Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI with proprietary data - easily

View

ITAR Compliance in the Cloud: 6 Data Security Measures

Published January 23, 2023 / Updated December 18, 2023
Author

Nikhil Girdhar

Senior Director for Data Security products at Securiti.

Listen to the content

Organizations that make defense-related equipment and services can leverage the power of the cloud, big data analytics, and artificial intelligence to help the United States (US) military stay ahead in modern warfare. But ensuring the safety of sensitive data as it’s stored, transformed, and transmitted across the organization’s digital infrastructure is a tricky challenge.

Understanding how to adopt the cloud safely is essential for all organizations in the US defense sector. The US government has established International Traffic in Arms Regulations (ITAR) to protect national security and foreign policy interests by ensuring that sensitive military data does not get into the wrong hands.

This article discusses six key data security measures to help achieve ITAR compliance in the cloud.

  1. Build an ITAR compliance program
  2. Discover sensitive ITAR data across clouds
  3. Limit data access and map data flows
  4. Strengthen cloud data security posture
  5. Ensure compliance across the supply chain
  6. Prove ITAR compliance and assist with investigations

Before discussing these, let’s briefly review what is ITAR.

What is ITAR? Who Should Care?

ITAR is a set of regulatory rules defined by the United States Department of State to control the manufacturing, sale, and distribution of defense and space-related articles included in the United Stated States Munitions List (USML). In a world where every transaction has a digital footprint, a key goal of ITAR is to limit access to sensitive data connected with USML to United States personnel only.

Any company that handles, manufactures, designs, sells, or distributes items on the USML must register with The State Department’s Directorate of Defense Trade Controls (DDTC) and abide by ITAR rules. Penalties can be severe and include fines of up to $1,000,000 and imprisonment of up to 10 years per violation. For these reasons, no organization should take ITAR lightly.

Additionally, in March 2020, the State Department issued a ruling to guide organizations on handling unclassified ITAR-related data and storing it in the cloud. We will discuss this ruling further alongside relevant data security measures.

To learn more about ITAR, visit Securiti’s knowledge center.

ITAR Data Security Measures

In the modern cloud context, organizations must meet several data security, governance, and compliance requirements to protect sensitive ITAR data. Let’s look at these requirements and understand how Securiti can help.

1. Build an ITAR Compliance Program

ITAR has no formal certification process, and the onus of compliance falls on organizations through self-assessment. Therefore, organizations must establish internal ITAR programs to help protect sensitive data and implement security controls.

The legal or compliance department within the organization plays a crucial role in managing this ITAR program. Their responsibilities include staying informed on current laws and regulations, providing training to employees, collaborating with internal IT, security, import/export, and vendor management teams to implement technical controls, and developing processes to enforce and monitor compliance.

In case of non-compliance, this department must report ITAR violations to the US government and collaborate with investigating bodies. The following measures focus on data security guidance to help protect ITAR-specific data.

2. Discover sensitive ITAR data across clouds

The first technical step towards ITAR compliance is to discover, identify, and label ITAR-restricted data across the organization’s entire digital infrastructure. This process can be complex, as data is often dispersed across various silos, including on-premises and public clouds. Organizations must ensure that sensitive ITAR-specific data does not spill into cloud infrastructure that is not ITAR compliant.

Securiti’s Sensitive Data Intelligence uses automation to discover sensitive data across multi-cloud and SaaS platforms. This enables organizations to pinpoint the location of their data, automatically detect shadow or cloud-native assets, and scan structured or unstructured data at a petabyte scale. Securiti applies advanced machine learning techniques to help organizations accurately identify ITAR-specific data with a low false positive rate.

3. Limit Data Access and Map Data Flows

ITAR compliance requires that only US citizens can access sensitive ITAR data. This requirement applies to employees and subcontractors in US or foreign office locations. There are exceptions to this rule, such as the relaxation of ITAR export requirements to certain countries. ITAR requires that organizations extensively document every instance when they claim an exception for business operations.

To comply with ITAR, organizations must track user access and understand how data flows through different data systems. Securiti’s Data Access Governance and Data Mapping Automation modules help quickly identify direct or indirect user access to sensitive data, enforce least privilege controls, visualize how data flows through systems, and detect cross-border transfers.

4. Strengthen Cloud Data Security Posture

Leading cloud and SaaS providers enable organizations to comply with ITAR by storing sensitive data in sovereign data centers located in the United States. These providers ensure that only authorized personnel, who are US citizens, can manage infrastructure in these environments.

Organizations can now use these cloud environments to transmit, process, and store sensitive data in line with key ITAR regulations. However, it is important to remember that cloud security is a shared responsibility between the cloud provider and the customer. While the cloud provider ensures the security and compliance of the underlying infrastructure layer, the customer is responsible for the security of the applications and data in the cloud. Therefore the onus of managing the cloud data security posture falls on the customer, who must enforce security controls to restrict network access and enable encryption for data at rest and in motion.

Additionally, in March 2020, the state department issued a ruling that makes it easier for organizations to share unclassified ITAR data with individuals outside the United States. However, ITAR still requires end-to-end encryption for sharing unclassified data.

Securiti’s Data Security Posture module continuously monitors configuration settings of data assets across clouds to prevent accidental data exposure. The solution supports over 700 configuration security best practices defined by standards such as NIST, which is a crucial starting point for compliance with ITAR.

5. Ensure Compliance Across the Supply Chain

ITAR requires that every organization handling sensitive data across the supply chain comply with its data security regulations. An infraction of ITAR compliance by even one organization in the supply chain can create a non-compliance risk for everyone. Therefore, organizations must track the compliance status of all relevant suppliers and distributors. Securiti’s Vendor Assessment module enables organizations to onboard, assess, and track third-party vendor compliance risk in one central location.

6. Prove ITAR Compliance and Assist with Investigations

Finally, ITAR requires that organizations track all data processing activities and report on them when audited by the US government. Securiti’s Data Command Center delivers a comprehensive solution, providing real-time reports and an audit trail of compliance with data security controls, and any changes to data mapping flows. This enables organizations to demonstrate commitment to ITAR compliance and provide evidence of the measures taken to protect sensitive data.

In the event of a suspected ITAR violation, Securiti’s Data Breach Management module enables organizations to securely validate the incident and avoid a false notification. If the violation is confirmed, the solution helps assess the scope of the infraction and share accurate information when the investigation is in process.

Leveraging Securiti’s Data Control Cloud For ITAR Compliance

Compliance with ITAR regulations is essential for all organizations that help the US military develop critical military services and equipment. Major enterprises rely on Securiti’s Data Command Center™ to unify data intelligence and controls across multiple public clouds, data clouds, SaaS, and private clouds. By delivering a centralized data command center, the solution enables organizations to fulfill essential data security, privacy, governance, and compliance obligations while eliminating the cost and complexities of managing disparate tools.

Learn how Securiti’s Data Command Center can help implement key ITAR security measures by booking a demo today.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View
Spotlight 13:35

The Better Organized We’re from the Beginning, the Easier it is to Use Data

Watch Now View
Spotlight 13:11

Securing GenAI: From SaaS Copilots to Enterprise Applications

Rehan Jalil
Watch Now View
Spotlight 47:02

Navigating Emerging Technologies: AI for Security/Security for AI

Rehan Jalil
Watch Now View

Latest

View More

Accelerating Safe Enterprise AI with Gencore Sync & Databricks

We are delighted to announce new capabilities in Gencore AI to support Databricks' Mosaic AI and Delta Tables! This support enables organizations to selectively...

View More

Building Safe, Enterprise-grade AI with Securiti’s Gencore AI and NVIDIA NIM

Businesses are rapidly adopting generative AI (GenAI) to boost efficiency, productivity, innovation, customer service, and growth. However, IT & AI executives—particularly in highly regulated...

View More

The Right to Data Portability in the Middle East

Discover the regulatory landscape of data portability in the Middle East, particularly its requirements, limitations/exceptions. Learn how Securiti helps ensure swift compliance.

Data Protection in the Telecommunications Sector of the UAE View More

Data Protection in the Telecommunications Sector of the UAE

Gain insights into data protection regulations in the UAE telecommunications sector. Discover data governance framework, data security obligations and how Securiti can help.

The Future of Privacy View More

The Future of Privacy: Top Emerging Privacy Trends in 2025

Download the whitepaper to gain insights into the top emerging privacy trends in 2025. Analyze trends and embed necessary measures to stay ahead.

View More

Personalization vs. Privacy: Data Privacy Challenges in Retail

Download the whitepaper to learn about the regulatory landscape and enforcement actions in the retail industry, data privacy challenges, practical recommendations, and how Securiti...

Nigeria's DPA View More

Navigating Nigeria’s DPA: A Step-by-Step Compliance Roadmap

Download the infographic to learn how Nigeria's Data Protection Act (DPA) mapping impacts your organization and compliance strategy.

Decoding Data Retention Requirements Across US State Privacy Laws View More

Decoding Data Retention Requirements Across US State Privacy Laws

Download the infographic to explore data retention requirements across US state privacy laws. Understand key retention requirements and noncompliance penalties.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New