication Collaboration

Page 17: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Frame Business Objectives• Preserve benefits while mitigating

privacy risk• Establishes collaboration between

business owners and privacy engineering

Describe the functionality of the system(s).

Describe the business needs that system(s) serve.

• Privacy as competitive advantage• Trace controls back to requirements

Describe how the system will be marketed, with respect to any privacy-

preserving functionality.

Frame Business

Objectives

Frame Org Privacy

Governance

Assess System Design

Assess Privacy Risk

Select Privacy

Controls

Monitor Change

Presenter
Presentation Notes
Frame the business objectives for the system(s), including the organizational needs served.
Page 18: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Frame Privacy Governance

• 1st question: Can we?• 2nd question: Should

we?

Identify any privacy-related statutory, regulatory, or contractual obligations.Identify any privacy-related principles to which the organization adheres (FIPPs, Privacy by Design, etc.). Identify any organizational privacy policies

Frame Business

Objectives

Frame Org Privacy

Governance

Assess System Design

Assess Privacy Risk

Select Privacy

Controls

Monitor Change

Presenter
Presentation Notes
Frame the organizational privacy governance by defining legal, regulatory and policy privacy requirements Defining transparency: -Privacy, transparency: an openness of process, telling users how long you’re protecting their information, how long you’re keeping it for, etc. -Security, transparent system design: individuals shouldn’t be able to see what’s going on behind the scenes; the system is invisible to them, and users have a smooth
Page 19: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Assess System Design – Data Map Frame Business

Objectives

Frame Org Privacy

Governance

Assess System Design

Assess Privacy Risk

Select Privacy

Controls

Monitor Change

ACME IDP

Generation/Transformation

Retention/Logging DisposalCollection

(2)

Data Key:1. Self-asserted full name, validated email, user profile access2. Driver’s license (DOB, photo, legal name, physical attributes, address, signature, license number), Social Security card, cellular number3. DOB, legal name, address, SSN, cellular number

User

(3)

(1, 3, 4, 5, 6)

Disclosure/Transfer

(4)

OTP Provider

Cloud Storage Provider Individual

Data Store

Web Application

ACME

Third Party

Government

Cell phone

Documents

LEGENDSocial Media

Site

(5)(3,4)

Govt. Storage

User

Government Benefits

(7,8)(8)

(9)

(7, 9, 6)

(1)

Third Party in-person

identity proofing When a business owner, an engineer, and a privacy pro sit at a table…

Surprise! We’re doing what with data?

Presenter
Presentation Notes
Check for glaring issues in the data map ->You collected the info, and you stored it. Now what? ->Drop it on the floor
Page 20: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Assess System Design - Context Frame Business

Objectives

Frame Org Privacy

Governance

Assess System Design

Assess Privacy Risk

Select Privacy

Controls

Monitor Change

Presenter
Presentation Notes
Privacy expertise needed to understand and integrate the contextual factors
Page 21: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Assess Privacy Risk Frame Business

Objectives

Frame Org Privacy

Governance

Assess System Design

Assess Privacy Risk

Select Privacy

Controls

Monitor Change

Presenter
Presentation Notes
This worksheet demonstrates the privacy risk model introduced in the NISTIR. Using a semi-quantitative analytic approach to prioritize privacy risks.
Page 22: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Assess Privacy Risk Frame Business

Objectives

Frame Org Privacy

Governance

Assess System Design

Assess Privacy Risk

Select Privacy

Controls

Monitor Change

AB

R

D

E

F

G

HI

J

K

L

M

N

O

P

QC

S

T

U

V

W

X

Y

DD

AA

BB

CC

Z

EE

0

5

10

15

20

25

30

35

40

45

50

0 1 2 3 4 5 6 7 8 9 10

Impa

ct

Likelihood

Problem Prioritization Heat Map

• Communicate with leadership

• Definable problems lead to actionable solutions

Presenter
Presentation Notes
Making the case to hire. Pilot used completed heat map to make the case to senior leadership for hiring additional privacy resources to mitigate identified privacy risks.
Page 23: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Select Privacy Controls Frame Business

Objectives

Frame Org Privacy

Governance

Assess System Design

Assess Privacy Risk

Select Privacy

Controls

Monitor Change

Page 24: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Informed Risk Decisions

Mitigate | Avoid | Accept | Transfer Whatever the decision, it’s informed by a reasoned process.

The PRAM…• Surfaces trade-offs• Is at a level that all parties can understand • Leads to solutions

Frame Business

Objectives

Frame Org Privacy

Governance

Assess System Design

Assess Privacy Risk

Select Privacy

Controls

Monitor Change

Presenter
Presentation Notes
The PRAM enables senior leadership to consider privacy risks in parity with their considerations of security risks, financial risks, etc.
Page 25: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Next Steps

Page 26: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Guidance Roadmap

Page 27: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Improving the PRAMToo manual

Refining problematic data action (PDA) likelihood analysis

Integrating individual impact Generalizable PDAs and solutions within domains?

Develop a privacy engineering toolkit

collaboration space?

Page 28: NIST Privacy Engineering - CSRC · Trustworthy Systems: Foundational to a Digital Society What makes systems trustworthy? • Multiple attributes of trustworthiness include security,

Resources Naomi [email protected]

Ellen [email protected]

NIST Privacy Engineering Website: https://www.nist.gov/programs-projects/privacy-engineering

NIST Internal Report 8062https://doi.org/10.6028/NIST.IR.8062