Managing Multiple Data Types in Single Enclave 

February 2025

Resources >> Ask The Assessor >> Managing Multiple Data Types in Single Enclave
RRCoP Community Question to the Assessors

Can a single enclave infrastructure securely handle multiple data classification types (e.g., HIPAA, ITAR, DFARS, FERPA) provided the required security controls (NIST 800-171) are followed? 

published: February 2025

[View & Download Full Fraizer & Deeter Responses including the three additional sub-questions

[Additional context and university-specific use cases]

Assessor Response: 

A single enclave can securely handle multiple data classifications; however, the entity must consider all in-scope regulatory and contractual requirements per each type of data classification.

When handling multiple data types, it is important to understand how controls must be implemented to ensure compliance with each relevant regulation or framework, independently of the others. Similar control requirements across each framework or regulation should be implemented and maintained at the most stringent level. This can be performed by consolidating all relevant regulations and frameworks into a custom control set fit for the type of data being stored within the enclave environment. There are numerous mappings available that can help with this.

While controls need to be implemented at the strictest level, there are a number of baseline security controls that are fairly universal in principle that should be implemented when deploying this environment.

Additional context and university-specific use cases

RRCoP Context:

Universities are increasingly required to host and manage multiple regulated data types (e.g., HIPAA, ITAR, DFARS, FERPA) on a single system to balance operational cost and efficiency with regulatory compliance. The central challenge is whether appropriate data separation mechanisms in the controls (e.g., authentication, encryption, and permission management) meet compliance requirements.

Questions

General Approach Described

Various academic institutions have implemented enclaves using the following principles.

Separation Methods:

Compliance Frameworks:

Access Control and Monitoring:

Example Use Cases

University One

We operate two compliant systems that hold various data types in a single system. ENCLAVE-ONE satisfies HITRUST CSF 9.3 for HIPAA to be allowed to hold and process PHI. Data is separated by folders in the file system and controlled by Unix group permissions. This system holds open data as well as PHI and FERPA data, and intellectual property data. It also holds EAR controlled software.


ENCLAVE-TWO satisfies 800-53 Moderate and 800-171 and can satisfy HIPAA, FERPA, DFARS, ITAR, EAR, etc. Data is separated by encryption and PKI. There are controls to explicitly share data and access and grant permissions to download.


University Two

The ENCLAVE-THREE provides researchers with high-performance, secure, and flexible computing environments enabling the analysis of sensitive data sets restricted by federal privacy laws, proprietary access agreements, or confidentiality requirements.


The ENCLAVE-THREE is a virtual server environment designed for the secure hosting and analysis of restricted research data. The environment is designed to create one or more walled off areas, called researcher-enclaves, where researchers’ data are segregated from other researchers’ projects in a flexible manner (that is, to say, as coarse or fine-grained a manner as necessary).


Datatypes on the same system


Separation


University Three

ENCLAVE-FOUR is configured (within VMWare) so that each tenant is on its own VLAN and isolated from other tenants within the system. The only cross-VLAN traffic is to central services, including managed file transfer in and out of the enclave, and controlled access to specific external resources.


External resources include items such as reports uploaded to agency SFTP servers, specimen label printers in the lab, etc.


Cross-VLAN traffic is managed by the enclave firewall, Internet traffic by forward and reverse proxies as well as the firewall.


University Four

University Four has an authentication and authorization service, separate from the service supporting the campus, for access control to several secure research services. Enclave five utilizes virtual machines hosted in a Cloud service that supports government data. Each research project contains computing and storage resources segregated from other research projects using security groups. Security groups define what ports are available and IP address space can access the resources within the security group. All data is encrypted at rest. The services processing, storing, or transmitting controlled data run in private IP space. Access to the Cloud virtual machines is only authorized through a full-tunnel VPN and multi-factor authentication services separate from similar services that support the campus. While enclave five is designed to support both CUI and PHI, projects working with PHI data are subject to all the requirements for CUI data.


Frazier & Deeter Responses - with 3 additional responses

Ask the Assessor Feb 2025 vF.pdf