Privacy Controls. A Layered Approach from Identification to Protection.

Privacy Controls Guide

Privacy requirements span multiple regulatory regimes, each with distinct obligations. The NIST privacy ecosystem provides a structured approach: establish a privacy baseline through 800-53B, identify and classify personally identifiable information through 800-122, and map international obligations through GDPR compliance controls. Privacy overlays compose with security baselines to create a unified posture.

Privacy is not security. But it depends on security to function.

Organizations face privacy obligations from federal regulation, international law, sector-specific mandates, and contractual requirements. These obligations overlap but are not identical. A security baseline protects systems. A privacy baseline protects the people whose data those systems process. Redoubt Forge treats privacy as a distinct discipline that composes with security controls through structured overlays. Not a checkbox appended to your security program. A separate set of obligations with its own controls, its own evidence requirements, and its own assessment criteria.

01
The Privacy Landscape
Why Privacy Is Distinct from Security. Where the Obligations Originate.

Privacy and security are related disciplines, but they address fundamentally different risks. Security controls protect the confidentiality, integrity, and availability of information systems. Privacy controls protect the rights and interests of individuals whose data those systems process. An encrypted database satisfies a security requirement. A data minimization policy that limits what enters that database satisfies a privacy requirement. Both are necessary. Neither substitutes for the other. Organizations that treat privacy as a subset of security miss entire categories of obligation: consent management, purpose limitation, data subject rights, retention controls, and cross-border transfer restrictions have no direct analog in traditional security frameworks. They require dedicated controls, dedicated evidence, and dedicated assessment criteria.

The privacy regulatory landscape is fragmented by design. Different jurisdictions and sectors impose different obligations because they protect different populations in different contexts. NIST 800-53 rev5 introduced a dedicated privacy control family (PT: Personally Identifiable Information Processing and Transparency) alongside privacy-relevant controls distributed across other families. NIST 800-53B defines privacy baselines that select specific controls for organizations processing personally identifiable information. NIST 800-122 provides guidance for identifying and protecting PII across federal systems. HIPAA imposes privacy obligations on covered entities and business associates handling protected health information. FERPA protects student education records. GDPR establishes data subject rights and processing principles for organizations handling EU residents' data. Each regime has its own terminology, its own enforcement mechanism, and its own evidentiary requirements.

The challenge is not that any single privacy regime is unmanageable. The challenge is that most organizations are subject to several simultaneously. A healthcare technology company processing data for a federal agency may face HIPAA privacy requirements, NIST 800-53B privacy baselines, NIST 800-122 PII identification obligations, and GDPR requirements if any data subjects are EU residents. Each regime demands its own controls, its own documentation, and its own evidence. Without a structured approach to composing these obligations, organizations either duplicate effort across programs or leave gaps where regimes overlap imprecisely. Privacy requires a layered strategy: establish a baseline, identify what you protect, classify how it flows, and compose additional obligations as overlays on that foundation.

02
The Problem
Fragmented Obligations. Siloed Programs. Privacy Treated as Paperwork.

Most organizations manage privacy obligations in isolation from their security programs. The security team maintains a System Security Plan and collects evidence against NIST 800-53 or equivalent baselines. The privacy office maintains a separate privacy impact assessment, a separate data inventory, and a separate set of policies. These programs use different tools, different terminology, and different assessment cycles. When they overlap, each team addresses the shared control independently: security documents its access control implementation for the security assessment, privacy documents the same access control implementation for the privacy impact assessment, and neither references the other's work. The duplication is not merely inefficient. It creates inconsistency. When the security team updates an access control policy and the privacy team does not reflect that change in its documentation, the organization presents conflicting information to assessors.

Privacy as a compliance checkbox fails for the same reason security as a compliance checkbox fails: the documentation describes an intended state, not an observed one. Privacy impact assessments are written when a system launches and rarely updated as the system evolves. Data inventories reflect the information architecture as it existed when the inventory was conducted. New data elements enter the system through application updates, third-party integrations, and operational changes that never trigger a privacy review. Consent mechanisms are implemented at launch and never re-evaluated as processing purposes expand. Retention schedules are documented but not enforced: data that should have been purged persists because no automated mechanism exists to execute the policy. The privacy program describes the organization's intentions. The running systems reflect the organization's actual practices. The gap between those two states widens every day that passes without continuous monitoring.

Enforcement actions demonstrate that regulators distinguish between organizations with genuine privacy programs and those with documentation artifacts. Fines under GDPR have reached hundreds of millions of euros for violations that stem not from malice but from organizational failure to implement documented policies. HIPAA enforcement actions frequently cite the gap between written policies and actual practices as an aggravating factor. Federal agencies face OMB scrutiny when privacy impact assessments do not reflect current system configurations. The common thread across these enforcement actions is the same: the organization had a privacy policy, but the policy was not reflected in the system's actual behavior. Privacy obligations are not satisfied by documentation. They are satisfied by operational controls that enforce documented policies continuously, with evidence that proves enforcement is occurring.

03
Step 1: Establish Privacy Baseline
NIST 800-53B Privacy Controls. The Foundation for Every Privacy Obligation.

NIST Special Publication 800-53B defines control baselines for federal information systems, including a dedicated Privacy Baseline that selects controls specifically applicable to systems processing personally identifiable information. Unlike the Low, Moderate, and High security baselines that are selected based on system impact level, the privacy baseline applies whenever PII is processed, regardless of the system's security categorization. This means a Low-impact system that processes PII must implement both the Low security baseline and the privacy baseline. The privacy baseline draws controls from multiple 800-53 families: PT (Personally Identifiable Information Processing and Transparency) provides privacy-specific controls for consent, purpose specification, data minimization, and individual participation. AR (Accountability, Audit, and Risk Management) provides controls for privacy governance. Additional privacy-relevant controls appear in AP (Authority and Purpose), DM (Data Minimization and Retention), DI (Data Quality and Integrity), IP (Individual Participation and Redress), SE (Security), TR (Transparency), and UL (Use Limitation). For the complete deep dive, see NIST 800-53B Privacy Baseline.

The privacy baseline is not a standalone program. It composes with the security baseline assigned to the same system. When a control appears in both the security baseline and the privacy baseline, it is implemented once and assessed once, but the assessment must verify that the implementation satisfies both the security objective and the privacy objective. Access control (AC-2) in a security context ensures that only authorized users access the system. The same AC-2 control in a privacy context ensures that access to PII is limited to personnel with a documented need. The implementation may be identical, but the evidence must demonstrate both dimensions. Organizations that assess AC-2 only against its security objective miss the privacy requirement. Organizations that implement separate access control mechanisms for security and privacy introduce unnecessary complexity and potential inconsistency.

Establishing the privacy baseline requires identifying which systems process PII, which PII elements are processed, and which privacy controls from 800-53B apply to each system. This is not a one-time exercise. Systems evolve. New data elements enter through application updates, third-party integrations, and operational changes. The privacy baseline must be re-evaluated as the system's data processing activities change. Organizations that establish their privacy baseline at system authorization and never revisit it accumulate uncontrolled PII processing that falls outside the scope of their privacy controls. The baseline is the foundation. Everything else in the privacy program builds on it: PII identification, classification, international obligations, and sector-specific requirements all reference the baseline controls as their starting point.

04
Step 2: Identify and Classify PII
NIST 800-122 Methodology. What You Protect Determines How You Protect It.

NIST Special Publication 800-122 provides guidance for identifying Personally Identifiable Information and determining its confidentiality impact level. PII is any information that can be used to distinguish or trace an individual's identity, either alone or when combined with other information that is linked or linkable to a specific individual. The definition is deliberately broad because the same data element can be PII in one context and not in another. A job title is not PII in isolation. A job title combined with a department name and organization may identify a single individual. 800-122 establishes a methodology for evaluating whether data elements constitute PII based on their identifiability, the context in which they are collected, and the potential for linkage with other available information. This evaluation is not a binary determination. It requires analysis of the specific data elements, the specific processing context, and the specific population from which the data originates. For the complete deep dive, see NIST 800-122 PII Identification.

800-122 introduces a critical distinction between PII that requires protection at a high confidentiality impact level and PII that warrants moderate or low protection. The confidentiality impact level depends on three factors: the identifiability of the information (how directly it identifies an individual), the quantity of individuals affected (how many records are at risk), and the sensitivity of the data (the potential harm from unauthorized disclosure). Social Security numbers, biometric data, and financial account numbers warrant high confidentiality protection because unauthorized disclosure causes direct, measurable harm to identifiable individuals. Publicly available directory information such as work email addresses or office phone numbers may warrant lower protection because the harm from disclosure is limited. The classification drives the control selection: high-impact PII requires stronger access controls, encryption, audit logging, and breach notification procedures than low-impact PII. Organizations that apply uniform protection to all PII either over-invest in protecting low-sensitivity data or under-invest in protecting high-sensitivity data.

PII identification is not a static inventory exercise. Data flows through systems in ways that create PII where none existed in the input. A web application that collects anonymous survey responses creates PII if it also logs the respondent's IP address alongside the response. An analytics pipeline that aggregates demographic data creates PII if the aggregation granularity is fine enough to identify individuals within small populations. Data combination is the most common source of unrecognized PII: two datasets that contain no PII individually may produce PII when joined. Organizations must evaluate PII not only at the point of collection but at every processing stage where data is combined, transformed, or enriched. The 800-122 methodology provides the analytical framework for this evaluation, but the evaluation itself requires understanding the full data lifecycle from collection through processing, storage, sharing, and eventual disposition.

05
Step 3: International Privacy
GDPR Requirements. Data Subject Rights. Cross-Border Transfer Mechanisms.

The General Data Protection Regulation (GDPR) establishes privacy obligations for any organization that processes personal data of individuals located in the European Union, regardless of where the organization itself is located. This extraterritorial scope means that a U.S.-based federal contractor with no EU presence may still face GDPR obligations if its systems process data belonging to EU residents. GDPR introduces concepts that have no direct equivalent in the NIST privacy framework: lawful bases for processing (consent, contract, legal obligation, vital interests, public task, or legitimate interests), the right to erasure ("right to be forgotten"), data portability rights, and mandatory data protection impact assessments for high-risk processing activities. These are not abstract policy requirements. They are enforceable rights that data subjects can exercise, and organizations must have operational mechanisms to respond within specified timeframes. For the complete deep dive, see GDPR Privacy Requirements.

Cross-border data transfers represent the most operationally complex GDPR requirement for organizations with global infrastructure. Transferring personal data outside the European Economic Area requires a recognized transfer mechanism: an adequacy decision by the European Commission, Standard Contractual Clauses (SCCs) with supplementary measures where necessary, Binding Corporate Rules for intra-group transfers, or one of the limited derogations specified in Article 49. The EU-U.S. Data Privacy Framework provides an adequacy-based transfer mechanism for certified organizations, but certification requires ongoing compliance with the framework's principles. Organizations that rely on cloud infrastructure must evaluate whether their data processing activities involve transfers to jurisdictions without adequacy decisions, whether their cloud provider's standard contractual clauses satisfy current regulatory expectations, and whether supplementary technical measures (such as encryption with customer-managed keys) are necessary to address surveillance risks identified by the Court of Justice of the European Union.

Mapping GDPR to NIST controls is structurally possible but not one-to-one. GDPR's data minimization principle (Article 5(1)(c)) aligns with NIST 800-53 DM-1 (Minimization of Personally Identifiable Information) and DM-2 (Data Retention and Disposal), but GDPR's enforcement mechanism and penalty structure differ entirely from NIST's assessment framework. GDPR's right to access (Article 15) and right to rectification (Article 16) map to NIST IP-2 (Individual Access) and IP-3 (Redress), but GDPR specifies response timeframes (30 days) that NIST leaves to organizational policy. The mapping is useful for identifying control overlap and reducing duplicated implementation effort, but it does not eliminate the need for GDPR-specific controls, GDPR-specific evidence, and GDPR-specific assessment. Organizations that assume their NIST privacy baseline satisfies GDPR discover the gaps when a data subject exercises a right that the NIST controls do not address.

06
How Privacy Overlays Compose
Layering Privacy on Security Baselines. One System. Multiple Obligations.

Privacy overlays in NIST terminology are modifications to a control baseline that add, modify, or remove controls to address specific requirements beyond the base selection. A system categorized at FIPS 199 Moderate with a security baseline from 800-53B receives its initial control set from the Moderate security baseline. When that system also processes PII, the privacy baseline overlay adds controls from the PT, AR, AP, DM, DI, IP, SE, TR, and UL families. When the PII includes health information subject to HIPAA, a healthcare privacy overlay adds HIPAA-specific technical safeguards. When the system serves EU data subjects, a GDPR overlay adds cross-border transfer controls, consent management mechanisms, and data subject rights procedures. Each overlay composes with the base: controls that already exist in the security baseline are not duplicated but may receive additional parameters or assessment criteria from the privacy overlay.

The composition model matters because it prevents the combinatorial explosion that occurs when organizations try to maintain separate control sets for each regulatory regime. Without composition, an organization subject to NIST 800-53, HIPAA, and GDPR maintains three separate control inventories, three separate evidence collections, and three separate assessment programs. Shared controls are implemented and documented three times. Conflicting requirements between regimes are discovered during assessment rather than during planning. The overlay model eliminates this duplication by establishing a single baseline (the security controls from 800-53B at the appropriate impact level), then composing additional requirements as additive layers. Each layer references the baseline controls it extends, specifies the additional parameters it requires, and identifies any new controls it introduces. The result is a single, unified control set that satisfies all applicable obligations simultaneously.

Composition introduces its own complexity: parameter conflicts between overlays must be resolved. When the security baseline requires access reviews annually and the GDPR overlay requires access reviews quarterly for systems processing special category data, the more restrictive requirement governs. When the NIST privacy baseline specifies PII retention periods based on organizational policy and HIPAA specifies a six-year retention floor for designated record sets, the HIPAA parameter takes precedence for health information while the organizational policy governs non-health PII. These conflict resolution rules are deterministic but require explicit documentation. Rampart resolves overlay conflicts automatically by applying the most restrictive parameter when overlays impose different values for the same control. Sentinel monitors the composed control set continuously, collecting evidence that satisfies the most restrictive interpretation across all active overlays. Artificer generates control narratives that document both the implementation and the rationale for parameter selection when overlays conflict. The result is a privacy posture that composes with your security posture rather than competing with it.

07
Cross-Framework Privacy
HIPAA. SOC 2 Privacy. ISO 27701. FERPA. One Privacy Posture Across All.

Privacy requirements appear across nearly every compliance framework, but each framework addresses privacy from a different angle. HIPAA's Privacy Rule governs the use and disclosure of protected health information by covered entities and business associates. It specifies minimum necessary standards, individual rights to access and amend records, accounting of disclosures, and administrative requirements for privacy governance. SOC 2 includes an optional Privacy trust service criterion that evaluates how organizations collect, use, retain, disclose, and dispose of personal information. ISO 27701 extends ISO 27001 and ISO 27002 to establish a Privacy Information Management System (PIMS), providing a certification path for organizations that want to demonstrate privacy management maturity. FERPA protects student education records and gives parents (and eligible students) rights to access and control the disclosure of those records. Each framework defines privacy differently, protects different populations, and requires different evidence.

The structural overlap between these frameworks is substantial but imprecise. HIPAA's minimum necessary standard and GDPR's data minimization principle address the same concept (limit processing to what is needed) but impose different requirements on different data types with different enforcement mechanisms. SOC 2 Privacy criteria and ISO 27701 controls both address retention and disposal, but SOC 2 evaluates against trust service criteria while ISO 27701 evaluates against a management system standard. FERPA's disclosure rules and HIPAA's use and disclosure limitations both restrict how information moves between parties, but the populations they protect (students versus patients) and the exceptions they permit (directory information versus treatment, payment, and operations) differ fundamentally. Organizations subject to multiple privacy regimes cannot satisfy them by implementing the most restrictive interpretation of each shared concept. They must understand which regime governs which data, which population, and which processing activity.

Cross-framework privacy leverage works when the underlying control implementation is sound and the evidence demonstrates compliance with each regime's specific requirements. An access control implementation that limits PII access to authorized personnel satisfies HIPAA's minimum necessary, GDPR's purpose limitation, SOC 2's access control criteria, and ISO 27701's access management controls. But the evidence for each differs: HIPAA requires documentation of the minimum necessary determination, GDPR requires documentation of the lawful basis and purpose, SOC 2 requires evidence of control operating effectiveness over a period, and ISO 27701 requires evidence of management system processes. Rampart maintains the cross-framework mappings that connect privacy controls across all active frameworks. Sentinel collects evidence once and maps it to every framework that requires it. Artificer generates framework-specific narratives from shared evidence, producing the HIPAA-specific documentation, the SOC 2-specific description, and the ISO 27701-specific management system evidence from the same underlying control implementation. One privacy posture. Every framework computed.

Something is being forged.

The full platform is under active development. Reach out to learn more or get early access.