SlideShare a Scribd company logo
1 of 18
Protecting Student Data: What you need to know about Controlled Unclassified Information
Jason Gray
U.S. Department of Education
2021 Virtual FSA Training Conference for Financial Aid Professionals
BREAKOUT SESSION #22
AGENDA
2
1. Overview
2. Driving the Change
3. NIST SP 800-171
4. Future State
OVERVIEW
3
WHY ARE WE HERE?
• Cybersecurity incidents and risks are increasing on Institution Campuses
• IHEs handle some of the most sensitive financial and privacy data
• The Federal government has mandated additional protective measures for data
that is deemed to be sensitive and classified as Controlled Unclassified
Information (CUI). Examples of CUI:
• Privacy Information: Military Personnel Records, Personnel Records, Student Records,
• Sensitive Personally Identifiable Information
• Federal Taxpayer Information
• Financial: Electronic Funds Transfer, Financial Supervision Information, General Financial
Information
• Applies to Federal contractors, subcontractors, state, local, and tribal
governments, colleges and universities.
4
CAMPUS CYBERSECURITY PROGRAM
Mission
Monitor and reduce cybersecurity
risks to enhance the protection of
FSA student financial assistance
program data, which are collected,
received, processed, stored,
transmitted, or destroyed by FSA,
IHEs, and third-party servicers.
Vision
Enable America’s students and
borrowers to confidently
participate in federal financial
assistance education programs
knowing that their financial
information and the integrity of
their transactions are protected.
Objectives
• Educate, support, and incentivize
partners to mature their
cybersecurity postures;
• Protect CUI;
• Support IHE compliance with the
Gramm-Leach-Bliley Act (GLBA) as
well as other applicable mandates;
• Mature FSA’s Title IV data breach
capabilities and processes.
DRIVING THE CHANGE
6
Campus Cybersecurity Program
• GLBA Compliance
• Proactive Risk Management
• NIST SP 800-171 Compliance
OUR FOCUS
7
PROGRAM GOALS
8
Understand Risks
Provide visibility into Institutions of
Higher Education (IHE) compliance
with Federal guidelines and their
maturity level
Identify Trends
Identify trends that differentiate
IHEs with more mature
cybersecurity security postures vs
IHEs that need some support to
enhance their program
Aid Decisions
Provide a holistic view of the
cybersecurity posture of IHEs
to facilitate program decisions
NIST SP 800-171
9
WHAT IS NIST 800-171?
NIST Special Publication 800-171 defines the security requirements
(controls) required to protect CUI in nonfederal information systems
and organizations.
• Information systems that process, store, or transmit CUI may be
federal or nonfederal
• When federal (including contractors operating on behalf of),
agency security requirements are applied
• When non-federal, SP 800-171 security requirements are applied
10
WHY A STANDARD FRAMEWORK
• Over 100 different ways of characterizing sensitive information
• No common definition or protocols
• Information inconsistently marked
• Common definition and standardize processes and procedures
• CUI Protection requirements are defined in National Institute of
Standards and Technology (NIST) Special Publication NIST Special
Publication (SP) 800-171, Protecting Controlled Unclassified
Information in Nonfederal Systems and Organizations
11
NIST 800-171 – THE SIMPLE VERSION
• Access Control: Who is authorized to view this data?
• Awareness and Training: Are people properly instructed in how to treat this info?
• Audit and Accountability: Are records kept of authorized and unauthorized access? Can
violators be identified?
• Configuration Management: How are your networks and safety protocols built and
documented?
• Identification and Authentication: What users are approved to access CUI and how are
they verified prior to granting them access?
• Incident Response: What’s the process if a breach or security threat occurs, including
proper notification?
• Maintenance: What timeline exists for routine maintenance, and who is responsible?
12
NIST 800-171 – THE SIMPLE VERSION (CONT.)
• Media Protection: How are electronic and hard copy records and backups safely stored?
Who has access?
• Physical Protection: Who has access to systems, equipment and storage environments?
• Personnel Security: How are employees screened prior to granting them access to CUI?
• Risk Assessment: Are defenses tested in simulations? Are operations or individuals
verified regularly?
• Security Assessment: Are processes and procedures still effective? Are improvements
needed?
• System and Communications Protection: Is information regularly monitored and
controlled at key internal and external transmission points?
• System and Information Integrity: How quickly are possible threats detected, identified
and corrected?
13
THE DRIVER
Executive Order 13556
Information that law, regulation, or government-wide policy requires
to have safeguarding or disseminating controls, excluding information
that is classified under Executive Order 13526, Classified National
Security Information, December 29, 2009, or any predecessor or
successor order, or the Atomic Energy Act of 1954, as amended.
14
FUTURE STATE
15
GENERAL PLANNING ASSUMPTIONS
IHEs have information technology infrastructures in place…but they are not
developing or acquiring systems specifically for the purpose of processing,
storing, or transmitting CUI
IHEs have safeguarding measures in place to protect their information…but
they may not be sufficient to satisfy the CUI requirements
IHEs may not have the necessary organizational structure or resources to
satisfy every CUI security requirement.
• Can implement alternative, but equally effective, security measures
• Can implement a variety of potential security solutions
• Directly or by using managed services
16
IHE NEXT STEPS
• Department issued guidance on protecting CUI.
• FSA recommends conducting a self-assessment –
• Some security controls may not be applicable to your environment
• Build off what you are currently doing
• There may be other ways to meet the requirements
• Look at some cost-effective best practices:
• Isolate CUI into its own security domain by applying architectural design
concepts
• Security domains may employ physical separation, logical separation, or a
combination of both
• Use the same CUI infrastructure where possible
17
Please send questions to:
FSA_IHECyberCompliance@ed.gov
Q&A

More Related Content

Similar to 2021FSAConfSession22.pptx

9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdfSoniaCristina49
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Cyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandCyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandHighervista
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysislearfield
 
Equifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningEquifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningBlack Duck by Synopsys
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROLshinydey
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...acemindia
 
1 info sec+risk-mgmt
1 info sec+risk-mgmt1 info sec+risk-mgmt
1 info sec+risk-mgmtmadunix
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)Kathy_67
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdfChunLei(peter) Che
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptxcejobelle
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016centralohioissa
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance Raffa Learning Community
 

Similar to 2021FSAConfSession22.pptx (20)

9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Cyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandCyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarland
 
12 security policies
12 security policies12 security policies
12 security policies
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
 
Equifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningEquifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability Scanning
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
1 info sec+risk-mgmt
1 info sec+risk-mgmt1 info sec+risk-mgmt
1 info sec+risk-mgmt
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 
DR PANKAJ SIR (1).pptx
DR PANKAJ SIR (1).pptxDR PANKAJ SIR (1).pptx
DR PANKAJ SIR (1).pptx
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance
 

Recently uploaded

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 

Recently uploaded (20)

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 

2021FSAConfSession22.pptx

  • 1. Protecting Student Data: What you need to know about Controlled Unclassified Information Jason Gray U.S. Department of Education 2021 Virtual FSA Training Conference for Financial Aid Professionals BREAKOUT SESSION #22
  • 2. AGENDA 2 1. Overview 2. Driving the Change 3. NIST SP 800-171 4. Future State
  • 4. WHY ARE WE HERE? • Cybersecurity incidents and risks are increasing on Institution Campuses • IHEs handle some of the most sensitive financial and privacy data • The Federal government has mandated additional protective measures for data that is deemed to be sensitive and classified as Controlled Unclassified Information (CUI). Examples of CUI: • Privacy Information: Military Personnel Records, Personnel Records, Student Records, • Sensitive Personally Identifiable Information • Federal Taxpayer Information • Financial: Electronic Funds Transfer, Financial Supervision Information, General Financial Information • Applies to Federal contractors, subcontractors, state, local, and tribal governments, colleges and universities. 4
  • 5. CAMPUS CYBERSECURITY PROGRAM Mission Monitor and reduce cybersecurity risks to enhance the protection of FSA student financial assistance program data, which are collected, received, processed, stored, transmitted, or destroyed by FSA, IHEs, and third-party servicers. Vision Enable America’s students and borrowers to confidently participate in federal financial assistance education programs knowing that their financial information and the integrity of their transactions are protected. Objectives • Educate, support, and incentivize partners to mature their cybersecurity postures; • Protect CUI; • Support IHE compliance with the Gramm-Leach-Bliley Act (GLBA) as well as other applicable mandates; • Mature FSA’s Title IV data breach capabilities and processes.
  • 7. Campus Cybersecurity Program • GLBA Compliance • Proactive Risk Management • NIST SP 800-171 Compliance OUR FOCUS 7
  • 8. PROGRAM GOALS 8 Understand Risks Provide visibility into Institutions of Higher Education (IHE) compliance with Federal guidelines and their maturity level Identify Trends Identify trends that differentiate IHEs with more mature cybersecurity security postures vs IHEs that need some support to enhance their program Aid Decisions Provide a holistic view of the cybersecurity posture of IHEs to facilitate program decisions
  • 10. WHAT IS NIST 800-171? NIST Special Publication 800-171 defines the security requirements (controls) required to protect CUI in nonfederal information systems and organizations. • Information systems that process, store, or transmit CUI may be federal or nonfederal • When federal (including contractors operating on behalf of), agency security requirements are applied • When non-federal, SP 800-171 security requirements are applied 10
  • 11. WHY A STANDARD FRAMEWORK • Over 100 different ways of characterizing sensitive information • No common definition or protocols • Information inconsistently marked • Common definition and standardize processes and procedures • CUI Protection requirements are defined in National Institute of Standards and Technology (NIST) Special Publication NIST Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations 11
  • 12. NIST 800-171 – THE SIMPLE VERSION • Access Control: Who is authorized to view this data? • Awareness and Training: Are people properly instructed in how to treat this info? • Audit and Accountability: Are records kept of authorized and unauthorized access? Can violators be identified? • Configuration Management: How are your networks and safety protocols built and documented? • Identification and Authentication: What users are approved to access CUI and how are they verified prior to granting them access? • Incident Response: What’s the process if a breach or security threat occurs, including proper notification? • Maintenance: What timeline exists for routine maintenance, and who is responsible? 12
  • 13. NIST 800-171 – THE SIMPLE VERSION (CONT.) • Media Protection: How are electronic and hard copy records and backups safely stored? Who has access? • Physical Protection: Who has access to systems, equipment and storage environments? • Personnel Security: How are employees screened prior to granting them access to CUI? • Risk Assessment: Are defenses tested in simulations? Are operations or individuals verified regularly? • Security Assessment: Are processes and procedures still effective? Are improvements needed? • System and Communications Protection: Is information regularly monitored and controlled at key internal and external transmission points? • System and Information Integrity: How quickly are possible threats detected, identified and corrected? 13
  • 14. THE DRIVER Executive Order 13556 Information that law, regulation, or government-wide policy requires to have safeguarding or disseminating controls, excluding information that is classified under Executive Order 13526, Classified National Security Information, December 29, 2009, or any predecessor or successor order, or the Atomic Energy Act of 1954, as amended. 14
  • 16. GENERAL PLANNING ASSUMPTIONS IHEs have information technology infrastructures in place…but they are not developing or acquiring systems specifically for the purpose of processing, storing, or transmitting CUI IHEs have safeguarding measures in place to protect their information…but they may not be sufficient to satisfy the CUI requirements IHEs may not have the necessary organizational structure or resources to satisfy every CUI security requirement. • Can implement alternative, but equally effective, security measures • Can implement a variety of potential security solutions • Directly or by using managed services 16
  • 17. IHE NEXT STEPS • Department issued guidance on protecting CUI. • FSA recommends conducting a self-assessment – • Some security controls may not be applicable to your environment • Build off what you are currently doing • There may be other ways to meet the requirements • Look at some cost-effective best practices: • Isolate CUI into its own security domain by applying architectural design concepts • Security domains may employ physical separation, logical separation, or a combination of both • Use the same CUI infrastructure where possible 17
  • 18. Please send questions to: FSA_IHECyberCompliance@ed.gov Q&A