Skip to main content

NIST CSF 2.0 – Protect Function Deep Dive: Data Security (PR.DS)


When executives ask, “What are we actually protecting?”

The honest answer is simple:

Data.

Not servers.
Not applications.
Not networks.

Those matter—but only because data lives on them.

PR.DS exists because cybersecurity failures become business crises only when data is exposed, altered, lost, or misused. Everything else is usually recoverable.


How PR.DS Fits Into the Protect Function

So far in the Protect series, we have covered:

  • PR.AA – Who can access systems and data

  • PR.AT – How people recognize and respond to risk

PR.DS answers the next, unavoidable question:

Once access is granted and people are trained—how is data actually protected?

This is where cybersecurity aligns directly with:

  • Regulatory exposure

  • Financial loss

  • Reputation damage

  • Customer trust

For new practitioners, PR.DS explains what data security really means.
For new CISOs, it defines where accountability truly begins.


What Is PR.DS (Plain English)

PR.DS ensures that data is protected throughout its entire lifecycle.

That lifecycle includes:

  1. Creation

  2. Storage

  3. Use

  4. Transmission

  5. Retention

  6. Disposal

PR.DS applies whether data is:

  • On-prem

  • In the cloud

  • In SaaS platforms

  • On laptops

  • In backups

  • Shared with third parties

If data exists somewhere, PR.DS applies.


Beginner Callout: Why Data Security Is Harder Than It Sounds

Many people assume data security means:

  • Encryption

  • Passwords

  • Firewalls

Those are tools, not strategies.

Data security is difficult because:

  • Data constantly moves

  • Copies multiply invisibly

  • Business users prioritize speed

  • Ownership is often unclear

You can’t protect what you don’t understand—or can’t see.


Why PR.DS Matters So Much at the Executive Level

From the boardroom perspective:

  • Most fines are data-related

  • Most lawsuits follow data exposure

  • Most breach notifications mention data types

  • Most incident impact assessments start with data loss

Executives don’t ask:

“Was the server patched?”

They ask:

“What data was exposed, and who was affected?”

PR.DS is how security leaders answer that question confidently.


Common PR.DS Mistakes (Across All Maturity Levels)

1. Trying to Protect All Data Equally

Not all data deserves the same level of protection.

Customer PII ≠ marketing content
Production credentials ≠ internal documentation

Without prioritization, controls become expensive and ineffective.


2. Confusing Storage Security With Data Security

Securing a database does not mean the data is secure if:

  • It’s exported to spreadsheets

  • Shared through email

  • Synced to personal devices

  • Uploaded to unauthorized SaaS tools

Data security follows data—not infrastructure.


3. Leaving Classification as a Paper Exercise

If data classification:

  • Is purely theoretical

  • Isn’t enforced technically

  • Isn’t understood by users

Then it provides little real protection.


How to Implement PR.DS in a Practical, Understandable Way

1. Start With Data Visibility

At a minimum, organizations should understand:

  • What sensitive data they have

  • Where it lives

  • Who accesses it

  • How it moves

You do not need perfection—but you need directional clarity.


2. Classify Data Based on Impact, Not Preference

Effective classification answers:

  • What happens if this data is exposed?

  • What happens if it’s altered?

  • What happens if it’s unavailable?

Focus on impact—not volume.

This keeps programs realistic and defensible.


3. Protect Data in Use, Not Just at Rest

Encryption at rest and in transit are table stakes.

Mature PR.DS programs also address:

  • Screenshots

  • Copy/paste

  • File sharing

  • Downloads

  • External uploads

This is where DLP, CASB, and modern cloud controls matter most.


4. Limit Data Retention Aggressively

Data you no longer need:

  • Still creates risk

  • Still expands breach scope

  • Still costs money to secure

Deleting data safely is one of the most underrated security controls.


5. Account for Third Parties Explicitly

Once data leaves your environment:

  • Your risk does not leave with it

  • Your accountability often remains

PR.DS requires:

  • Contractual protections

  • Minimum security requirements

  • Visibility into data sharing


Real-World Executive Example

A company experiences a cloud credential compromise.
The attack path is simple.

The impact, however, depends entirely on PR.DS:

  • If sensitive data is segmented, encrypted, and monitored → limited impact

  • If data is broadly accessible and poorly classified → board-level crisis

Same incident.
Very different outcome.

That difference is PR.DS maturity.


Metrics That Make PR.DS Understandable

Foundational Metrics

  • % of critical data classified

  • % of sensitive data encrypted

  • % of endpoints enforcing data protection controls

  • Number of external data-sharing paths

These show coverage.


Risk-Oriented Metrics

  • Data exposure incidents by type

  • Sensitive data access anomalies

  • Unauthorized data sharing attempts

  • Data retention exceptions

These show risk control effectiveness.


CISO Takeaways

For new CISOs especially:

  • Data is what regulators care about

  • Data is what customers care about

  • Data is what lawsuits reference

  • Data is what defines breach severity

If you control data well, many other failures become survivable.

If you don’t, even small incidents become existential.


What “Good” Looks Like

A strong PR.DS capability means:

  • Sensitive data is known and prioritized

  • Protection follows data wherever it goes

  • Users understand how to handle data safely

  • Retention is intentional, not accidental

  • Leadership can speak clearly about data risk

For beginners, this provides clarity.
For CISOs, it provides defensibility.


Final Thoughts

Identity controls decide who gets in.
Awareness determines how people behave.
Data security defines what actually gets damaged.

PR.DS is where cybersecurity and business risk finally meet.

If you protect data well,
you earn time, trust, and options when things go wrong.

Popular posts from this blog

Generative AI Governance: Using the NIST Framework to Build Trust, Reduce Risk, and Lead Secure AI Adoption

Generative AI has moved faster than nearly any technology security leaders have dealt with. Tools that can generate text, code, images, and data insights are now embedded into productivity platforms, security tooling, development workflows, and business operations—often before security teams are formally involved. For CISOs, this creates a familiar but amplified challenge: innovation is happening faster than governance, and unmanaged generative AI introduces material risk across confidentiality, integrity, availability, compliance, and trust. For aspiring information security professionals, AI governance represents a growing and valuable discipline where strategic thinking matters just as much as technical depth. The good news? We don’t need to invent governance from scratch. NIST’s AI Risk Management Framework (AI RMF) provides a practical, flexible structure that security leaders can use today to govern generative AI responsibly and defensibly. Why Generative AI Governance Matt...

NIST CSF 2.0 – Identify Function Deep Dive: Asset Management (ID.AM)

If you ask most CISOs where breaches really start, the answer is rarely “lack of tools.” It’s almost always lack of clarity . You cannot protect what you do not know exists. That is why Asset Management (ID.AM) sits at the foundation of the NIST Cybersecurity Framework (CSF) 2.0 Identify function. Every control, risk decision, investment, and response capability depends on accurate, current, and business-aligned asset visibility. In NIST CSF 2.0, Asset Management is no longer treated as an inventory exercise—it is framed as a risk-enabling capability that supports governance, threat modeling, resilience, and mission outcomes. This post breaks down: What ID.AM actually is in CSF 2.0 How to implement it pragmatically in a real enterprise Metrics CISOs and boards can use to measure effectiveness (not just activity) What Is NIST CSF 2.0 Asset Management (ID.AM)? ID.AM ensures that organizational assets—physical, digital, cloud-based, third-party, and data-centric—are identified, mana...