top of page

How Confidencial Can Help Companies Comply with Executive Order 14117

Patrick Bryden

Executive Order 14117 introduces new restrictions on cross-border data sharing, specifically targeting six “countries of concern,” including China. Given the significance of these regulations, businesses worldwide should grasp their key implications. Regardless of where they do business, all companies should understand at least the basics of the new rule.


You can read our previous blog to catch up on those basics, but at a very high level, the new rules:

  • aim to help protect the sensitive data of American citizens and businesses

  • focus on companies/individuals from China (including Hong Kong and Macau), Russia, Iran, North Korea, Cuba, and Venezuela

  • restrict commercial data exchange as well as employment, investment, and contract agreements

  • require a broad set of security best practices and controls, from regular risk assessments down through specific guidance around encryption at rest


While many organizations probably already have these requirements in place, the new data protection controls might pose the biggest tactical challenge for existing security and compliance stacks. We’ll examine some of those now and discuss how Confidencial can help meet them.



What Executive Order 14117 means to data protection requirements—and how Confidencial was built for these kinds of challenges


The final CISA guidance has three essential layers: organization best practices and a set of technical system-level controls.


Best practices

  • Asset inventory maintenance

  • Designated accountability stakeholders

  • Regular vulnerability management

  • Complete vendor and supplier documentation

  • Network topologies

  • Controlled deployment policies

  • Incident response planning


System-level controls

  • Access restrictions

  • Multifactor Authentication (MFA)

  • (Timely) credential revocation

  • Log management

  • Unauthorized media prevention

  • Default denial configurations

  • Identity and credential management


The final set of rules, which we’ll look at in greater detail, is focused specifically on data protection. We’ll now look at how Confidencial and our new Cloud Protector DSPM help organizations enable many of these new requirements while also modernizing data sharing and security across the organization.


Rising to new rules and expectations

Confidencial was built on technology IP developed initially as part of DARPA efforts to enable secure data sharing at scale, at a speed that doesn’t slow teams down. It makes all those big-picture best practices, from risk assessment to log analytics, smarter and more effective.  

More importantly, Cloud Protector puts important encryption and privacy-enhancing techniques in place that specifically help organizations achieve compliance with the Executive Order.


What’s changing – and how Confidencial can help


Regular robust risk assessments

Organizations must now conduct regular data risk assessments to identify and analyze sensitive data and fine-tune their data security posture. However, this practice is currently uneven in many organizations, especially for unstructured data sources.  

Confidencial enhances organizations' ability to meet these new standards by ensuring they have a full view of all their data across multiple sources, including the cloud and on-premise, and inside more unstructured files, such as documents, spreadsheets, and images.

These assessments must also guide a data security posture, bringing new defenses to the riskiest data.  In this case, once a sensitive document has been detected,  Confidencial’s selective encryption works at the field level to only lock down what needs to be protected, leaving the rest ready for work.


Stricter data access management

They must also practice strict data access management policies, where user- and role-based access to data is managed by policy, and permissions can be automatically extended or terminated. This requires state-of-the-art controls.

Given the centrality of access control to overall policy, requiring data to be moved outside the environment to be either managed or monitored is highly counterproductive. Confidencial scans in place, never duplicating or moving files outside existing storage infrastructure while securing the data from restricted CPs and CoCs.


Complete audit trail

Similarly, logs must be collected, and an audit trail must be created across the entire sensitive data ecosystem.  Confidencial tracks all activity on protected data no matter where it moves across (or outside) the environment, a requirement of the new EO.


Data minimization

Organizations must deploy data minimization tactics with the goal of decreasing the linkability of any record and a specific person.  This is a problem for traditional data protection and redaction methods that require maintaining duplicate copies of files.

Because it’s locking down parts of the document and not the whole encryption, using Confidencial means no duplication is required. This helps reduce data footprint and the cost and complexity of data management and security.


Additional privacy techniques

They must also put additional privacy techniques in place, using methods to make access and exfiltration harder. This can include differential privacy and homomorphic encryption, both aimed at preserving security and usability. Because Confidencial only encrypts select portions of the file, it can be used alongside other tools.


Advanced encryption in transit and at rest

One of the biggest technical updates to the rules is the new requirement for encryption of both at-rest and in-transit data and rules around responsible and secure key management and storage.  Confidencial uses modern NIST-grade encryption with proven algorithms and key sizes to secure data both at rest and in transit with portable and persistent client-side protection. Confidencial meets additional encryption requirements.


  • Confidencial does not co-locate encryption keys with covered data

  • Confidencial does not store physical or virtual encryption keys in a country of concern

  • Confidencial can be specifically required to deny access to specific covered persons

  • All systems involved in sharing, managing, or storing data and encryption keys are subject to these security requirements, all of which are met by Confidencial


The Executive Order asks: is your data protection ready for what’s coming?

Whether you or your partners share data with individuals or organizations inside the listed countries of concern, the updated rules remind us that status quo security is never sufficient. This is especially true in the era of AI, where information is both an emerging risk and a growing opportunity.


  • Can your platform provide data encryption in transit and at rest?

  • Are you able to securely leverage all your shared data?

  • Are you struggling to scan for data both on-prem and in the cloud?


Questions about the Executive Order and how you can prepare?  We’re ready to help.

 
 
 

Comments


bottom of page