Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

ITAR and Encryption : What You Need to Know

Contributors

Anas Baig

Product Marketing Manager at Securiti

Adeel Hasan

Sr. Data Privacy Analyst at Securiti

CIPM, CIPP/Canada

Listen to the content

Protecting user data, especially sensitive data, is the primary objective of data regulations. In a world where cybersecurity incidents are rampant, losing sensitive data to threat actors can put a user in significant danger. However, imagine a set of sensitive data, which is linked to defense-related goods like long-range missiles or nuclear data, ends up falling into the wrong hands. Such a consequence could be catastrophic. Here, ITAR encryption comes into the picture.

The International Traffic in Arms Regulation (ITAR) is governed and enforced by the Directorate of Defense Trade Controls (DDTC) at the US Department of State. The regulation is enforced to safeguard defense-related items, services, and data against unlawful use by unauthorized persons and to uphold national security. In March 2020, the Department of State implemented the ITAR addendum to enable the transfer of unclassified technical data without the need for any licenses providing it is end-to-end encrypted.

ITAR encryption is now a critical component of the regulation that not only requires compliance but also demands businesses ensure robust data protection mechanisms for protecting defense-associated data. Read on to learn more about the provisions related to ITAR end-to-end encryption (EEE) and the best practices to enforce it.

What is ITAR Encryption?

ITAR encryption provision discusses the theme of using cryptography for protecting ITAR data. In layman's terms, encryption refers to the process of scrambling data until it makes no sense to any unauthorized person. In fact, even an authorized individual would require a key to unscramble it. The process of unscrambling is called decoding, while the process of scrambling or encrypting data is called encoding.

Encryption is one of the most highly effective and guaranteed mechanisms that offer data protection. And with end-to-end encryption (EEE), data teams can doubly make sure that the data’s integrity and confidentiality remain intact while in transit or at rest. ITAR encryption requires ITAR-covered entities to protect unclassified technical data with EEE to reduce the risk of unauthorized access or potential data breaches.

Understanding ITAR Regulations for Encryption

The DDTC enacted the ITAR addendum with revised definitions and related provisions in March 2020 under the newly added § 120.54. Regulation § 120.54 contains some part from the original text and supplements it with the revised definition for activities that are not considered as controlled events, i.e., “activities that are not exports, reexports, retransfers, or temporary imports,” and so it requires no approval or authorization from DDTC. § 120.54 further lists five additional provisions in paragraph (a), where each provision discusses how different “not controlled events” must be treated in various scenarios.

For instance, provision (a)(1) presents that launching items into space is not a controlled event. Similarly, (a)(2) states that the transfer of technical data between US persons in the US is not a controlled event and thus doesn’t require DDTC approval. Provision (a)(3) states that the transfer of technical data between US persons in the same foreign country is not a reexport or retransfer if it is not released to a foreign person. Provision (a)(4) talks about moving defense items between US territories as not controlled events.

The fifth provision, (a)(5), is the part where the DDTC discusses the requirement, type, and scenarios for encryption of technical data when it is transferred outside the United States.

Provision § 120.54 (a)(5) - ITAR Encryption

The fifth provision, (a)(5) of § 120.54, states that the transmission, transfer, or storage of effectively encrypted unclassified technical data is not a controlled event, i.e., it doesn’t require authorization as long as the data is end-to-end encrypted. However, encryption must occur from the sender’s facility and remain in encrypted form when it reaches the recipient’s facility and is decrypted by the authorized recipient or the sender himself in the case of remote storage. The provision further clarifies that a “controlled event” occurs only when the transferred technical data is released to an unauthorized foreign person or any US person while the data is not encrypted.

ITAR Encryption Standard as Governed by DDTC

The provision a(5) of § 120.54 in the ITAR addendum further highlights the encryption standards required for the transmission or storage of technical data outside the United States. Let’s take a closer look at the breakdown of those highlights:

  • The encryption must be accomplished in a manner certified by the U.S. National Institute for Standards and Technology (NIST), as compliant with the Federal Information Processing Standards Publication 140-2 (FIPS 140-2).FIPS 140-2 is a security standard that lists the requirements for encryption modules as used by military or government agencies. These standards ensure that the encryption grade used by any entity meets the specific criteria.
  • ITAR-covered entities are further permitted to use an alternative to the NIST FIPS 140-2 standard. However, it is imperative to make sure that the encryption grade must meet or exceed at least the 128-bits security strength.
  • ITAR addendum also mentions “Table 2: Comparable strengths” of NIST Special Publication 800-57 Part 1, Revision 4.” The table provides a comparison chart between different encryption levels and their equivalent. The table can be considered an ideal reference when making sure that the encryption used for safeguarding technical data is equal in strength or more than 128 bits.

ITAR End-to-End Encryption Definition

The addendum emphasizes the utilization of end-to-end encryption (EEE) for compliance and protecting ITAR technical data when transmitted or transferred outside the US. The addendum defines EEE as a cryptographic mechanism that should be applied when it is in the facility of the ITAR-covered entity or sender. The encryption of the technical data should remain intact until it reaches the recipient's facility or is decrypted by an authorized person. The addendum further clarifies that EEE means that the decryption keys must not be provided to any third party, and encryption must not be decoded while the data is in transit.

Why is ITAR Encryption Important?

The importance of ITAR encryption cannot be exaggerated enough. The 2020 addendum strengthens data security controls around defense-related data to prevent unauthorized access and potential security risks. Let’s take a quick look at some of the key reasons why this provision holds such significant value:

  • Defense-related data is highly sensitive since it is associated with the national security of a country. If it ends up in the hands of cybercriminals, it could pose serious threats to a nation. ITAR encryption helps both the government and the defense suppliers and manufacturers to safeguard the data to reduce risks and thwart potential breaches.
  • State-sponsored espionage is also a common occurrence that could have severe consequences if a breach is successful. By complying with ITAR encryption provisions and setting up the right safeguards against such attacks, organizations can thwart the efforts of threat actors and prevent unauthorized individuals from accessing, decoding, or tempering sensitive data even if a breach occurs.
  • Compliance with the ITAR encryption addendum is not only critical for ensuring national security but also for preventing reputational and financial losses which are the result of non-compliance. The addendum puts compliance responsibility on organizations to leverage optimal controls for safeguarding defense data and demonstrate their commitment to upholding trust and national security.

Best Practices for Implementing ITAR Encryption

  • First, discover and classify all the ITAR data across the organization to understand the sensitivity level of the data so you may apply the right security controls.
  • Identify the potential vulnerabilities and risks associated with your ITAR data to determine the encryption level you need to safeguard it.
  • Map the discovered data against ITAR provisions, especially the cross-border rules, to ensure compliance with the law during cross-border transactions.
  • Establishing access policies and controls around ITAR data to ensure only authorized individuals have access to data. Add a layer of added security by applying encryption on the data to safeguard it against access risks and compliance with the ITAR addendum.
  • Apply dynamic data masking wherever applicable to ensure the secure sharing of data while keeping the sensitive data obfuscated.

Meet ITAR Compliance with Securiti

ITAR encryption is an integral part of ITAR compliance. By establishing encryption policies and controls, organizations can safeguard their data against various security risks, maintain compliance with the law, and contribute to the protection of national security.

Securiti, a named leader in privacy management solutions, helps organizations automate and meet compliance with global regulations and standards through a unified data controls framework. Leverage Securiti to gain deeper insights into your ITAR data across the organization, associated risks or vulnerabilities, and enable optimized controls around its security, governance, and compliance.

Request a demo today and see how Securiti can empower your business.


Frequently Asked Questions (FAQs)

The ITAR rule for encryption involves controlling the export of encryption technology that is specially designed or modified for military or space applications covered by ITAR regulations. ITAR encryption provision discusses the theme of using cryptography for protecting ITAR data

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View

Latest

View More

From Trial to Trusted: Securely Scaling Microsoft Copilot in the Enterprise

AI copilots and agents embedded in SaaS are rapidly reshaping how enterprises work. Business leaders and IT teams see them as a gateway to...

The ROI of Safe Enterprise AI View More

The ROI of Safe Enterprise AI: A Business Leader’s Guide

The fundamental truth of today’s competitive landscape is that businesses harnessing data through AI will outperform those that don’t. Especially with 90% of enterprise...

Data Security Governance View More

Data Security Governance: Key Principles and Best Practices for Protection

Learn about Data Security Governance, its importance in protecting sensitive data, ensuring compliance, and managing risks. Best practices for securing data.

AI TRiSM View More

What is AI TRiSM and Why It’s Essential in the Era of GenAI

The launch of ChatGPT in late 2022 was a watershed moment for AI, introducing the world to the possibilities of GenAI. After OpenAI made...

Managing Privacy Risks in Large Language Models (LLMs) View More

Managing Privacy Risks in Large Language Models (LLMs)

Download the whitepaper to learn how to manage privacy risks in large language models (LLMs). Gain comprehensive insights to avoid violations.

View More

Top 10 Privacy Milestones That Defined 2024

Discover the top 10 privacy milestones that defined 2024. Learn how privacy evolved in 2024, including key legislations enacted, data breaches, and AI milestones.

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New