Data encryption and minimization required
For any restricted transaction, as per data-level necessities, adopting information minimization and obfuscation methods has been proposed.
“Apply information minimization and information masking methods to scale back the necessity to gather, or sufficiently obfuscate, respectively, lined information to forestall visibility into that information, with out precluding the US individuals partaking in restricted transactions from conducting operations with the info,” CISA added.
CISA really useful methods together with aggregation, pseudonymization, de-identification, or anonymization for processing information in order that the info will not be linkable to US individual entities whereas it’s accessed by a rustic of concern.