<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Zero Trust Data Exchange: Articles]]></title><description><![CDATA[Discover essential insights on data security and compliance trends that will help you protect sensitive information and navigate complex regulatory landscapes with confidence. Each article delivers expert analysis on emerging threats and regulatory changes, empowering you to make informed decisions that safeguard your organization's most valuable digital assets.]]></description><link>https://kiteworks.substack.com/s/articles</link><image><url>https://substackcdn.com/image/fetch/$s_!yenp!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F338c4562-c573-4f8f-b7bf-d2513f98325e_300x300.png</url><title>Zero Trust Data Exchange: Articles</title><link>https://kiteworks.substack.com/s/articles</link></image><generator>Substack</generator><lastBuildDate>Mon, 04 May 2026 04:29:58 GMT</lastBuildDate><atom:link href="https://kiteworks.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Kiteworks]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[kiteworks@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[kiteworks@substack.com]]></itunes:email><itunes:name><![CDATA[Kiteworks]]></itunes:name></itunes:owner><itunes:author><![CDATA[Kiteworks]]></itunes:author><googleplay:owner><![CDATA[kiteworks@substack.com]]></googleplay:owner><googleplay:email><![CDATA[kiteworks@substack.com]]></googleplay:email><googleplay:author><![CDATA[Kiteworks]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Math Doesn't Work]]></title><description><![CDATA[80,000 defense contractors need CMMC Level 2. Fewer than 1,100 have it. At current capacity, this does not end in compliance. It ends in waivers.]]></description><link>https://kiteworks.substack.com/p/the-math-doesnt-work</link><guid isPermaLink="false">https://kiteworks.substack.com/p/the-math-doesnt-work</guid><dc:creator><![CDATA[Danielle Barbour]]></dc:creator><pubDate>Fri, 01 May 2026 21:01:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HOaU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363f2150-e89c-4284-afb7-27bd3794390a_720x480.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HOaU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363f2150-e89c-4284-afb7-27bd3794390a_720x480.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HOaU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363f2150-e89c-4284-afb7-27bd3794390a_720x480.png 424w, https://substackcdn.com/image/fetch/$s_!HOaU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363f2150-e89c-4284-afb7-27bd3794390a_720x480.png 848w, https://substackcdn.com/image/fetch/$s_!HOaU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363f2150-e89c-4284-afb7-27bd3794390a_720x480.png 1272w, https://substackcdn.com/image/fetch/$s_!HOaU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363f2150-e89c-4284-afb7-27bd3794390a_720x480.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HOaU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363f2150-e89c-4284-afb7-27bd3794390a_720x480.png" width="720" height="480" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/363f2150-e89c-4284-afb7-27bd3794390a_720x480.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:480,&quot;width&quot;:720,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:351520,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://kiteworks.substack.com/i/195771857?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363f2150-e89c-4284-afb7-27bd3794390a_720x480.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HOaU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363f2150-e89c-4284-afb7-27bd3794390a_720x480.png 424w, https://substackcdn.com/image/fetch/$s_!HOaU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363f2150-e89c-4284-afb7-27bd3794390a_720x480.png 848w, https://substackcdn.com/image/fetch/$s_!HOaU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363f2150-e89c-4284-afb7-27bd3794390a_720x480.png 1272w, https://substackcdn.com/image/fetch/$s_!HOaU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F363f2150-e89c-4284-afb7-27bd3794390a_720x480.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here is the math.</p><p>The Department of Defense estimates roughly 80,000 defense contractors need CMMC Level 2 certification to remain eligible for contracts handling <a href="http://kiteworks.com/risk-compliance-glossary/cmmc-cui-and-what-it-means/">controlled unclassified information</a>. <a href="https://cybersheath.com/resources/blog/state-of-the-dib-report-2025-only-1-of-contractors-are-ready-for-cmmc/">According to CyberSheath</a>, fewer than 1,100 held a final Level 2 certificate as of February 2026.</p><p>There are fewer than 100 authorized <a href="http://kiteworks.com/risk-compliance-glossary/cmmc-third-party-assessor-organization-c3pao/">C3PAOs</a>. Each assessment requires three Certified Assessors. Each assessment, done properly, takes weeks.</p><p>Phase 2 of CMMC &#8212; when Level 2 certification becomes a condition of award for new contracts handling <a href="http://kiteworks.com/risk-compliance-glossary/cmmc-cui-and-what-it-means/">CUI</a> &#8212; begins November 10, 2026. Seven months from today.</p><p>None of these numbers add up to each other, and no amount of optimism is going to make them.</p><h3><strong>The Ratio That Breaks the Program</strong></h3><p>Even if every existing C3PAO worked every available business day between now and November 10, 2026, and even if every assessment closed cleanly on the first attempt, the capacity to certify 80,000 organizations in seven months does not exist. It is not a close call. It is off by an order of magnitude.</p><p>And the assessments are not closing cleanly on the first attempt. <a href="https://2ea4318a.delivery.rocketcdn.me/wp-content/uploads/2025/09/CMMC-C3PAO-Survey-Report.pdf">Alluvionic&#8217;s September 2025 survey of authorized C3PAOs</a> found half of <a href="http://kiteworks.com/risk-compliance-glossary/cmmc-third-party-assessor-organization-c3pao/">C3PAOs</a> delay or turn away Organizations Seeking Certification at least half the time. The actual completion rate is materially lower than the theoretical maximum.</p><p>That makes the math worse, not better.</p><h3><strong>What GAO Already Saw</strong></h3><p>In March 2026, the <a href="https://www.gao.gov/products/gao-26-107955">Government Accountability Office published GAO-26-107955</a>, finding that DoD addressed six of seven elements of a comprehensive CMMC implementation strategy &#8212; but it had not systematically assessed or documented how it would mitigate external factors that could impede the program.</p><p>The specific factor GAO named: private-sector assessor capacity.</p><p>GAO also flagged a second concern: overuse of waivers. If capacity problems persist, the report warned, waivers could &#8220;undermine the long-term viability of the program.&#8221;</p><p>That is the polite phrasing. The less polite phrasing is that CMMC is on track to become a compliance regime that operates on exceptions. A compliance regime that operates on exceptions is, by definition, a compliance regime that tolerates non-compliance. And that is the exact pattern CMMC was designed to break.</p><h3><strong>The Waiver Trajectory</strong></h3><p>Here is how waivers become routine, in the historical record.</p><p>A program with fixed compliance requirements and insufficient infrastructure to enforce them begins issuing exceptions to avoid catastrophic procurement disruption. The exceptions are framed as temporary. The infrastructure fails to catch up. The temporary exceptions become the norm. Enforcement shifts from &#8220;did you meet the standard&#8221; to &#8220;did you have a valid reason for not meeting the standard.&#8221; Eventually, the standard itself loses meaning.</p><p>This is what happened to <a href="http://kiteworks.com/risk-compliance-glossary/dfars/">DFARS 252.204-7012</a>. It had a compliance deadline in 2017. It had an enforcement mechanism in theory. In practice, contractors self-attested, gaps were rarely caught, and the regime became background noise. <a href="http://kiteworks.com/risk-compliance-glossary/cmmc/">CMMC</a> exists because DFARS didn&#8217;t work.</p><p>If the CMMC pipeline cannot scale, CMMC becomes the next DFARS. Only this time the self-attestation will be called a waiver.</p><h3><strong>What Contractors Cannot Control</strong></h3><p>Some of the factors a contractor can control. The gap between 83% confidence and 1% preparedness documented in the CyberSheath report is an operational gap. Contractors can close it with real evidence chains, rigorous mock assessments, and continuous monitoring infrastructure.</p><p>But the queue length is not within any individual contractor&#8217;s control. Neither is the C3PAO authorization backlog. Neither is GAO&#8217;s recommendation implementation timeline. Neither is the DoD OIG&#8217;s <a href="https://www.dodig.mil/reports.html/Article/4028189/audit-of-the-dods-process-for-authorizing-third-party-organizations-to-perform/">finding</a> that the C3PAO authorization process itself was not effectively implemented.</p><p>These are ecosystem problems. They do not have contractor-side solutions.</p><p>And contractors will pay the price for them anyway. <a href="https://redspin.com/momentum-but-slow-movement-the-state-of-dib-cmmc-readiness/">Redspin&#8217;s 2025 research</a> found 47% of contractors have already received flow-down demands from primes. A flow-down demand combined with a queue a contractor cannot access produces one outcome: contract loss.</p><h3><strong>The Honest Path Forward</strong></h3><p>There is a version of the next two years where the math closes. It requires three things.</p><p>The first is automation of evidence generation. <a href="https://www.keysight.com/content/dam/keysight/en/doc/gate/white-papers/The-Power-of-Proof-Turning-CMMC-Compliance-into-Competitive-Credibility.pdf">Keysight&#8217;s 2026 research</a> found only 3% of defense contractors use automated security validation tools. The manual-documentation approach does not scale to 80,000. It does not scale to 10,000. It scales to the 1% currently audit-ready, and no further.</p><p>The second is rapid expansion of <a href="http://kiteworks.com/risk-compliance-glossary/cmmc-third-party-assessor-organization-c3pao/">C3PAO</a> capacity. That is not a contractor-side decision. It is a policy question. But it is the only way the bottleneck moves.</p><p>The third is shared-infrastructure models that let small contractors inherit compliance from pre-validated platforms rather than building it from scratch. Extending the <a href="http://kiteworks.com/risk-compliance-glossary/fedramp/">FedRAMP</a> inheritance pattern to CMMC &#8212; treating certification as partially transferable where control is demonstrably shared &#8212; would compress the queue without weakening the standard.</p><p>Without these three, the program becomes a waiver regime. The only question is how fast.</p><p>This does not end in compliance. It ends in one of two places. Either the pipeline scales, and the standard holds. Or it doesn&#8217;t, and the standard degrades into the same self-attestation problem it was designed to solve.</p><p>The contractors who do the most to close the 83%/1% gap will be the ones best positioned regardless. The certificate matters. But the evidence underneath it matters more &#8212; because when the waiver environment arrives, the evidence is what will distinguish the contractors who meant the certificate from the ones who acquired it.</p>]]></content:encoded></item><item><title><![CDATA[Confidence Isn't Compliance — And the DIB Just Got the Receipts]]></title><description><![CDATA[83% of defense contractors say they're ready for CMMC. 1% actually are. The assessors are the ones keeping score.]]></description><link>https://kiteworks.substack.com/p/confidence-isnt-compliance-and-the</link><guid isPermaLink="false">https://kiteworks.substack.com/p/confidence-isnt-compliance-and-the</guid><dc:creator><![CDATA[Danielle Barbour]]></dc:creator><pubDate>Fri, 01 May 2026 15:02:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3vPH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcae2f1-7c4a-490c-84b7-3196c68ccded_720x480.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3vPH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcae2f1-7c4a-490c-84b7-3196c68ccded_720x480.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3vPH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcae2f1-7c4a-490c-84b7-3196c68ccded_720x480.png 424w, https://substackcdn.com/image/fetch/$s_!3vPH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcae2f1-7c4a-490c-84b7-3196c68ccded_720x480.png 848w, https://substackcdn.com/image/fetch/$s_!3vPH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcae2f1-7c4a-490c-84b7-3196c68ccded_720x480.png 1272w, https://substackcdn.com/image/fetch/$s_!3vPH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcae2f1-7c4a-490c-84b7-3196c68ccded_720x480.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3vPH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcae2f1-7c4a-490c-84b7-3196c68ccded_720x480.png" width="720" height="480" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/afcae2f1-7c4a-490c-84b7-3196c68ccded_720x480.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:480,&quot;width&quot;:720,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:433123,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://kiteworks.substack.com/i/195770988?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcae2f1-7c4a-490c-84b7-3196c68ccded_720x480.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3vPH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcae2f1-7c4a-490c-84b7-3196c68ccded_720x480.png 424w, https://substackcdn.com/image/fetch/$s_!3vPH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcae2f1-7c4a-490c-84b7-3196c68ccded_720x480.png 848w, https://substackcdn.com/image/fetch/$s_!3vPH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcae2f1-7c4a-490c-84b7-3196c68ccded_720x480.png 1272w, https://substackcdn.com/image/fetch/$s_!3vPH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcae2f1-7c4a-490c-84b7-3196c68ccded_720x480.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Phase 1 of CMMC has been in effect for six months. The independent research on who is ready tells a story nobody in the <a href="http://kiteworks.com/risk-compliance-glossary/defense-industrial-base/">defense industrial base</a> wanted to hear.</p><p>Preparedness is moving the wrong direction while the deadline moves forward.</p><h3><strong>The Gap Nobody Was Measuring</strong></h3><p><a href="https://cybersheath.com/resources/blog/state-of-the-dib-report-2025-only-1-of-contractors-are-ready-for-cmmc/">CyberSheath&#8217;s 2025 State of the Defense Industrial Base report</a>, conducted by Merrill Research across 300 defense contractors, found that 83% of contractors report high confidence in their compliance posture. Only 1% are fully prepared for assessment.</p><p>That is not a gap in preparation. It is a gap in perception.</p><p>The same report found preparedness has gotten worse, not better. It was 8% in 2023. Four percent in 2024. One percent in 2025. The defense industrial base is moving backward while the deadline moves forward.</p><p><a href="https://www.keysight.com/content/dam/keysight/en/doc/gate/white-papers/The-Power-of-Proof-Turning-CMMC-Compliance-into-Competitive-Credibility.pdf">Keysight&#8217;s 2026 research</a>, conducted with SIS International Research, hits the same wall from a different angle: 98% of contractors still not ready, 2% audit-ready. Two independent studies. Two sample frames. One conclusion nobody in the <a href="http://kiteworks.com/risk-compliance-glossary/defense-industrial-base/">DIB</a> wants to sit with.</p><h3><strong>The Assessors Are Telling the Truer Story</strong></h3><p>The sharpest evidence comes from outside the contractor community. In September 2025, <a href="https://2ea4318a.delivery.rocketcdn.me/wp-content/uploads/2025/09/CMMC-C3PAO-Survey-Report.pdf">Alluvionic surveyed authorized C3PAOs</a> &#8212; the assessors who conduct Level 2 evaluations &#8212; about what they actually find when contractors arrive for assessment.</p><p>Only 25% of <a href="http://kiteworks.com/risk-compliance-glossary/cmmc-third-party-assessor-organization-c3pao/">C3PAOs</a> said their clients are typically well prepared. Half delay or turn away Organizations Seeking Certification at least half the time. Eighty percent cited &#8220;assumed readiness without validation&#8221; as the top reason for rescheduling.</p><p>Contractors tell researchers they are confident. Assessors tell researchers four out of five rescheduling events happen because contractors assumed they were ready without validating it. Both statements cannot be true. The assessors win the tie, because they are the ones looking at the evidence.</p><h3><strong>What Produced the Gap</strong></h3><p>The confidence gap is not accidental. It is what happens when you train an entire industry to self-attest for a decade.</p><p>Under DFARS 252.204-7012, contractors certified their own posture. No external review contradicted them. That regime produced two things: a compliance paper trail, and an instinct to treat signed attestations as equivalent to validated controls.</p><p><a href="http://kiteworks.com/risk-compliance-glossary/cmmc-cui-and-what-it-means/">CMMC</a> changes the standard. It does not change the instinct.</p><p>Executives accustomed to signing their own compliance letters believe those letters mean what they always meant. Assessors, reading the same controls against operational evidence, reach a different conclusion. Phase 1 of CMMC has been in effect since November 10, 2025, but Phase 1 is dominated by self-assessment &#8212; and self-assessment is the exact mechanism that produced the gap in the first place.</p><p>Phase 2 arrives November 10, 2026. Seven months from today. That is when <a href="http://kiteworks.com/risk-compliance-glossary/cmmc-third-party-assessor-organization-c3pao/">C3PAO</a>-assessed Level 2 becomes mandatory for contracts handling controlled unclassified information &#8212; and when the 83% will find out what the 25% already know.</p><h3><strong>What Actually Works</strong></h3><p>The organizations that close the gap share a posture, not a tool. They treat every control as two artifacts: a policy, and an evidence stream.</p><p>If a control cannot produce a continuous, externally verifiable record that it operated as described, they treat it as unbuilt. This is the architectural shift that everything else rides on. Documentation describes intent. Evidence proves operation. Assessors evaluate operation.</p><p>The data-layer governance pattern &#8212; unified audit logging across every channel where <a href="http://kiteworks.com/risk-compliance-glossary/cmmc-cui-and-what-it-means/">CUI</a> moves, continuous policy enforcement, tamper-evident records that survive external review &#8212; is the architecture the Alluvionic finding quietly demands. It is not a feature set. It is the difference between arriving at a C3PAO assessment with a binder and arriving with a record.</p><h3><strong>What to Do This Week</strong></h3><p><strong>Run one live evidence test.</strong> Pick a single <a href="http://kiteworks.com/risk-compliance-glossary/protect-cui-with-nist-800-171-compliance/">NIST 800-171</a> control. Try to produce 180 days of operational evidence on 72 hours&#8217; notice. Most contractors cannot. The ones who cannot are not ready.</p><p><strong>Hire a mock assessor who is not incentivized to find you ready.</strong> The standard mock assessment reinforces assumed readiness. An uncomfortable one surfaces the gap. <a href="https://redspin.com/momentum-but-slow-movement-the-state-of-dib-cmmc-readiness/">Redspin found</a> contractors who conducted rigorous mock assessments were four times more likely to pass on the first try.</p><p><strong>Audit flow-down exposure now.</strong> Redspin reported 47% of contractors have already received flow-down demands from primes. The 15% of small contractors in <a href="https://2ea4318a.delivery.rocketcdn.me/wp-content/uploads/2025/04/CMMC-Small-DIB-Contractors-Survey-Report-1.pdf">Alluvionic&#8217;s small-contractor survey</a> who have already lost business because of readiness gaps did not see it coming either.</p><p>The one percent figured it out early. Everyone else is about to &#8212; in front of a C3PAO, not in front of a survey. Some in 2026. Some in 2027. A few with a prime already walking out the door.</p>]]></content:encoded></item><item><title><![CDATA[Chile Made "Explainable AI" a Legal Right]]></title><description><![CDATA[A Chilean customer is denied a loan by an AI underwriting model. They write to the bank and ask why. The bank's AI provider sends a one-page response about "model factors" and "risk segmentation."]]></description><link>https://kiteworks.substack.com/p/chile-ai-law-article-8-bis-explanation</link><guid isPermaLink="false">https://kiteworks.substack.com/p/chile-ai-law-article-8-bis-explanation</guid><dc:creator><![CDATA[Patrick Spencer]]></dc:creator><pubDate>Thu, 30 Apr 2026 21:01:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!FBzB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b88dc9-28cb-4da8-8e56-bbb3a4a6336f_720x480.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FBzB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b88dc9-28cb-4da8-8e56-bbb3a4a6336f_720x480.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FBzB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b88dc9-28cb-4da8-8e56-bbb3a4a6336f_720x480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FBzB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b88dc9-28cb-4da8-8e56-bbb3a4a6336f_720x480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FBzB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b88dc9-28cb-4da8-8e56-bbb3a4a6336f_720x480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FBzB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b88dc9-28cb-4da8-8e56-bbb3a4a6336f_720x480.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FBzB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b88dc9-28cb-4da8-8e56-bbb3a4a6336f_720x480.jpeg" width="720" height="480" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/27b88dc9-28cb-4da8-8e56-bbb3a4a6336f_720x480.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:480,&quot;width&quot;:720,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:58878,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://kiteworks.substack.com/i/195813998?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b88dc9-28cb-4da8-8e56-bbb3a4a6336f_720x480.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FBzB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b88dc9-28cb-4da8-8e56-bbb3a4a6336f_720x480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FBzB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b88dc9-28cb-4da8-8e56-bbb3a4a6336f_720x480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FBzB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b88dc9-28cb-4da8-8e56-bbb3a4a6336f_720x480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FBzB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b88dc9-28cb-4da8-8e56-bbb3a4a6336f_720x480.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Under <a href="https://www.bcn.cl/leychile/navegar?idNorma=1209272">Chile&#8217;s new privacy law,</a> that response is now legally inadequate.</p><p>Article 8 bis of Ley 21.719 &#8212; enforceable December 1, 2026 &#8212; gives Chilean data subjects an explicit right to a meaningful explanation of any automated decision producing legal or significant effects. Not the implied right under <a href="http://kiteworks.com/risk-compliance-glossary/gdpr/">GDPR</a> Article 22. The <em>explicit</em> right, by name. Chilean academics have flagged that operationalizing it for AI systems &#8220;poses significant technical and regulatory challenges.&#8221; That&#8217;s polite phrasing for a structural problem most AI vendors haven&#8217;t solved.</p><p>Here&#8217;s the part most people are missing: Article 8 bis is not the only AI obligation hitting Chilean operators in 2026. It is one of three.</p><h3><strong>Three Laws, One December</strong></h3><p>Chile&#8217;s <a href="https://www.bcn.cl/leychile/navegar?idNorma=1208230">Ley 21.663</a> &#8212; the cybersecurity framework &#8212; has been in force since January 2025. On December 17, 2025, ANCI published the names of 732 Operators of Vital Importance in the Diario Oficial. Banks, hospitals, telecoms, digital service providers, government agencies. Administrative sanctions up to 40,000 UTM, roughly CLP $2.6 billion, imposed by the regulator without a court.</p><p>Ley 21.719 follows on December 1, 2026 &#8212; fines up to 4% of annual revenue, <a href="http://kiteworks.com/risk-compliance-glossary/gdpr/">GDPR</a>-modeled, with Article 8 bis on top.</p><p>Then <a href="https://www.camara.cl/legislacion/ProyectosDeLey/tramitacion.aspx?prmID=17323&amp;prmBoletin=16821-19">AI Bill 16821-19</a>, which cleared the Chamber in October 2025 and now sits in the Senate. It imports the <a href="http://kiteworks.com/risk-compliance-glossary/eu-ai-act/">EU AI Act&#8217;s</a> four-tier risk regime, requires synthetic content labeling, and reaches foreign AI providers whose outputs are used in Chile.</p><p>Three laws. One regulator network &#8212; ANCI plus the new Agencia de Protecci&#243;n de Datos Personales. One December.</p><p>If you&#8217;re an OIV under the cybersecurity law, you&#8217;re almost certainly subject to all three.</p><h3><strong>Why the AI Bill Is Already Enforceable Without the Senate</strong></h3><p>Most foreign AI vendors are getting Chile wrong on this point. They&#8217;re treating the AI Bill as a future obligation that kicks in once the Senate passes it. Chilean courts are already enforcing AI principles using existing instruments &#8212; and they have been since January 2025.</p><p>On January 6, 2025, the <a href="https://digitalpolicyalert.org/event/26647-chilean-supreme-court-rules-worldcoins-collection-of-biometric-data-of-minors-as-unconstitutional">Chilean Supreme Court ruled against Worldcoin</a> in a case involving biometric data collected from a 17-year-old without parental consent. The court ordered deletion within 30 days, applied &#8220;reinforced constitutional protection&#8221; to sensitive biometric data, and rejected the company&#8217;s deletion certification as inadequate unless verified against a formal standard such as <a href="http://kiteworks.com/risk-compliance-glossary/iso-27000-standards/">ISO 27001</a>.</p><p>Read it again. The bar for AI compliance in Chile is <em>ISO-grade verifiable evidence</em>, set by the Supreme Court, before the AI Bill becomes law.</p><p>The threat environment is why courts and the legislature both moved fast. The <a href="https://www.sophos.com/en-us/whitepaper/state-of-ransomware">Sophos State of Ransomware in Chile 2025</a> survey of 122 Chilean organizations found a $675,000 median ransom payment. The <a href="https://www.crowdstrike.com/global-threat-report/">CrowdStrike 2026 Global Threat Report</a> documents an 89% increase in AI-enabled adversary attacks year over year. Chile is catching up to risk, not regulating ahead of it.</p><h3><strong>The Explanation Problem Most AI Architectures Cannot Solve</strong></h3><p>Back to Article 8 bis. The right to an explanation sounds reasonable until you ask what it actually requires.</p><p>A meaningful explanation needs the data inputs the system used, the policy rules applied, the model factors and weights, and the output &#8212; in a form a non-technical customer can understand and a regulator can verify. Most production AI doesn&#8217;t generate any of that as a byproduct of running. It generates an answer. The explanation has to be reconstructed afterward from logs that &#8212; for most organizations &#8212; don&#8217;t exist at the granularity required.</p><p>The <a href="https://www.kiteworks.com/sites/default/files/resources/kiteworks-report-2026-data-sovereignty-compliance-incidents.pdf">Kiteworks Data Security and Compliance Risk: 2026 Forecast Report</a> &#8212; a survey of 225 security, IT, compliance, and risk leaders &#8212; found that 61% of organizations have AI logs too fragmented to be actionable. 63% can&#8217;t enforce purpose limitations on AI agents. 60% can&#8217;t terminate a misbehaving agent.</p><p>Translate that into Chilean compliance terms. If you can&#8217;t tell an Article 8 bis auditor which data inputs and policy decisions produced an automated outcome, you can&#8217;t deliver a meaningful explanation. If you can&#8217;t enforce purpose limitations on an AI agent, you can&#8217;t satisfy ANCI&#8217;s Article 5(1) dependency requirements. If you can&#8217;t generate an evidence-quality <a href="http://kiteworks.com/regulatory-compliance/audit-log/">audit trail</a>, you can&#8217;t meet the documentation obligations the AI Bill will impose on High Risk systems.</p><p>One missing capability fails three frameworks at once.</p><h3><strong>What Actually Works: Per-Operation Governance Independent of the Model</strong></h3><p>Model-level guardrails won&#8217;t get you through this. Neither will written AI acceptable-use policies.</p><p>The 2026 Forecast Report makes the distinction explicit: these are control-plane deficiencies, not policy failures. The written policy may exist. The runtime enforcement does not.</p><p>What does work is per-operation governance independent of the model. Every AI request &#8212; whether from a chatbot, a RAG pipeline, an MCP-connected agent, or an autonomous decision system &#8212; gets authenticated, evaluated against <a href="http://kiteworks.com/risk-compliance-glossary/attribute-based-access-control/">attribute-based access policy</a>, and logged with complete attribution before it touches regulated data. Not at session start. On every single operation.</p><p>This is the architectural pattern platforms like <a href="https://www.kiteworks.com/">Kiteworks</a> are building around &#8212; a governed data layer where AI is auditable and containable across email, file sharing, MFT, APIs, web forms, and AI integrations.</p><p>The architecture test is the question that decides whether this works in practice: are the controls independent of the model, or are they configuration settings inside the system being attacked? If the answer is the second, the controls don&#8217;t survive an adversarial scenario, an audit, or a Chilean court ruling. The Worldcoin case proved that.</p><h3><strong>What to Do Before December</strong></h3><p><strong>Map every AI workflow that produces an automated decision affecting a Chilean data subject.</strong> Credit scoring, hiring, insurance underwriting, benefits adjudication, fraud denial. Each one is potentially in scope under Article 8 bis.</p><p><strong>Audit your <a href="http://kiteworks.com/regulatory-compliance/audit-log/">audit trail</a>.</strong> Can you reconstruct, today, the exact data inputs and policy decisions that produced any one of those automated outcomes from the past 90 days? If the answer is no, the production evidence does not exist yet.</p><p><strong>Pre-authorize your High Risk systems internally</strong> against the AI Bill&#8217;s four tiers. Chilean courts have shown they will apply constitutional protection to biometric and sensitive AI today. Don&#8217;t wait for the Senate.</p><p><strong>Stop treating the three laws as three projects.</strong> They share an architectural answer &#8212; per-operation governance with evidence-quality audit trails. Build it once.</p><p>The compliance windows aren&#8217;t opening sequentially. They&#8217;re closing together.</p><p>A Supreme Court already showed what the bar looks like. ANCI has 732 names to enforce against. December 2026 is closer than it looks.</p><p>The question I&#8217;d ask any AI vendor selling into Chile right now: when a Chilean customer invokes Article 8 bis tomorrow, can you produce the explanation from primary evidence &#8212; or are you going to reconstruct it from logs that don&#8217;t exist?</p>]]></content:encoded></item><item><title><![CDATA[A $120,000 Annual Tax on Being a Small Defense Contractor]]></title><description><![CDATA[Fifteen percent of small DIB contractors have already lost business because of CMMC. The consolidation the program will produce is not a policy objective anyone has stated.]]></description><link>https://kiteworks.substack.com/p/a-120000-annual-tax-on-being-a-small</link><guid isPermaLink="false">https://kiteworks.substack.com/p/a-120000-annual-tax-on-being-a-small</guid><dc:creator><![CDATA[Danielle Barbour]]></dc:creator><pubDate>Thu, 30 Apr 2026 15:08:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-L-e!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c5831a-33ac-4b26-a06a-ed486b5364f0_720x480.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-L-e!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c5831a-33ac-4b26-a06a-ed486b5364f0_720x480.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-L-e!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c5831a-33ac-4b26-a06a-ed486b5364f0_720x480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-L-e!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c5831a-33ac-4b26-a06a-ed486b5364f0_720x480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-L-e!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c5831a-33ac-4b26-a06a-ed486b5364f0_720x480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-L-e!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c5831a-33ac-4b26-a06a-ed486b5364f0_720x480.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-L-e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c5831a-33ac-4b26-a06a-ed486b5364f0_720x480.jpeg" width="720" height="480" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/93c5831a-33ac-4b26-a06a-ed486b5364f0_720x480.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:480,&quot;width&quot;:720,&quot;resizeWidth&quot;:720,&quot;bytes&quot;:57720,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://kiteworks.substack.com/i/195771437?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1caa7130-25c8-4f03-8e8c-6bd7bca3ccab_720x480.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-L-e!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c5831a-33ac-4b26-a06a-ed486b5364f0_720x480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-L-e!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c5831a-33ac-4b26-a06a-ed486b5364f0_720x480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-L-e!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c5831a-33ac-4b26-a06a-ed486b5364f0_720x480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-L-e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c5831a-33ac-4b26-a06a-ed486b5364f0_720x480.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The sustainment cost of<a href="http://kiteworks.com/risk-compliance-glossary/a-guide-to-cmmc-level-2-compliance-requirements/"> CMMC Level 2</a>, according to <a href="https://2ea4318a.delivery.rocketcdn.me/wp-content/uploads/2025/04/CMMC-Small-DIB-Contractors-Survey-Report-1.pdf">Alluvionic&#8217;s 2025 survey of small DIB contractors</a>, runs over $120,000 a year. Many of the small contractors facing that bill make less than $200,000 in net profit in a good year.</p><p>They are not CMMC failures. They are CMMC statistics waiting to happen.</p><p>Fifteen percent of small DIB contractors have already lost business due to readiness gaps. Seventy-three percent have been preparing for over a year and are still not done. Forty percent of Level 2-focused small contractors have already spent more than $100,000. Phase 1 of the program went live on November 10, 2025, and the pressure has only increased since.</p><h3><strong>The Framing Nobody Wants to Use</strong></h3><p><a href="http://kiteworks.com/risk-compliance-glossary/cmmc/">CMMC</a> is sometimes discussed as a compliance story. That framing misses the point entirely.</p><p>CMMC is a market-structure intervention. It imposes fixed compliance costs on a contractor base the Department of Defense itself describes as roughly 300,000 companies. About 80,000 of those need <a href="http://kiteworks.com/risk-compliance-glossary/a-guide-to-cmmc-level-2-compliance-requirements">Level 2 certification</a>.</p><p>Fixed compliance costs have a predictable effect on markets &#8212; every time, in every regulated industry, without exception. Large contractors absorb the costs. Mid-tier contractors absorb them at a cost to margin. Small contractors either exit the market or get acquired by larger ones that can amortize the expense.</p><p>Sarbanes-Oxley did this to public company audits. <a href="http://kiteworks.com/risk-compliance-glossary/hipaa/">HIPAA</a> did this to independent medical practices. <a href="http://kiteworks.com/risk-compliance-glossary/gdpr/">GDPR</a> did this to European ad-tech. Every regulated market that has ever imposed fixed compliance costs has consolidated. CMMC will too, unless the fixed cost can be pushed down.</p><h3><strong>The Consolidation Is Already Visible</strong></h3><p><a href="https://www.kiteworks.com/company/press-releases/kiteworks-coalfire-cmmc-preparedness-gaps-report/">Kiteworks + Coalfire research</a> surveyed 209 DIB organizations in spring 2025 and found a stark budget divide. Sixty-two percent of large organizations had approved CMMC budgets with dedicated teams. Twenty-three percent of small organizations did.</p><p><a href="https://cybersheath.com/resources/blog/state-of-the-dib-report-2025-only-1-of-contractors-are-ready-for-cmmc/">CyberSheath&#8217;s 2025 data</a> pegged average annual CMMC budgets at nearly $50,000 &#8212; and that number almost certainly understates the true cost for contractors still discovering their gaps. <a href="https://www.keysight.com/content/dam/keysight/en/doc/gate/white-papers/The-Power-of-Proof-Turning-CMMC-Compliance-into-Competitive-Credibility.pdf">Keysight&#8217;s 2026 research</a>, across 206 contractors, found 36% of small businesses cite lack of internal expertise as their top CMMC barrier.</p><p>Expertise is not a hiring problem small contractors can solve through the market. Cybersecurity professionals with <a href="http://kiteworks.com/risk-compliance-glossary/cmmc-cui-and-what-it-means/">CUI</a>-handling experience are scarce across the entire economy, and small contractors are the lowest bidder in that labor market. A 42-person machine shop is not going to out-recruit Lockheed Martin for a <a href="http://kiteworks.com/risk-compliance-glossary/cmmc/">CMMC</a>-cleared security engineer.</p><h3><strong>Why This Is a National Security Problem</strong></h3><p>The Department of Defense does not procure from its primes. It procures from a layered <a href="http://kiteworks.com/risk-compliance-glossary/supply-chain-risk-management/">supply chain</a> in which small and mid-tier subcontractors provide the engineering specialization, manufacturing capacity, and regional diversity the primes depend on. When the base of the pyramid thins out, resilience goes with it.</p><p>This is not a theoretical concern. The Small Business Administration&#8217;s Office of Advocacy has <a href="https://advocacy.sba.gov/">repeatedly warned</a> that <a href="http://kiteworks.com/risk-compliance-glossary/regulatory-compliance-definition/">regulatory compliance</a> costs fall disproportionately on small businesses and produce market concentration. The National Defense Industrial Association has flagged the same concerns about CMMC&#8217;s effect on the small contractor base.</p><p>The geographic dimension is underappreciated. Many of the small contractors under pressure are concentrated in regions whose manufacturing base depends on defense work &#8212; the Rust Belt, the Gulf Coast, the Mountain West. Every small contractor that exits the <a href="http://kiteworks.com/risk-compliance-glossary/defense-industrial-base/">DIB</a> is not replaced by a larger one in the same ZIP code. The work consolidates toward the regions that already host the primes. The defense manufacturing map the country has in 2030 will look less distributed than the one it had in 2024.</p><h3><strong>The Waiver Problem Nobody Is Talking About</strong></h3><p>In March 2026, the GAO <a href="https://www.gao.gov/products/gao-26-107955">warned</a> that DoD has not systematically addressed external factors that could impede CMMC implementation &#8212; including assessor capacity. With fewer than 100 <a href="http://kiteworks.com/risk-compliance-glossary/cmmc-third-party-assessor-organization-c3pao/">C3PAOs</a> against 80,000 contractors needing Level 2, the math does not close.</p><p>Small contractors, without the resources to jump the queue, will be last served.</p><p>A compliance regime that runs on waivers tolerates non-compliance. A small-contractor base that waits years for a waiver it was never guaranteed to receive consolidates. That is not a policy design choice. That is what happens when the design never accounted for the access question.</p><h3><strong>What Would Actually Change the Trajectory</strong></h3><p>The single most effective lever against the fixed-cost problem is not lower compliance requirements &#8212; it is lower compliance costs. Keysight found only 3% of defense contractors use automated security validation tools. The answer is not to hire more compliance staff. There aren&#8217;t any.</p><p>The answer is shared infrastructure. Small contractors that share secure data-handling platforms should be able to inherit compliance from their shared providers. Federal subsidies for compliance automation targeted at small contractors would reduce sustainment costs without weakening the standard. Consortium certification models &#8212; treating certification as transferable where control is demonstrably shared &#8212; would reduce per-contractor cost at scale.</p><p>Right now, the policy toolkit is educational content, self-assessment tooling, and regional outreach. Those help. They do not change the math.</p><p>The <a href="http://kiteworks.com/risk-compliance-glossary/defense-industrial-base/">defense industrial base</a> the country has in 2030 is the one <a href="http://kiteworks.com/risk-compliance-glossary/cmmc/">CMMC</a> produces now. Consolidation is not a stated goal of the program. It will be a consequence of it anyway.</p>]]></content:encoded></item><item><title><![CDATA[When Four UK Regulators Speak in Unison, Pay Attention]]></title><description><![CDATA[The DRCF just dropped a 7-point compliance hit list for agentic AI &#8212; and "my agent did it" is not a defense any of them will accept.]]></description><link>https://kiteworks.substack.com/p/when-four-uk-regulators-speak-in</link><guid isPermaLink="false">https://kiteworks.substack.com/p/when-four-uk-regulators-speak-in</guid><dc:creator><![CDATA[Marc ten Eikelder]]></dc:creator><pubDate>Wed, 29 Apr 2026 21:49:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!23jD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17d58a3c-7e39-4040-bc2a-3513dc12eca9_450x300.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!23jD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17d58a3c-7e39-4040-bc2a-3513dc12eca9_450x300.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!23jD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17d58a3c-7e39-4040-bc2a-3513dc12eca9_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!23jD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17d58a3c-7e39-4040-bc2a-3513dc12eca9_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!23jD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17d58a3c-7e39-4040-bc2a-3513dc12eca9_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!23jD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17d58a3c-7e39-4040-bc2a-3513dc12eca9_450x300.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!23jD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17d58a3c-7e39-4040-bc2a-3513dc12eca9_450x300.jpeg" width="450" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/17d58a3c-7e39-4040-bc2a-3513dc12eca9_450x300.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:450,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:75940,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://kiteworks.substack.com/i/195921775?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17d58a3c-7e39-4040-bc2a-3513dc12eca9_450x300.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!23jD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17d58a3c-7e39-4040-bc2a-3513dc12eca9_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!23jD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17d58a3c-7e39-4040-bc2a-3513dc12eca9_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!23jD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17d58a3c-7e39-4040-bc2a-3513dc12eca9_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!23jD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17d58a3c-7e39-4040-bc2a-3513dc12eca9_450x300.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I have been waiting for a regulator to say what the <a href="https://www.drcf.org.uk/publications/papers/thefutureofagenticai">Digital Regulation Cooperation Forum</a> finally said out loud on 31 March 2026. Four UK regulators &#8212; the Competition and Markets Authority, the Financial Conduct Authority, the Information Commissioner&#8217;s Office, and Ofcom &#8212; co-signed a foresight paper called <em>The Future of Agentic AI</em>. The paper carries a polite disclaimer that it should not be read as policy. Read it as policy.</p><p>It identifies seven categories of compliance risk every business deploying AI agents now must answer for. And it asserts something most companies do not seem to grasp. Organizational responsibility for legal compliance is unchanged regardless of how autonomously the agent acts.</p><p>When the agent breaks the rule, the company gets fined.</p><h3>The Seven Risks</h3><p>The DRCF organized its warnings under four cross-regulatory headings. The operational substance is seven distinct compliance failure modes.</p><p><strong>Fragmented accountability</strong> &#8212; the &#8220;many hands&#8221; problem. When model providers, system integrators, and downstream deployers all contribute to an agent&#8217;s behavior, who owns the breach? The company whose name is on the customer relationship.</p><p><strong>Data protection and minimization failures.</strong> Agents that traverse data they didn&#8217;t need or process for purposes they weren&#8217;t authorized for.</p><p><strong>Prompt injection and agent manipulation.</strong> Adversaries turning your agent into their tool with a few well-placed words.</p><p><strong>Action bundling.</strong> Agents executing strings of decisions a human user never specifically authorized &#8212; fatal under the FCA&#8217;s Consumer Duty.</p><p><strong>Algorithmic collusion.</strong> Agents implicitly coordinating on prices or behaviors without any explicit agreement between operators.</p><p><strong>Dark patterns.</strong> Agents optimized for engagement at the expense of consumer outcomes.</p><p><strong>Online-safety classification.</strong> Comparison agents that get treated as regulated search services under the Online Safety Act, with statutory obligations attached.</p><p>The <a href="https://www.icaew.com/insights/viewpoints-on-the-news/2026/apr-2026/can-ai-agents-create-regulatory-compliance-risks">ICAEW translated the seven risks for accountancy firms</a> last week. The translation applies to every regulated sector. Every one of these is observable today &#8212; researchers have already documented frontier models that price-fix, <a href="https://www.mondaq.com/uk/new-technology/1772678/the-drcfs-quiet-warning-to-businesses-on-agentic-ai">steal credentials, and hide messages inside ordinary text</a>, in commercial use. The DRCF is not warning about a hypothetical future. It is naming behaviors already in production.</p><h3>Why This Is Bigger Than the UK</h3><p>If this were a single regulator, you could file it. But the DRCF is four regulators speaking with one voice, and their concerns map almost perfectly onto frameworks already in force elsewhere.</p><p>The <a href="https://hai.stanford.edu/ai-index/2026-ai-index-report">Stanford AI Index 2026</a> tracked which regulations now shape responsible-AI decisions inside enterprises. <a href="https://www.kiteworks.com/risk-compliance-glossary/gdpr/">GDPR</a> remained dominant at 60% influence. The <a href="https://www.kiteworks.com/risk-compliance-glossary/eu-ai-act/">EU AI Act</a> and U.S. AI Executive Order both rose. ISO/IEC 42001 &#8212; the AI management system standard &#8212; appeared for the first time, cited by 36% of organizations. NIST&#8217;s AI Risk Management Framework was cited by 33%. The share of organizations reporting <em>no</em> regulatory influence fell from 17% to 12%.</p><p>Build for the DRCF&#8217;s seven risks and you satisfy most of what the EU AI Act, ISO 42001, NIST AI RMF, the U.S. AI Executive Order, and the FCA&#8217;s Consumer Duty already demand. Build for none of them and you have an enforcement queue forming.</p><p>Three of the four DRCF members &#8212; the FCA, the ICO, and the CMA &#8212; have active enforcement powers and recent records of using them. The ICO has flagged a forthcoming statutory Code of Practice on AI and automated decision-making, expected to carry evidential weight in enforcement.</p><p>This is not a foresight paper. It is a roadmap.</p><h3>Almost No One Can Answer the Accountability Question</h3><p>The DRCF&#8217;s &#8220;many hands&#8221; problem is not really philosophical. It is an <a href="https://www.kiteworks.com/regulatory-compliance/audit-log/">audit trail</a> question. When something goes wrong, regulators want to see who authorized what, when, against which data. Most organizations cannot produce that record for their AI agent activity.</p><p>The <a href="a%20href=%22/sites/default/files/resources/kiteworks-report-2026-data-security-compliance-risk-forecast.pdf%22">Kiteworks Data Security and Compliance Risk: 2026 Forecast Report</a> found that 63% of surveyed organizations cannot enforce purpose limitations on AI agents. 60% cannot terminate a misbehaving agent. 55% cannot isolate AI systems from the broader network. Government respondents fared worse: 90% lack purpose binding, 76% lack working kill switches.</p><p>Meanwhile, 100% of those same organizations have agentic AI on their roadmap.</p><p>That is the gap. Every organization is deploying. Almost none can constrain. The 2026 Forecast Report frames it as a 15-to-20-point gap between governance controls organizations claim and containment controls that work when tested.</p><p>Which side of that gap is your organization on, and could you prove it to a regulator on Monday?</p><h3>Identity Controls Will Not Save You</h3><p>The reflexive corporate response to AI agent governance has been to lean on identity. Authenticate the agent. Give it a service account. Scope its tokens. Treat it like a user.</p><p>This will not survive the DRCF framework.</p><p>Identity controls answer one question: Is this agent allowed to access this system? They do not answer the question regulators are actually asking: Is this agent allowed to read this specific record, for this specific purpose, at this specific time, on behalf of this specific human authorizer?</p><p>That second question is a <em>data-layer</em> question. Identity governance solves SaaS access. It does not solve agent governance.</p><p><a href="https://www.anthropic.com/news/disrupting-AI-espionage">Anthropic made this point</a> in concrete terms last September. A Chinese state-sponsored actor used Claude Code plus Model Context Protocol tools as autonomous orchestrators across roughly 30 entities, executing 80&#8211;90% of the tactical work of a major cyber-espionage campaign with humans intervening only at four to six critical decision points. Every one of those agent actions was authenticated. The breach was a data-access failure, not an authentication failure.</p><p>If your AI governance program is identity-only, you are governing the front door of a building that has no internal walls.</p><h3>What the Architectural Answer Looks Like</h3><p>The pattern emerging across the DRCF risks, the EU AI Act, ISO 42001, and the <a href="https://www.weforum.org/publications/global-cybersecurity-outlook-2026/">WEF Global Cybersecurity Outlook 2026</a> is the same. AI agent compliance has to be enforced at the data layer.</p><p>That means three things, concretely. Attribute-based runtime policies that evaluate every agent action against data attributes, user attributes, and the action attempted. Tamper-evident logs that record every decision, attached to a stable agent identity and a human authorizer. A governed gateway between agents and data, so a successfully prompt-injected agent still cannot exceed the policy boundary.</p><p>This is the shape platforms like <a href="https://www.kiteworks.com/">Kiteworks</a> are building around. The architectural point is bigger than any one platform: Governance has to live with the data, not the model.</p><h3>What to Do This Quarter</h3><p>Treat the DRCF&#8217;s seven risks as a board-level checklist. Ask your CCO, GC, CISO, and CIO &#8212; separately &#8212; which risks the organization can answer today, which it cannot, and where the gap is. Do not accept &#8220;we&#8217;re working on it.&#8221;</p><p>Audit the gap between governance claims and containment reality. Test the kill switch. Most organizations discover theirs is theoretical.</p><p>Map agent activity to a tamper-evident audit trail before deploying anything new. Move governance enforcement from the model and identity layer to the data layer. Prepare an evidence package now, not after the inquiry.</p><p>The DRCF gave you a free risk register from four regulators with the means and motive to enforce against it. You can treat it as an early warning, or you can treat it as a pre-publication of next year&#8217;s enforcement priorities.</p><p>It is the same document either way. Only the timing changes.</p>]]></content:encoded></item><item><title><![CDATA[Your DSPM Just Wrote the First Page of Your Next Lawsuit]]></title><description><![CDATA[Discovery without governance isn't security. It's documented negligence with a timestamp.]]></description><link>https://kiteworks.substack.com/p/your-dspm-just-wrote-the-first-page</link><guid isPermaLink="false">https://kiteworks.substack.com/p/your-dspm-just-wrote-the-first-page</guid><dc:creator><![CDATA[Patrick Spencer]]></dc:creator><pubDate>Wed, 29 Apr 2026 15:01:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5h70!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39f0c04-e00a-4683-88e3-bd4fc4f02839_720x480.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5h70!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39f0c04-e00a-4683-88e3-bd4fc4f02839_720x480.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5h70!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39f0c04-e00a-4683-88e3-bd4fc4f02839_720x480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5h70!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39f0c04-e00a-4683-88e3-bd4fc4f02839_720x480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5h70!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39f0c04-e00a-4683-88e3-bd4fc4f02839_720x480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5h70!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39f0c04-e00a-4683-88e3-bd4fc4f02839_720x480.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5h70!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39f0c04-e00a-4683-88e3-bd4fc4f02839_720x480.jpeg" width="720" height="480" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a39f0c04-e00a-4683-88e3-bd4fc4f02839_720x480.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:480,&quot;width&quot;:720,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:98590,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://kiteworks.substack.com/i/195809153?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39f0c04-e00a-4683-88e3-bd4fc4f02839_720x480.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5h70!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39f0c04-e00a-4683-88e3-bd4fc4f02839_720x480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5h70!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39f0c04-e00a-4683-88e3-bd4fc4f02839_720x480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5h70!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39f0c04-e00a-4683-88e3-bd4fc4f02839_720x480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5h70!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa39f0c04-e00a-4683-88e3-bd4fc4f02839_720x480.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Imagine the scene. Tuesday morning, your <a href="http://kiteworks.com/risk-compliance-glossary/data-security-posture-management/">DSPM</a> platform finishes a scan of the corporate environment. By Tuesday afternoon, your security team has a clean inventory: every database holding regulated data, every overshared file repository, every misclassified blob of customer information sitting in a place it shouldn&#8217;t be.</p><p>Your team forwards the report up the chain. The CISO calls it a win. <em>We finally know what we have.</em></p><p>Then nothing happens. The findings sit in a ticket queue. The remediation timeline slips. Q1 rolls into Q3. In Q4, one of those flagged databases is breached. During discovery, plaintiffs&#8217; counsel subpoenas every DSPM scan report your security team has ever generated.</p><p>That Tuesday morning report just became Exhibit A. Against you.</p><h3><strong>DSPM Is Selling Faster Than Governance Is Getting Built</strong></h3><p>DSPM adoption is accelerating fast. Industry coverage in April 2026 reported that <a href="https://cypro.co.uk/insights/data-security-posture-management/">roughly 30% of UK CISOs are buying DSPM solutions in 2026</a> to reduce data exposure across cloud, SaaS, and on-prem environments. The US public sector is on the same curve &#8212; <a href="https://statetechmagazine.com/article/2026/04/data-security-posture-management-has-become-essential-governments-perfcon">StateTech Magazine reported in April 2026 that DSPM has become essential for state and local governments</a> navigating hybrid cloud and rising regulatory pressure.</p><p>Good. They should be buying it. You cannot govern what you cannot find.</p><p>But here&#8217;s what nobody priced into the business case: discovery is the front end of a four-stage program &#8212; <em>discover, govern, track, prove.</em> <a href="http://kiteworks.com/risk-compliance-glossary/data-security-posture-management/">DSPM</a> solves stage one. It doesn&#8217;t solve the other three. And the organizations I see are buying stage one without funding stages two through four.</p><p>That&#8217;s not a security program. That&#8217;s a liability documentation program.</p><h3><strong>Discovery Creates Duty. Most Lawyers Already Know This.</strong></h3><p>Before DSPM, an organization could plausibly argue <em>&#8220;we didn&#8217;t know that data was there.&#8221;</em> Not a great defense, but a defense.</p><p>After <a href="http://kiteworks.com/risk-compliance-glossary/data-security-posture-management/">DSPM</a>, that argument is gone. The organization knew exactly where the data was. Knew it was inadequately protected. Had the tool, ran the scan, generated the report &#8212; and then either acted or didn&#8217;t.</p><p>Three legal principles converge here. <strong>Actual knowledge.</strong> A completed DSPM scan provides it; the duty to protect attaches the moment the scan completes. <strong>Willful blindness rejected.</strong> Courts increasingly reject the &#8220;we chose not to look&#8221; defense when adequate tools were available and not deployed. <strong>The remediation clock.</strong> Discovery triggers a &#8220;reasonable time&#8221; obligation to act &#8212; days to weeks for high-risk data, months for lower categories.</p><p>Tagging is an admission of knowledge. If tagged data is inadequately protected when a breach happens, you have documented your own negligence. That&#8217;s not me being dramatic. That&#8217;s plaintiffs&#8217; counsel reading your scan reports out loud at trial.</p><h3><strong>Governance Gap Is Wider Than the Discovery Gap</strong></h3><p>Now look at what happens after the scan. <a href="https://www.kiteworks.com/sites/default/files/resources/kiteworks-report-2026-data-sovereignty-compliance-incidents.pdf">Kiteworks Data Security and Compliance Risk: 2026 Forecast Report</a> found that 33% of organizations lack evidence-quality <a href="http://kiteworks.com/regulatory-compliance/audit-log/">audit trails</a> and 61% have fragmented, non-actionable logs. The 2026 Forecast Report also found that 78% of organizations cannot validate data entering AI training pipelines, 63% cannot enforce purpose limitations on AI agents, and 60% cannot quickly terminate a misbehaving agent.</p><p>Read those numbers carefully. They are not discovery gaps. They are <em>governance</em> gaps. They describe what happens to the data after DSPM finds it.</p><p>Worse: only 28% of organizations have reached &#8220;Managed&#8221; <a href="http://kiteworks.com/risk-compliance-glossary/data-governance/">data governance</a> maturity. Twenty-five percent still rely on manual or periodic compliance processes. In a regulatory environment that increasingly expects continuous evidence, periodic compliance is a liability waiting to surface.</p><p>The <a href="https://cpl.thalesgroup.com/data-threat-report">2026 Thales Data Threat Report</a> reaches a parallel conclusion from a different angle: only 33% of organizations have complete knowledge of where their data is stored, just 39% can classify all of it, and of cloud-resident data classified as sensitive, only 47% is encrypted. Even the organizations that <em>know</em> where their data is mostly cannot prove what controls they applied.</p><p>That&#8217;s the gap that turns <a href="http://kiteworks.com/risk-compliance-glossary/data-security-posture-management/">DSPM</a> from an asset into evidence.</p><h3><strong>The DSPM-Only Failure Mode</strong></h3><p>A DSPM-only program creates the worst posture an organization can hold: documented knowledge of exposure without documented remediation. Pre-DSPM organizations could plausibly claim ignorance. DSPM-only organizations have replaced ignorance with a written record of unaddressed risk. That&#8217;s strictly worse than where they started.</p><p>The third-party dimension makes it bigger. Kiteworks 2026 Forecast Report found that 89% of organizations have never practiced <a href="http://kiteworks.com/risk-compliance-glossary/incident-response/">incident response</a> with their third-party vendors and 87% lack joint IR playbooks. When a partner is breached, DSPM might tell you which sensitive data was exposed. It will not tell you what controls were enforced when that data was exchanged, what audit trail exists, or what evidence you can hand a regulator.</p><p>And attackers know it. The <a href="https://www.crowdstrike.com/global-threat-report/">CrowdStrike 2026 Global Threat Report</a> documents an 89% year-over-year increase in attacks by AI-enabled adversaries and 82% malware-free detections. Adversaries are pivoting through cloud, SaaS, and identity systems instead of dropping malicious code. They are moving toward the data &#8212; through the exact channels DSPM observes but does not govern.</p><h3><strong>What Actually Works</strong></h3><p>If <a href="http://kiteworks.com/risk-compliance-glossary/data-security-posture-management/">DSPM</a> is stage one, what does the rest of the architecture look like?</p><p><strong>Discover.</strong> Where does sensitive data live, how is it classified, where is the exposure? (DSPM does this.) <strong>Govern.</strong> Move the data into a controlled environment where one policy engine enforces consistent rules across every channel &#8212; email, file sharing, <a href="http://kiteworks.com/risk-compliance-glossary/sftp/">SFTP</a>, <a href="http://kiteworks.com/risk-compliance-glossary/managed-file-transfer/">MFT</a>, <a href="http://kiteworks.com/risk-compliance-glossary/secure-web-forms/">web forms,</a> APIs, AI integrations. <strong>Track.</strong> Generate tamper-evident, evidence-quality <a href="http://kiteworks.com/regulatory-compliance/audit-log/">audt trails</a> of every access, transfer, and policy decision. <strong>Prove.</strong> Produce regulator-ready evidence on demand that demonstrates the organization acted on what discovery revealed.</p><p>The four stages have to operate as a single architecture, not a stack of disconnected tools. You cannot generate a unified evidence record from five separate systems with five different policy engines and five different log formats. That&#8217;s exactly why 61% of organizations have fragmented audit trails &#8212; because their data exchange infrastructure is fragmented in the first place.</p><p>This is the architectural pattern that platforms like <a href="https://www.kiteworks.com/">Kiteworks</a> are building around &#8212; a governed data exchange layer that sits downstream of DSPM. DSPM tells you where the sensitive data is. The governed layer is where you move it, apply consistent policy, and generate the evidence that closes the gap between discovery and breach. The DSPM report stops being Exhibit A against you and becomes the first half of a defensible record &#8212; paired with a remediation log that proves you acted.</p><h3><strong>The Monday Morning Checklist</strong></h3><p>If you bought DSPM, you bought a knowledge-creation tool. Here&#8217;s what to do on Monday so it doesn&#8217;t become a liability-creation tool.</p><p><strong>Treat every DSPM scan report as a legal document.</strong> Anything DSPM has flagged is now actual knowledge under tort law. Build a remediation timeline tied to <a href="http://kiteworks.com/risk-compliance-glossary/risk-assessment/">risk classification</a> &#8212; days for high-risk, weeks for medium, months for lower-risk &#8212; and document every action against it.</p><p><strong>Audit the gap between discovery and governance.</strong> Which DSPM findings flow into automated policy enforcement, and which sit in tickets waiting on someone? That&#8217;s the maturity gap. The Kiteworks 2026 Forecast Report found that 25% of organizations still rely on manual or periodic compliance processes &#8212; periodic compliance is the audit equivalent of fingers crossed.</p><p><strong>Consolidate the data exchange surface.</strong> Sixty-one percent of organizations have fragmented exchange infrastructure across email, file sharing, <a href="http://kiteworks.com/risk-compliance-glossary/sftp/">SFTP</a>, <a href="http://kiteworks.com/risk-compliance-glossary/managed-file-transfer/">MFT</a>, forms, and APIs. Each fragment is a separate policy domain. You cannot prove continuous control over a fragmented surface.</p><p><strong>Extend governance to AI data access.</strong> AI agents are the fastest-growing consumers of sensitive enterprise data. According to the Kiteworks 2026 Forecast Report, 60% of organizations cannot kill an AI agent that&#8217;s gone wrong. DSPM doesn&#8217;t fix that. A governed <a href="https://www.kiteworks.com/sites/default/files/resources/kiteworks-report-2026-data-sovereignty-compliance-incidents.pdf">AI data gateway</a> does &#8212; by enforcing <a href="http://kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/">zero-trust</a> access policy on every AI data request before it ever reaches the model.</p><p>The <a href="http://kiteworks.com/risk-compliance-glossary/data-security-posture-management/">DSPM</a> market is going to keep selling. That&#8217;s not the problem. The problem is the implicit promise &#8212; that finding the data is the same as protecting it.</p><p>It isn&#8217;t. And the next big breach is going to teach somebody that lesson the expensive way, on the witness stand, with their own scan report on the screen behind them.</p>]]></content:encoded></item><item><title><![CDATA[Canada Copied America’s Homework — and That’s Actually Smart]]></title><description><![CDATA[ITSP.10.171 is NIST SP 800-171 in a Canadian jacket.]]></description><link>https://kiteworks.substack.com/p/canada-copied-americas-homework-and</link><guid isPermaLink="false">https://kiteworks.substack.com/p/canada-copied-americas-homework-and</guid><dc:creator><![CDATA[Danielle Barbour]]></dc:creator><pubDate>Mon, 27 Apr 2026 20:28:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZOeh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359bc1ea-35e6-49aa-8710-91827eb883fa_450x300.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZOeh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359bc1ea-35e6-49aa-8710-91827eb883fa_450x300.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZOeh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359bc1ea-35e6-49aa-8710-91827eb883fa_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZOeh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359bc1ea-35e6-49aa-8710-91827eb883fa_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZOeh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359bc1ea-35e6-49aa-8710-91827eb883fa_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZOeh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359bc1ea-35e6-49aa-8710-91827eb883fa_450x300.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZOeh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359bc1ea-35e6-49aa-8710-91827eb883fa_450x300.jpeg" width="450" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/359bc1ea-35e6-49aa-8710-91827eb883fa_450x300.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:450,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:50660,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://kiteworks.substack.com/i/195641266?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359bc1ea-35e6-49aa-8710-91827eb883fa_450x300.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZOeh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359bc1ea-35e6-49aa-8710-91827eb883fa_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZOeh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359bc1ea-35e6-49aa-8710-91827eb883fa_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZOeh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359bc1ea-35e6-49aa-8710-91827eb883fa_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZOeh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F359bc1ea-35e6-49aa-8710-91827eb883fa_450x300.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>ITSP.10.171 is NIST SP 800-171 in a Canadian jacket. That&#8217;s not a weakness &#8212; it&#8217;s the most strategically intelligent regulatory decision Canada has made in cyber security.</em></p><p>When the Government of Canada <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada.html">rolled out CPCSC</a> and published <a href="https://www.cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171">ITSP.10.171</a>, the Canadian Centre for Cyber Security said the quiet part out loud: <em>&#8220;There are no substantial technical changes between this publication and NIST SP 800-171.&#8221;</em></p><p>No one should be surprised. And no one should complain.</p><p>Canada&#8217;s defence industrial base doesn&#8217;t exist in isolation. It exists at the intersection of Canadian sovereignty and Five Eyes interoperability. The country&#8217;s defense suppliers bid on both Canadian and U.S. Department of War contracts. They share specified information with American, British, and Australian counterparts. They operate in a procurement ecosystem that demands mutual trust in security posture across allied nations.</p><p>Building a novel, Canada-specific cyber security standard would have been an act of regulatory narcissism &#8212; years of development, zero interoperability, and a <a href="https://www.kiteworks.com/regulatory-compliance/data-compliance/">compliance</a> burden that punishes the very suppliers it&#8217;s meant to protect.</p><h3><strong>The Dual-Compliance Dividend</strong></h3><p>Here&#8217;s what the <a href="https://www.kiteworks.com/risk-compliance-glossary/protect-cui-with-nist-800-171-compliance/">NIST 800-171</a> alignment actually delivers for Canadian defense suppliers.</p><p>The U.S. <a href="https://dodcio.defense.gov/CMMC/">CMMC program</a> has been in development since 2019. Over six years, the NIST SP 800-171 control set has been assessed, challenged, refined, and implemented across tens of thousands of defense contractors. Readiness surveys have been published. Assessment methodologies have been tested. A $3.77 billion compliance services market has emerged, according to industry projections.</p><p>Every one of those resources is now directly applicable to Canadian suppliers preparing for CPCSC. The gap analysis tools. The readiness checklists. The compliance platforms. The assessor expertise. Canada&#8217;s defense suppliers inherit a decade of NIST control maturation without spending a single year reinventing it.</p><p>And the suppliers who already hold <a href="https://www.kiteworks.com/cmmc-compliance/cmmc-certification-vs-cmmc-compliance/">CMMC certification</a> &#8212; or are pursuing it &#8212; are substantially ready for CPCSC Level 2 on day one. One control implementation serves both frameworks. That&#8217;s not lazy regulation. That&#8217;s strategic efficiency.</p><h3><strong>What Canada Actually Changed &#8212; and Why It Matters</strong></h3><p>The changes are terminological, jurisdictional, and <a href="https://www.kiteworks.com/risk-compliance-glossary/data-sovereignty-protecting-our-digital-footprint-in-the-age-of-information/">data sovereignty</a> driven. None of them are accidental.</p><p><strong>&#8220;Specified information&#8221; replaces &#8220;controlled unclassified information.&#8221;</strong> The Canadian term maps to the Government of Canada&#8217;s existing security categorization framework under the <a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=32611">Treasury Board Secretariat&#8217;s Directive on Security Management</a>. It ensures CPCSC integrates with Canadian classification practices &#8212; including Protected A and Protected B information &#8212; rather than importing American ones.</p><p><strong>ITSP.10.033 replaces NIST SP 800-53 Rev. 5 as the parent control catalogue.</strong> Same controls, Canadian governance context. This matters because it embeds CPCSC within Canada&#8217;s existing IT security policy architecture &#8212; not as a foreign import but as a Canadian standard with allied-nation compatibility.</p><p><strong>Organization-defined parameters preserve Canadian flexibility.</strong> ITSP.10.171&#8217;s controls include parameters that Canadian organizations and Government of Canada departments can set based on their own risk context &#8212; not predetermined by U.S. federal agencies.</p><p>The <a href="https://www.kiteworks.com/sites/default/files/resources/kiteworks-report-2026-data-security-compliance-risk-forecast.pdf">Kiteworks 2026 Data Security and Compliance Risk Forecast &#8212; Canada</a> found that 40% of Canadian respondents identify changes to Canada&#8211;U.S. data sharing as their top regulatory concern, 21% flag the <a href="https://www.kiteworks.com/risk-compliance-glossary/us-cloud-act/">U.S. CLOUD Act</a> directly, and 23% are actively migrating away from U.S. cloud providers. The sovereignty provisions in CPCSC &#8212; the insistence on Canadian-specific terminology, governing authorities, and privacy frameworks &#8212; aren&#8217;t cosmetic. They&#8217;re jurisdictional guardrails that allow Canadian suppliers to certify under a Canadian standard that happens to be interoperable with the American one.</p><h3><strong>The Readiness Shortcut No One&#8217;s Talking About</strong></h3><p>The most underappreciated consequence of the NIST alignment is the readiness data.</p><p>A <a href="https://www.kiteworks.com/cmmc-preparedness-dib-report/">Kiteworks/Coalfire survey of 209 DIB organisations</a> found that only 46% consider themselves prepared for <a href="https://www.kiteworks.com/risk-compliance-glossary/understanding-cmmc-2-0-levels-a-comprehensive-guide-for-dod-contractors/">CMMC Level 2</a>, 57% have not completed a NIST 800-171 gap analysis, and organisations that <em>did</em> complete a gap analysis were dramatically more mature: 77% with documented encryption standards versus 42% without, 73% with fully documented cybersecurity policies versus 28%, and 71% with detailed <a href="https://www.kiteworks.com/risk-compliance-glossary/plan-of-action-and-milestones/">plans of action and milestones</a> versus 33%. A separate <a href="https://www.kiteworks.com/sites/default/files/resources/kiteworks-report-over-half-dod-cmmc-suppliers-fail-governance.pdf">Kiteworks governance study</a> of 104 CMMC-pursuing organizations found that 62% lack adequate governance controls. <a href="https://cybersheath.com/resources/downloads/from-readiness-to-reality-the-2025-state-of-the-defense-industrial-base-on-cmmc-compliance/">CyberSheath</a> found that only 1% feel fully audit ready.</p><p>Canadian suppliers don&#8217;t need to guess what the readiness landscape looks like. The U.S. has already mapped it &#8212; with tens of thousands of data points, across hundreds of organisations, over multiple years. The patterns are documented: Governance fails more than technology, gap analysis completion predicts certification success, and audit evidence is where assessments are won or lost.</p><p>No Canadian-specific standard could have produced that readiness intelligence on launch day. NIST alignment gave it to Canada for free.</p><h3><strong>The One Thing Canada Should Do Next</strong></h3><p>Mutual recognition. The <a href="https://www.ccc.ca/en/announcements/government-of-canada-program-for-cyber-security-certification/">Canadian Commercial Corporation</a> has stated that the CPCSC&#8217;s goal is to &#8220;streamline and facilitate certification under a single regime, enabling Canadian suppliers to do business in Canada and the U.S.&#8221;</p><p>The technical foundation is there. The control sets are equivalent. The assessment logic is parallel. The remaining gap is political: Formal mutual recognition between CPCSC and CMMC so that a supplier certified under one program doesn&#8217;t need to undergo a redundant assessment for the other.</p><p>Until that happens, dual certification remains the practical reality for cross-border suppliers. But the architecture of ITSP.10.171 makes that possible from a single deployment &#8212; which is exactly what makes adapting America&#8217;s homework the smartest move Canada could have made.</p><p>The best thing about ITSP.10.171 is that Canada didn&#8217;t try to be original. It tried to be interoperable. In defense cyber security, that&#8217;s worth more than novelty will ever be.</p>]]></content:encoded></item><item><title><![CDATA[Your Article 32 Documentation Is About to Embarrass You]]></title><description><![CDATA[GDPR was written for humans clicking buttons. Your AI agents don't click buttons.]]></description><link>https://kiteworks.substack.com/p/your-article-32-documentation-is</link><guid isPermaLink="false">https://kiteworks.substack.com/p/your-article-32-documentation-is</guid><dc:creator><![CDATA[Marc ten Eikelder]]></dc:creator><pubDate>Mon, 27 Apr 2026 15:07:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!kaZ-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30ef1dc-ae96-48d1-ace7-49e34412025b_450x300.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kaZ-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30ef1dc-ae96-48d1-ace7-49e34412025b_450x300.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kaZ-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30ef1dc-ae96-48d1-ace7-49e34412025b_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kaZ-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30ef1dc-ae96-48d1-ace7-49e34412025b_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kaZ-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30ef1dc-ae96-48d1-ace7-49e34412025b_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kaZ-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30ef1dc-ae96-48d1-ace7-49e34412025b_450x300.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kaZ-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30ef1dc-ae96-48d1-ace7-49e34412025b_450x300.jpeg" width="450" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c30ef1dc-ae96-48d1-ace7-49e34412025b_450x300.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:450,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:57898,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://kiteworks.substack.com/i/195377765?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30ef1dc-ae96-48d1-ace7-49e34412025b_450x300.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kaZ-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30ef1dc-ae96-48d1-ace7-49e34412025b_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kaZ-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30ef1dc-ae96-48d1-ace7-49e34412025b_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kaZ-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30ef1dc-ae96-48d1-ace7-49e34412025b_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kaZ-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30ef1dc-ae96-48d1-ace7-49e34412025b_450x300.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I spent a lot of time in the last six months reading Technisch-organisatorische Ma&#223;nahmen &#8212; the TOM documentation German organizations keep to demonstrate <a href="https://www.kiteworks.com/risk-compliance-glossary/gdpr/">GDPR</a> Article 32 compliance. Most of it was written between 2018 and 2022. Most of it is meticulous. Most of it is about to fail its next audit.</p><p>Here&#8217;s why: Article 32 was drafted assuming the thing accessing personal data was a human, a service account, or an application with a bounded purpose. That assumption broke about eighteen months ago, when every enterprise software vendor started bolting autonomous AI agents onto their platforms. Your TOM documentation probably still reads as if the agent problem doesn&#8217;t exist.</p><p><a href="https://www.kiteworks.com/sites/default/files/resources/kiteworks-report-2026-data-security-compliance-risk-forecast.pdf">Kiteworks Data Security and Compliance Risk: 2026 Forecast Report</a> found that 60% of German organizations cite unauthorized onward sharing of data as a top compliance concern &#8212; nearly double the global average of 31%. That number exists because <a href="https://www.kiteworks.com/risk-compliance-glossary/gdpr/">GDPR</a> enforcement has made <a href="https://gdpr-info.eu/art-82-gdpr/">Article 82 liability</a> concrete. You&#8217;re responsible for what downstream actors do with the data you handed them.</p><p>What happens when the downstream actor is a model that can be prompt-injected into doing things no contract ever contemplated?</p><h3><strong>The Article 32 Control Set Was Written for a Pre-Agent World</strong></h3><p>Go read <a href="https://gdpr-info.eu/art-32-gdpr/">Article 32</a> with fresh eyes. It calls for pseudonymization, <a href="https://www.kiteworks.com/secure-file-sharing/public-vs-private-key-encryption/">encryption</a>, the ability to restore access after an incident, and processes for regularly testing the effectiveness of technical and organizational measures. Nothing in that text is wrong. Everything in that text assumes the actors accessing personal data behave in bounded, predictable ways.</p><p>An AI agent does not behave in bounded, predictable ways. An agent with a broad API token and a prompt that says &#8220;help me analyze this quarter&#8217;s HR data&#8221; can end up invoking tools its designers never anticipated, pulling documents its role was never scoped for, and exfiltrating data through channels your <a href="https://www.kiteworks.com/risk-compliance-glossary/what-is-security-information-and-event-management/">SIEM</a> doesn&#8217;t classify as anomalous. None of that looks like a breach in the traditional sense. All of it is a breach in the Article 32 sense.</p><p>The European research picture is unambiguous. A study of 36 real-world LLM-integrated applications found <a href="https://arxiv.org/abs/2306.05499">31 &#8212; 86.1% &#8212; susceptible to prompt injection</a>. A 2026 paper at the IEEE Symposium on Security and Privacy analyzed 17 third-party chatbot plugins used across more than 10,000 public websites and found 15 enable indirect prompt injection. The <a href="https://www.crowdstrike.com/global-threat-report/">CrowdStrike 2026 Global Threat Report</a> documents an 89% year-over-year increase in AI-enabled adversary attacks, with 82% of detections now malware-free.</p><p>Translated into regulator language: the model is not a security control. Safety training is not <a href="https://www.kiteworks.com/secure-file-sharing/secure-file-sharing-with-access-control/">access control</a>. Alignment is not authentication. Your TOM needs to say something about what happens when the guardrails fail &#8212; because they will.</p><h3><strong>Four Regulatory Regimes Are Converging on the Same Answer</strong></h3><p>Germany in 2026 is navigating four concurrent regulatory regimes that each impose distinct technical requirements on the same underlying AI-mediated data flows. <a href="https://www.kiteworks.com/risk-compliance-glossary/gdpr/">GDPR</a> Article 32. The <a href="https://www.kiteworks.com/risk-compliance-glossary/nis-2-directive/">NIS 2 Directive</a>, transposed through the <a href="https://www.bsi.bund.de/DE/Themen/Regulierte-Wirtschaft/NIS-2-Regulierung/nis-2-regulierung_node.html">NIS-2-Umsetzungsgesetz</a>, with its personal liability for management bodies. The <a href="https://artificialintelligenceact.eu/">EU AI Act</a>, whose high-risk provisions become fully enforceable in August 2026. <a href="https://www.eiopa.europa.eu/digital-operational-resilience-act-dora_en">DORA</a>, in force for financial institutions since January 2025.</p><p>No single control set satisfies all four regimes in isolation. But they converge on the same underlying architectural question: can you demonstrate, in real time and with tamper-evident evidence, where regulated data is, who accessed it, under what policy, and by what identity &#8212; human or machine?</p><p>Most organizations I talk to can answer that question for their human users. Almost none can answer it for their AI agents.</p><h3><strong>The Fix Isn&#8217;t a Guardrail &#8212; It&#8217;s a Control Plane</strong></h3><p>This is the part most AI governance programs get wrong. They treat the model as the security boundary. Content filters. System prompts. Safety fine-tuning. Red teaming the model. All useful. None of it a substitute for the architectural shift that Article 32 now demands.</p><p>What works is a control plane at the data layer itself &#8212; where every request, regardless of who or what issued it, passes through a consistent set of checkpoints before any data moves. Authenticated identity via OAuth 2.0, linked to the human authorizer who delegated the workflow. Real-time <a href="https://www.kiteworks.com/risk-compliance-glossary/attribute-based-access-control/">attribute-based access control</a> against agent identity, <a href="https://www.kiteworks.com/secure-file-transfer/data-classification-what-it-is-types-and-best-practices/">data classification</a>, and request context. <a href="https://www.kiteworks.com/risk-compliance-glossary/fips/">FIPS</a>-validated <a href="https://www.kiteworks.com/secure-file-sharing/public-vs-private-key-encryption/">encryption</a> with in-jurisdiction key custody. Tamper-evident audit streaming to the <a href="https://www.kiteworks.com/risk-compliance-glossary/what-is-security-information-and-event-management/">SIEM</a> with no throttling and no 72-hour delays.</p><p>This is the architectural pattern data-layer governance platforms like <a href="https://www.kiteworks.com/">Kiteworks</a> are built around, and it&#8217;s the pattern <a href="https://www.enisa.europa.eu/publications/implementation-guidance-on-nis-2-security-measures">ENISA&#8217;s NIS 2 implementation guidance</a> increasingly demands as evidence. An agent compromised by prompt injection cannot exfiltrate data it was never authorized to reach. A regulator asking what happened gets a report, not a forensic excavation.</p><h3><strong>What to Do This Month</strong></h3><p><strong>Audit your agent identities.</strong> Every AI agent, RAG pipeline, and automated workflow touching regulated data should authenticate via OAuth 2.0 with scoped refresh tokens bound to an identified human. If you can&#8217;t name the human behind an agent session, you don&#8217;t have Article 32 &#8220;authorized personnel&#8221; coverage.</p><p><strong>Move authorization from <a href="https://www.kiteworks.com/risk-compliance-glossary/role-based-access-control/">RBAC</a> to <a href="https://www.kiteworks.com/risk-compliance-glossary/attribute-based-access-control/">ABAC</a>.</strong> Roles decide whether a principal can read a folder. Attributes &#8212; agent identity, sensitivity label, context, declared purpose &#8212; decide whether this particular actor can read this document right now. <a href="https://www.kiteworks.com/sites/default/files/resources/kiteworks-report-2026-data-security-compliance-risk-forecast.pdf">Kiteworks Data Security and Compliance Risk: 2026 Forecast Report</a> found that only 43% of organizations have a centralized <a href="https://www.kiteworks.com/platform/compliance/compliant-ai/">AI data gateway</a>. That&#8217;s the gap.</p><p><strong>Test containment, not just logging.</strong> The same report also found 60% of organizations can&#8217;t terminate a misbehaving agent, 63% can&#8217;t enforce purpose limitations, and 55% can&#8217;t prevent lateral movement. Monitoring without the ability to act is what auditors call &#8220;governance theater.&#8221;</p><p><strong>Update your TOMs before a regulator does it for you.</strong> The next major European AI enforcement action will specify, with uncomfortable clarity, what an AI-era Article 32 control set was supposed to look like. Being the case study is expensive.</p><p>Your 2022 TOM documentation was appropriate in 2022. It is not appropriate now. The sooner you accept that, the cheaper the fix gets.</p>]]></content:encoded></item><item><title><![CDATA[The 73-Day Blind Spot in Canada’s Defence Supply Chain]]></title><description><![CDATA[CPCSC certifies the node. It doesn&#8217;t certify the chain. That&#8217;s a problem.]]></description><link>https://kiteworks.substack.com/p/the-73-day-blind-spot-in-canadas</link><guid isPermaLink="false">https://kiteworks.substack.com/p/the-73-day-blind-spot-in-canadas</guid><dc:creator><![CDATA[Danielle Barbour]]></dc:creator><pubDate>Fri, 24 Apr 2026 21:05:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UVCx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799e3f61-5141-472f-b741-24a54847b7d6_450x300.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UVCx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799e3f61-5141-472f-b741-24a54847b7d6_450x300.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UVCx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799e3f61-5141-472f-b741-24a54847b7d6_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UVCx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799e3f61-5141-472f-b741-24a54847b7d6_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UVCx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799e3f61-5141-472f-b741-24a54847b7d6_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UVCx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799e3f61-5141-472f-b741-24a54847b7d6_450x300.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UVCx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799e3f61-5141-472f-b741-24a54847b7d6_450x300.jpeg" width="450" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/799e3f61-5141-472f-b741-24a54847b7d6_450x300.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:450,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:81885,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://kiteworks.substack.com/i/195360072?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799e3f61-5141-472f-b741-24a54847b7d6_450x300.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UVCx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799e3f61-5141-472f-b741-24a54847b7d6_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UVCx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799e3f61-5141-472f-b741-24a54847b7d6_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UVCx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799e3f61-5141-472f-b741-24a54847b7d6_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UVCx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799e3f61-5141-472f-b741-24a54847b7d6_450x300.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Canada is rolling out the <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada.html">Canadian Program for Cyber Security Certification</a> &#8212; the most significant mandatory cyber security framework it has ever imposed on its defence industrial base. Level 1 self-assessment against 13 foundational controls becomes a contract requirement in select defence contracts beginning Summer 2026. Level 2 &#8212; 98 controls, triannual third-party assessment by accredited certification bodies, plus annual affirmation &#8212; is under development and will be introduced in a phased approach. Level 3 adds 200 controls assessed triannually by the Government of Canada.</p><p>It is a necessary framework. It will raise the floor for every defence supplier in Canada. And it has a blind spot the size of the entire supply chain.</p><p>The <a href="https://blackkite.com/reports/third-party-breach-report-2026">2026 Black Kite Third-Party Breach Report</a> documented 136 verified third-party breach events in a single year. Those 136 events affected 719 named victims and an estimated 26,000 unnamed companies downstream. The median time from breach to public disclosure: 73 days.</p><p>Think about that number. Seventy-three days of an active breach cascading through supplier networks before anyone outside the breached organization knows it happened.</p><h3><strong>CPCSC Certifies the Supplier. Not the Supplier&#8217;s Supplier.</strong></h3><p>CPCSC&#8217;s underlying standard, <a href="https://www.cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171">ITSP.10.171</a>, does include a supply chain risk management family &#8212; Section 03.17. It requires a supply chain risk management plan, acquisition strategies, and processes for identifying weaknesses.</p><p>Here&#8217;s what it doesn&#8217;t do: It doesn&#8217;t require the subcontractor to be CPCSC-certified before they handle specified information.</p><p>A prime contractor achieves Level 2. They pass the third-party assessment. They win the contract. Then they share specified information with a subcontractor whose cyber security posture has never been assessed by anyone. That subcontractor uses a U.S.-headquartered multi-tenant cloud service with throttled <a href="https://www.kiteworks.com/regulatory-compliance/audit-log/">audit logs</a> and no Canadian deployment option.</p><p>The prime contractor is certified. The supply chain is not.</p><h3><strong>The Breakout Window Is Shrinking. The Disclosure Window Isn&#8217;t.</strong></h3><p>The supply chain gap isn&#8217;t just theoretical. The <a href="https://www.crowdstrike.com/en-us/global-threat-report/">2026 CrowdStrike Global Threat Report</a> found that average eCrime breakout time &#8212; the time from initial access to lateral movement &#8212; has dropped to 29 minutes. Adversaries are inside and moving before most detection systems generate an alert. Eighty-two percent of detections are now <a href="https://www.kiteworks.com/risk-compliance-glossary/malware-based-attacks/">malware</a>-free, meaning attackers increasingly rely on identity abuse and legitimate tools rather than traditional malware &#8212; exactly the kind of activity that blends into trusted supplier traffic.</p><p>Now pair that with the 73-day disclosure lag. An attacker compromises a subcontractor in under 30 minutes. The subcontractor doesn&#8217;t disclose for 73 days. During those 73 days, specified information flows between the certified prime and the compromised sub through channels both parties treat as trusted.</p><p>This isn&#8217;t a niche scenario. Black Kite&#8217;s data showed that software vendors and technology service providers accounted for a disproportionate share of third-party breach events &#8212; exactly the types of suppliers that defense primes rely on for IT infrastructure, cloud hosting, and managed services. The attackers aren&#8217;t targeting the prime&#8217;s perimeter. They&#8217;re targeting the weakest node in the chain and waiting for the data to flow to them.</p><p>The prime&#8217;s CPCSC certification says nothing about this scenario. The controls were assessed against the prime&#8217;s systems, the prime&#8217;s policies, the prime&#8217;s architecture. The subcontractor was outside the assessment boundary.</p><h3><strong>What ITSP.10.171 Actually Requires &#8212; and Where It Stops</strong></h3><p>I want to be fair to the framework. ITSP.10.171 control 03.17.03 requires organizations to establish processes for identifying and addressing weaknesses in supply chain elements. Control 03.16.03 requires defining security requirements for external system service providers.</p><p>These are important controls. But they&#8217;re governance controls &#8212; they require plans and processes, not architectural enforcement. A <a href="https://www.kiteworks.com/cmmc-preparedness-dib-report/">Kiteworks and Coalfire study</a> of organizations pursuing the equivalent U.S. CMMC certification found that 62% lack adequate governance controls. These are exactly the type of controls that fall through the cracks.</p><p>The organizations that get this right will treat supply chain security as an architecture decision, not a documentation exercise. That means enforcing the same <a href="https://www.kiteworks.com/secure-file-sharing/secure-file-sharing-with-access-control/">access controls</a>, the same <a href="https://www.kiteworks.com/regulatory-compliance/audit-log/">audit logging</a>, and the same <a href="https://www.kiteworks.com/secure-file-sharing/public-vs-private-key-encryption/">encryption</a> on every exchange with every partner &#8212; regardless of that partner&#8217;s certification status. Platforms designed for governed data exchange, like <a href="https://www.kiteworks.com/">Kiteworks</a>, serve as a control plane for secure data exchange &#8212; one policy engine, one audit log, one security architecture across every channel through which specified information moves. The policy applies to the partner whether the partner has its own certification.</p><h3><strong>What to Do Before the Assessor Asks About Your Supply Chain</strong></h3><p><strong>Map your specified information flows end to end.</strong> Not just within your systems &#8212; through every partner, subcontractor, and service provider who touches it. If you can&#8217;t draw that map, you can&#8217;t govern it.</p><p><strong>Enforce controls at the exchange boundary.</strong> Don&#8217;t trust the subcontractor&#8217;s security posture. Enforce your controls on the data you share with them &#8212; encryption, access restrictions, audit logging &#8212; before it leaves your environment.</p><p><strong>Shorten your disclosure blind spot.</strong> If you&#8217;re relying on partners to notify you of breaches, you&#8217;re accepting a 73-day detection gap. Continuous monitoring of data exchange patterns &#8212; who&#8217;s accessing what, when, from where &#8212; catches anomalies your partners won&#8217;t report.</p><p>CPCSC is a necessary foundation. It raises the floor for every defense supplier in Canada. But certification creates confidence in the certified entity. It says nothing about the entities they trust with the same data.</p><p>The next breach won&#8217;t respect the assessment boundary. It never does.</p>]]></content:encoded></item><item><title><![CDATA[Data-Layer Security: Why Traditional Vulnerability Management Just Died]]></title><description><![CDATA[The twenty-year wager that defenders can patch faster than attackers can weaponize vulnerabilities has been lost.]]></description><link>https://kiteworks.substack.com/p/data-layer-security-why-traditional</link><guid isPermaLink="false">https://kiteworks.substack.com/p/data-layer-security-why-traditional</guid><dc:creator><![CDATA[Patrick Spencer]]></dc:creator><pubDate>Fri, 24 Apr 2026 15:11:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!H9Ln!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce0997b3-7a2c-42ba-89f6-a53043b7ba4b_1472x832.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img style="" src="https://substackcdn.com/image/fetch/$s_!H9Ln!,w_1100,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce0997b3-7a2c-42ba-89f6-a53043b7ba4b_1472x832.jpeg" alt="Cover Image" data-component-name="ImageToDOM"></p><p>The twenty-year wager that defenders can patch faster than attackers can weaponize vulnerabilities has been lost. In April 2026, NIST formally conceded it can no longer enrich the majority of vulnerabilities flowing into the National Vulnerability Database, with CVE submissions growing 263% between 2020 and 2025. The defender's triage system is narrowing by design while AI-driven discovery systems industrialize attack capabilities.</p><h2>Why Traditional CVE Management Is Broken</h2><p>The National Vulnerability Database's retreat isn't just bureaucratic housekeeping&#8212;it's an admission that the foundational intelligence system for enterprise security has collapsed under its own weight. When NIST flags vulnerabilities as "not scheduled," vulnerability scanners receive no signal for prioritization. Meanwhile, <a href="https://www.kiteworks.com/cybersecurity-risk-management/data-layer-security-nvd-mythos/">data-layer security approaches</a> demonstrate that protection must move below the application layer to remain effective.</p><p>The quality problem compounds the quantity crisis. Research shows that 15% of CISA and NVD CVEs had incorrect CVSS scores in 2025, with 64% of corrections adjusting severity upward because vendors understated risk. Twenty-five percent of public advisories contained no patch or mitigation guidance whatsoever.</p><p>For organizations operating under SEC cyber disclosure obligations, CMMC requirements, or HIPAA's risk analysis mandates, this creates a documentation nightmare: How do you demonstrate risk-based prioritization when the risk signal itself is incomplete?</p><h2>AI Changes Everything About Vulnerability Discovery</h2><p>The Cloud Security Alliance's briefing on Anthropic's Claude Mythos Preview&#8212;signed by former CISA Director Jen Easterly, Bruce Schneier, and other senior security leaders&#8212;warns that AI has collapsed "the window between discovery and weaponization to hours." Independent verification by the U.K.'s AI Security Institute confirmed Mythos completed a 32-step corporate network attack simulation that previously required 20 hours of skilled human work.</p><p>This isn't theoretical. Zero-day exploits grew 42% year-over-year, while AI-enabled adversary attacks increased 89%. The average eCrime breakout time after initial access is now 29 minutes. When autonomous systems can discover and weaponize vulnerabilities faster than human defenders can even catalog them, the entire premise of patch-based security crumbles.</p><h2>What Data-Layer Security Actually Means</h2><p>Data-layer security protects information through embedded controls that work regardless of which CVE an attacker exploits or which vulnerability was never scored. Instead of defending the perimeter, organizations protect the asset itself through five core mechanisms:</p><p><strong>Attribute-Based <a href="https://www.kiteworks.com/secure-file-sharing/secure-file-sharing-with-access-control/">Access Controls</a> at Content Level</strong>: Policies travel with the data based on user attributes, data sensitivity, time, purpose, and context. A file restricted to authorized staff within specific geography and time windows carries that policy whether it sits in a file share, email attachment, or AI query context.</p><p><strong>FIPS 140-3 <a href="https://www.kiteworks.com/secure-file-sharing/public-vs-private-key-encryption/">Encryption</a> with Customer-Managed Keys</strong>: Sensitive data remains encrypted at rest and in transit with cryptographic modules validated to federal standards. Customer-managed keys backed by hardware security modules ensure the organization&#8212;not cloud providers or AI models&#8212;controls access.</p><p><strong>Tamper-Evident <a href="https://www.kiteworks.com/regulatory-compliance/audit-log/">Audit Logging</a></strong>: Every interaction with sensitive data generates normalized log entries delivered to SIEM in real time. When breaches occur, forensic reconstruction doesn't require knowing which specific CVE was exploited&#8212;the data trail is complete.</p><p><strong>Zero-Trust Access for All Entities</strong>: Every request is authenticated, authorized, purpose-limited, time-bound, and logged&#8212;whether from human users, service accounts, or AI agents. Prompt-injected AI agents cannot exfiltrate data they were never authorized to access.</p><p><strong>Hardened Architecture</strong>: Platforms delivered as hardened virtual appliances with embedded firewall, WAF, and intrusion detection. Single-tenant isolation prevents cross-tenant failure modes that devastate multi-tenant cloud services.</p><h2>Implementation: Moving Beyond Patch Theater</h2><p>The shift to data-layer security requires abandoning the illusion that faster patching solves structural problems. Organizations must accept that application-layer security, while necessary, is no longer sufficient as primary defense.</p><p>Start with comprehensive data discovery and <a href="https://www.kiteworks.com/secure-file-transfer/data-classification-what-it-is-types-and-best-practices/">classification</a>. You cannot protect what you cannot find. Deploy attribute-based access controls that travel with data across organizational boundaries, AI workflows, and third-party ecosystems.</p><p>Implement <a href="https://www.kiteworks.com/cybersecurity-risk-management/ai-data-governance-guide/">AI governance frameworks</a> with the same rigor applied to human access. Every AI interaction with sensitive data must be authenticated, authorized, logged, and auditable at the data layer, not the model layer.</p><p>Stop designing around CVE enrichment as reliable signal. Layer threat-informed prioritization&#8212;CISA KEV, exploit prediction scoring, vendor advisories&#8212;on top of data-layer controls that reduce blast radius when prioritization fails.</p><h2>Avoiding the Dishonest Defense</h2><p>Many security programs will default to predictable responses: more scanners, tighter patch windows, additional dashboards. This treats the problem as execution failure when it's actually structural collapse.</p><p>The average time to remediate critical vulnerabilities remains 74 days&#8212;a window that was unsustainable when time-to-exploit was measured in weeks, let alone hours. Data-layer security operates underneath patching, protecting assets when patches arrive late or never.</p><p>Regulatory pressure sharpens urgency. SEC cyber disclosure rules, HHS enforcement of HIPAA Security Rule, and FTC Safeguards Rule hold organizations accountable for "reasonable" technical safeguards. Pointing at incomplete NVD records isn't a defense for inadequate controls.</p><h2>The Window Is Closing</h2><p>Organizations that move now will remain defensible in 2027. The window to rebuild operating models is narrow, and regulatory pressure will intensify as disclosure waves from AI-driven discovery tools crest.</p><p>Data-layer governance isn't a feature set&#8212;it's a design posture that remains effective precisely because it doesn't depend on perfect visibility into threats above it. When application-layer controls fail, data-layer protections ensure breaches of applications become breaches of containers, not contents.</p><p>The honest defense begins with accepting that if you cannot assume knowledge of every exploitable vulnerability before weaponization, enterprise security must mean something fundamentally different. Defense has moved down a layer. The asset itself must carry its own protection.</p><h2>Resources</h2><p>&#8226; <a href="https://www.kiteworks.com/platform/compliance/compliant-ai/">Kiteworks Compliant AI Platform</a></p><p>&#8226; <a href="https://www.kiteworks.com/platform/security/hardened-virtual-appliance/">Hardened Virtual Appliance Security</a></p><p>&#8226; <a href="https://www.kiteworks.com/platform/compliance/fips-compliance/">FIPS 140-3 Compliance Solutions</a></p><p>&#8226; <a href="https://www.kiteworks.com/platform/digital-rights-management-drm/">Digital Rights Management (DRM)</a></p><p>&#8226; <a href="https://www.kiteworks.com/platform/security/zero-trust-architecture-security-functions/">Zero-Trust Architecture Functions</a></p>]]></content:encoded></item><item><title><![CDATA[Data Minimization Is the New Compliance Baseline: How H.R. 8014 Changes Everything]]></title><description><![CDATA[The compliance question is about to shift from "Did we disclose this processing?" to "Is this processing necessary for the product or service the user requested?" Representative Zoe Lofgren's H.R.]]></description><link>https://kiteworks.substack.com/p/data-minimization-is-the-new-compliance</link><guid isPermaLink="false">https://kiteworks.substack.com/p/data-minimization-is-the-new-compliance</guid><dc:creator><![CDATA[Patrick Spencer]]></dc:creator><pubDate>Thu, 23 Apr 2026 22:31:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!7OyG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d27c8c9-ec79-4919-9c10-06826d5aa0d5_1472x832.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img style="" src="https://substackcdn.com/image/fetch/$s_!7OyG!,w_1100,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d27c8c9-ec79-4919-9c10-06826d5aa0d5_1472x832.jpeg" alt="Cover Image" data-component-name="ImageToDOM"></p><p>The compliance question is about to shift from "Did we disclose this processing?" to "Is this processing necessary for the product or service the user requested?" Representative Zoe Lofgren's <a href="https://www.kiteworks.com/regulatory-compliance/online-privacy-act-2026-hr-8014/">H.R. 8014, the Online Privacy Act of 2026</a> spans 151 pages across six titles and represents the most comprehensive federal privacy proposal to reach the House this decade. While passage remains uncertain with only one sponsor, the bill maps exactly where state privacy laws are already heading.</p><h2>Why Data Minimization Matters More Than Passage Prospects</h2><p>The 2026 Thales Data Threat Report found that only 34% of organizations have complete knowledge of where their data is located. That statistic becomes terrifying when you realize that knowing data location is prerequisite to evaluating whether collection and processing are actually necessary under a minimization regime.</p><p>H.R. 8014's Section 201 would prohibit collecting more personal information than reasonably needed to provide a requested product or service. This structural departure from the notice-and-choice paradigm means customer behavioral analytics, marketing personalization, product development telemetry, and AI training datasets all require articulated necessity justifications. Many will not withstand scrutiny.</p><p>The enforcement mechanism makes this shift urgent. Unlike administrative penalties that organizations can budget for, H.R. 8014 includes a private right of action. Organizations that cannot operationally honor user-directed retention timelines will face private rights of action at scale.</p><h2>What Good Data Governance Looks Like Under H.R. 8014</h2><p>Effective compliance requires data-layer controls that survive copying, transformation, analysis, and AI training. Policy-layer compliance that relies on well-documented intentions fails when data moves between systems. Application-layer compliance creates gaps at integration points.</p><p>The bill's "right to impermanence" exemplifies this architectural requirement. Users can determine how long companies retain their data, enforceable through private action. Data pipelines that aggregate, transform, or replicate personal data need deletion signal propagation downstream and deletion confirmation at each stage. Analytics systems must handle selective deletion requests without corrupting aggregate statistics.</p><p>Employee and contractor access restrictions under Section 202 amplify operational changes. Organizations must limit internal access to personal information based on employee function necessity. This pushes back against common enterprise patterns of granting broad data access to analytics, engineering, and product teams while relying on policy rather than technical controls.</p><p>Comprehensive <a href="https://www.kiteworks.com/regulatory-compliance/audit-log/">audit logs</a> with tamper-evident records become the evidentiary foundation for both Digital Privacy Agency investigations and private right of action defense. The difference between a warning and a penalty frequently depends on evidence quality an organization can produce.</p><h2>Implementation Path: Five Critical Steps</h2><p>First, treat the state privacy law patchwork as your operational baseline. Organizations serving U.S. consumers at scale already face substantially similar obligations through Maryland's Online Data Privacy Act, Connecticut's amendments, Colorado's AI Act, and California's ADMT regulations. Building compliance infrastructure for this multi-state environment functionally prepares for H.R. 8014.</p><p>Second, build data inventories that can defend minimization. The evidentiary question becomes "Can you demonstrate each dataset collection is necessary for a user-requested product or service?" Organizations unable to produce that demonstration face expensive retrofit costs when standards tighten. <a href="https://www.kiteworks.com/secure-file-transfer/data-classification-what-it-is-types-and-best-practices/">Data classification</a> becomes essential for mapping collection purposes to operational necessity.</p><p>Third, implement retention governance at the data layer. User-directed retention requires deletion propagation across pipelines, deletion confirmation across systems, and deletion evidence for audit. <a href="https://www.kiteworks.com/secure-file-sharing/secure-file-sharing-with-access-control/">Access controls</a> must enforce function-based necessity rather than broad team permissions.</p><p>Fourth, extend data governance to AI systems. Whether obligations come from Colorado's AI Act in 2026, California's ADMT regulations in 2027, or H.R. 8014 eventually, <a href="https://www.kiteworks.com/cybersecurity-risk-management/ai-data-governance-guide/">AI governance</a> is becoming a data governance obligation. Model training must satisfy minimization requirements, automated decisions need human review pathways, and training data must honor retention and deletion rights.</p><p>Fifth, consolidate data exchange under unified governance. Organizations running multiple separate tools for secure data exchange face systematically higher compliance risk. <a href="https://www.kiteworks.com/managed-file-transfer/">Managed file transfer</a>, email, APIs, and AI integrations need consistent policy enforcement across channels.</p><h2>Pitfalls to Avoid</h2><p>The biggest mistake is waiting for legislative resolution. State privacy laws and AI-specific regulations already impose substantially similar obligations. Maryland's Online Data Privacy Act, Connecticut's amendments, Colorado's AI Act, and California's ADMT regulations create the same compliance architecture H.R. 8014 would federalize.</p><p>Another critical error is treating AI governance as separate from data governance. The bill's human review requirements for "impactful automated decisions" extend beyond high-risk categories that Colorado and the EU AI Act target. Training data must satisfy minimization requirements, model deployment must provide human review pathways, and retention rights must be honored for training data and model outputs.</p><h2>The Regulatory Direction Is Stable</h2><p>H.R. 8014 may pass, stall, or be replaced by different frameworks in 2027 or 2028. The regulatory direction remains stable across those scenarios. Organizations that treat the bill as a preview of what state patchwork approaches and eventual federal baseline will codify position themselves significantly better than those waiting for legislative resolution.</p><p>The investment case doesn't depend on H.R. 8014 passing. State privacy laws and AI-specific regulations already impose substantially similar obligations. Compliance infrastructure built for the state patchwork addresses federal legislation in whatever form ultimately emerges. Organizations whose governance lives in data-layer controls adapt to successor legislation without rebuilding.</p><h2>Resources</h2><ul><li><p><a href="https://www.kiteworks.com/platform/us-state-data-privacy-laws-and-compliance/">US State Data Privacy Laws and Compliance</a></p></li><li><p><a href="https://www.kiteworks.com/platform/compliance/compliant-ai/">Compliant AI Platform</a></p></li><li><p><a href="https://www.kiteworks.com/platform/compliance/gdpr-compliance/">GDPR Compliance</a></p></li><li><p><a href="https://www.kiteworks.com/platform/compliance/data-sovereignty/">Data Sovereignty</a></p></li><li><p><a href="https://www.kiteworks.com/platform/visibility/ciso-dashboard/">CISO Dashboard</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[The CLOUD Act Makes CPCSC Harder Than CMMC — and Nobody’s Saying It ]]></title><description><![CDATA[U.S. defence contractors don&#8217;t have a sovereignty problem. Canadian defence contractors do.]]></description><link>https://kiteworks.substack.com/p/the-cloud-act-makes-cpcsc-harder</link><guid isPermaLink="false">https://kiteworks.substack.com/p/the-cloud-act-makes-cpcsc-harder</guid><dc:creator><![CDATA[Danielle Barbour]]></dc:creator><pubDate>Thu, 23 Apr 2026 14:50:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!arUt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F157e2535-9f5d-462b-9bf9-0d1edff68bcc_450x300.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!arUt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F157e2535-9f5d-462b-9bf9-0d1edff68bcc_450x300.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!arUt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F157e2535-9f5d-462b-9bf9-0d1edff68bcc_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!arUt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F157e2535-9f5d-462b-9bf9-0d1edff68bcc_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!arUt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F157e2535-9f5d-462b-9bf9-0d1edff68bcc_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!arUt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F157e2535-9f5d-462b-9bf9-0d1edff68bcc_450x300.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!arUt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F157e2535-9f5d-462b-9bf9-0d1edff68bcc_450x300.jpeg" width="450" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/157e2535-9f5d-462b-9bf9-0d1edff68bcc_450x300.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:450,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:54461,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://kiteworks.substack.com/i/195246653?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F157e2535-9f5d-462b-9bf9-0d1edff68bcc_450x300.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!arUt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F157e2535-9f5d-462b-9bf9-0d1edff68bcc_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!arUt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F157e2535-9f5d-462b-9bf9-0d1edff68bcc_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!arUt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F157e2535-9f5d-462b-9bf9-0d1edff68bcc_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!arUt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F157e2535-9f5d-462b-9bf9-0d1edff68bcc_450x300.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In June 2025, a senior Microsoft executive <a href="https://barryappleton.substack.com/p/whose-law-governs-canadian-data-the">testified before the French Senate</a> and was asked whether he could guarantee that French government data stored in Microsoft&#8217;s cloud would not be transmitted to U.S. authorities. His answer was unequivocal: <em>&#8220;Non, je ne peux pas le garantir.&#8221;</em> No, I cannot guarantee it.</p><p>Replace &#8220;French&#8221; with &#8220;Canadian.&#8221; The answer doesn&#8217;t change.</p><p>The <a href="https://www.congress.gov/bill/115th-congress/house-bill/4943">U.S. CLOUD Act</a>, enacted in 2018, compels U.S.-headquartered technology companies to produce data in their possession, custody, or control &#8212; regardless of where that data is physically stored. A server in Montr&#233;al hosting Canadian defence data is, under U.S. law, accessible to U.S. authorities if the provider&#8217;s parent company is American.</p><p>Now consider what <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada.html">CPCSC</a> is asking Canadian defence suppliers to protect: &#8220;specified information&#8221; &#8212; any information, other than classified, that a Government of Canada authority identifies in a contract as requiring safeguarding, including Protected A and Protected B data. This is what ITSP.10.171&#8217;s 98 Level 2 controls are designed to secure. And the Government of Canada&#8217;s own <a href="https://www.canada.ca/en/government/system/digital-government/digital-government-innovations/cloud-services/digital-sovereignty/gc-white-paper-data-sovereignty-public-cloud.html">white paper on data sovereignty</a> acknowledges the problem plainly: Canada &#8220;cannot ensure full sovereignty over its data when it stores data in the cloud.&#8221;</p><p>That&#8217;s the gap. And NIST SP 800-171 &#8212; the standard CPCSC adapts &#8212; wasn&#8217;t designed to address it.</p><h3><strong>Why NIST 800-171 Doesn&#8217;t Solve This</strong></h3><p>The U.S. defence industrial base doesn&#8217;t have a CLOUD Act problem because the CLOUD Act <em>is U.S. law</em>. When a U.S. defence contractor stores controlled unclassified information on a U.S. cloud service, and the U.S. government compels access, there&#8217;s no jurisdictional conflict. The data belongs to the same sovereign that issued the subpoena.</p><p>CMMC was designed for this context. It requires robust access controls, encryption, and audit logging &#8212; but it doesn&#8217;t need to address the scenario where a foreign government compels a service provider to hand over defence data without the data owner&#8217;s knowledge. That scenario doesn&#8217;t exist for U.S. contractors storing data with U.S. providers under U.S. law.</p><p>Canada adapted that standard. And the technical controls transferred with no substantial changes &#8212; as the Canadian Centre for Cyber Security <a href="https://www.cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171">states</a>, ITSP.10.171 is aligned with ITSP.10.033 (Canada&#8217;s version of NIST SP 800-53 Rev. 5), with modifications reflecting Canada&#8217;s distinct regulatory landscape rather than the control requirements themselves. The access controls are identical. The encryption requirements are identical. The audit logging requirements are identical.</p><p>But the sovereignty context is completely different.</p><h3><strong>The Architectural Gap No Checklist Closes</strong></h3><p>A Canadian defence supplier using Microsoft 365, AWS, or Google Cloud for data exchange has technically implemented a system that meets many ITSP.10.171 requirements. The encryption works. The access controls are configured. The logs are generated.</p><p>And all of it is architecturally exposed to a U.S. government data request that the Canadian supplier may never learn about.</p><p>The <a href="https://www.kiteworks.com/sites/default/files/resources/kiteworks-report-2026-data-security-compliance-risk-forecast.pdf">Kiteworks 2026 Data Security and Compliance Risk Forecast &#8212; Canada</a> quantified how Canadian organisations feel about this. Forty percent identify changes to Canada&#8211;U.S. data sharing arrangements as their top regulatory concern &#8212; the single highest-ranked concern across the survey. Twenty-one percent flag the CLOUD Act specifically. Twenty-three percent are actively migrating away from U.S. cloud providers. And seventy-nine percent report full PIPEDA compliance &#8212; but struggle to produce the evidence to prove it.</p><p>These are not privacy advocates on the margins. These are security, compliance, and risk professionals inside Canadian organizations, telling researchers that their current cloud architecture creates a jurisdictional exposure they cannot resolve through policy.</p><p>ITSP.10.171 control 03.13.08 requires cryptographic protection for data in transit and at rest. But if the encryption key is held by a U.S.-headquartered provider, the key is subject to the same compulsion as the data. Control 03.08.02 restricts media access to authorized individuals &#8212; but &#8220;authorized&#8221; under Canadian law and &#8220;compelled&#8221; under U.S. law are different concepts operating in different legal systems.</p><p>No ITSP.10.171 control explicitly addresses the scenario where a foreign government lawfully compels a service provider to bypass the controls the standard requires.</p><h3><strong>What Sovereignty Actually Requires</strong></h3><p>I want to be precise about what &#8220;sovereignty&#8221; means in this context, because the word gets used loosely.</p><p>Data residency &#8212; storing data on servers physically located in Canada &#8212; is necessary but not sufficient. As the <a href="https://www.blg.com/en/insights/2026/04/data-sovereignty-and-the-cloud-act-what-canadian-organizations-should-know">BLG legal analysis</a> published this month states: &#8220;Data sovereignty is better understood as a question of control, which is shaped by legal jurisdiction, corporate structure, and service provider relationships.&#8221; If the provider&#8217;s corporate parent is subject to U.S. jurisdiction, Canadian data residency doesn&#8217;t prevent U.S. legal access.</p><p>Actual sovereignty for specified information requires three architectural conditions that go beyond what NIST SP 800-171 contemplates. <strong>The service provider must not be subject to foreign compulsion.</strong> Either the provider is Canadian headquartered with no meaningful U.S. presence, or the architecture must make compliance with a foreign order technically impossible. <strong>The encryption keys must be customer controlled.</strong> If the provider can decrypt the data, the provider can be compelled to decrypt the data. Customer-held keys create a cryptographic barrier that legal compulsion cannot bypass &#8212; not because the law doesn&#8217;t apply, but because the provider literally cannot comply. <strong>The deployment must enforce jurisdictional boundaries at the infrastructure level.</strong> Geofencing, IP controls, and data routing policies that prevent specified information from traversing non-Canadian infrastructure &#8212; not as a policy preference, but as a technical constraint. This is the architectural pattern that platforms like <a href="https://www.kiteworks.com/">Kiteworks</a> are built around: single-tenant deployment in Canadian infrastructure, customer-owned encryption keys, and configurable geofencing that makes cross-border data movement architecturally impossible regardless of what any foreign legal process demands.</p><h3><strong>The Certification Implication</strong></h3><p>Here&#8217;s where this gets sharp for CISOs preparing for CPCSC Level 2 assessment.</p><p>Your accredited certification body will assess your controls against ITSP.10.171. They will verify your encryption, your access controls, your audit logging. If you&#8217;ve implemented them correctly on a U.S.-headquartered cloud platform, you may well pass the technical assessment.</p><p>But you will have certified a system where the Government of Canada&#8217;s specified information is architecturally accessible to a foreign government that the Canadian government cannot control, cannot monitor, and may never be notified about.</p><p>That&#8217;s not a compliance failure today. It may be one tomorrow. Canada has been <a href="https://www.osler.com/en/insights/updates/data-sovereignty-in-light-of-the-cloud-act-back-to-the-future/">negotiating a CLOUD Act bilateral agreement</a> with the U.S. since 2022, and no agreement is in place. Quebec&#8217;s Law 25 already requires privacy impact assessments evaluating foreign jurisdictional exposure. The Government of Canada&#8217;s own data sovereignty white paper recommends contract clauses compelling providers to disclose foreign access &#8212; while acknowledging that U.S. law may prohibit exactly that disclosure.</p><p>The trend line is unmistakable. Canadian sovereignty requirements are tightening. The organisations that solve this problem architecturally now &#8212; rather than contractually later &#8212; will not need to re-architect their CPCSC-certified environment when the rules catch up to the risk.</p><p>You can implement every NIST 800-171 control perfectly and still have a sovereignty exposure that no control in the standard was designed to address. That&#8217;s not a flaw in the standard. It&#8217;s a consequence of adopting a standard designed for a country whose government is the jurisdiction in question.</p><p>Canada is not that country. And that single difference makes CPCSC harder than CMMC in ways the control mapping will never show.</p>]]></content:encoded></item><item><title><![CDATA[Amendment 13 Forces Legal DPOs to Prove Consent Compliance Through Immutable Evidence]]></title><description><![CDATA[Data protection officers in legal departments face unprecedented scrutiny over consent governance practices.]]></description><link>https://kiteworks.substack.com/p/amendment-13-forces-legal-dpos-to</link><guid isPermaLink="false">https://kiteworks.substack.com/p/amendment-13-forces-legal-dpos-to</guid><dc:creator><![CDATA[Patrick Spencer]]></dc:creator><pubDate>Wed, 22 Apr 2026 15:51:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!7Fw3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F823d9875-6ef4-43c8-9bc5-9155bf8a3492_1472x832.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img style="" src="https://substackcdn.com/image/fetch/$s_!7Fw3!,w_1100,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F823d9875-6ef4-43c8-9bc5-9155bf8a3492_1472x832.jpeg" alt="Cover Image" data-component-name="ImageToDOM"></p><p>Data protection officers in legal departments face unprecedented scrutiny over consent governance practices. <a href="https://www.kiteworks.com/gdpr-compliance/enhanced-consent-compliance-dpos-amendment-13/">Israeli Amendment 13 to the Privacy Protection Law</a> has transformed consent from a checkbox exercise into an evidence-based compliance requirement that demands verifiable proof of lawful collection, documentation, and revocation processes. Legal DPOs must now demonstrate that consent collection is specific, informed, freely given, and unambiguous&#8212;with immutable audit trails to prove it.</p><h2>Why Amendment 13 Changes Everything for Legal DPOs</h2><p>Regulators no longer accept pre-ticked boxes, bundled consent requests, or vague privacy notices. Amendment 13 elevates legal DPOs from policy authors to evidence custodians who must prove compliance through documentation that survives regulatory audits and litigation discovery.</p><p>The operational burden extends far beyond policy creation. Legal DPOs need systems that track consent granularly, preserve evidence of lawful collection, and support immediate revocation while ensuring downstream data handling systems respect updated preferences in real time. For Israeli companies serving European markets, <a href="https://www.kiteworks.com/platform/compliance/gdpr-compliance/">GDPR consent requirements</a> compound this complexity with parallel obligations that must be managed simultaneously.</p><p>This shift represents a fundamental change in how organizations approach consent governance. The checkbox era is over&#8212;evidence-based compliance is the new standard.</p><h2>Building Defensible Consent Documentation Systems</h2><p>Effective consent compliance requires comprehensive documentation that proves each element of valid consent. Legal DPOs must capture evidence that consent was specific, informed, freely given, and unambiguous through systems designed for <a href="https://www.kiteworks.com/platform/compliance/regulatory-compliance/">regulatory compliance standards</a>.</p><p>Consent documentation must demonstrate that organizations collected separate consent for distinct purposes such as marketing, analytics, profiling, or third-party sharing. When an individual consents to product recommendations but declines behavioral advertising, systems must preserve that distinction and enforce it across downstream processing.</p><p>Proving informed consent requires evidence that individuals received clear, accessible information before consenting. Documentation must include the exact text presented to individuals, evidence of how consent requests appeared to users, and proof that individuals could access detailed explanations before making decisions.</p><h3>Implementing Immutable Audit Trails</h3><p>Consent documentation loses evidentiary value if records can be altered after collection. Legal DPOs must demonstrate that consent records remain immutable, that timestamps cannot be backdated, and that organizations can detect any unauthorized modifications.</p><p>Immutable audit trails capture every consent-related event in tamper-proof logs protected by AES-256 encryption for data at rest and TLS 1.3 for data in transit. Systems must record consent collection, modification, and revocation events in append-only data stores that prevent retroactive editing. Each log entry must include timestamps, user identifiers, consent purposes, actions taken, and contextual information such as IP addresses and user agents.</p><p>These audit trails serve as evidence chains during regulatory investigations. When regulators question when consent was collected or whether revocation requests were honored, legal DPOs produce immutable logs that document exact sequences of events.</p><h2>Operationalizing Real-Time Consent Revocation</h2><p>When individuals revoke consent, organizations must stop relying on that consent for processing immediately. Legal DPOs must prove that revocation workflows execute promptly, that no continued processing occurs on withdrawn consent, and that systems delete, anonymize, or isolate data when legally required.</p><p>This requires integration between consent management platforms and data processing systems. When revocation occurs, consent platforms must send signals to analytics systems, marketing automation tools, customer data platforms, and partner interfaces. Those systems must acknowledge revocation, halt relevant processing, and confirm completion.</p><p>The operational challenge involves mapping consent purposes to processing systems. Legal DPOs must maintain inventories that document which systems rely on which consent purposes, how those systems receive revocation signals, and what actions they take when consent is withdrawn.</p><h3>Integrating Consent with Access Controls</h3><p>Consent decisions should govern data access directly. When individuals revoke consent for marketing, marketing teams should not retain access to that individual's data for marketing purposes. This requires integration between consent management platforms and identity and access management systems.</p><p>When consent is withdrawn, IAM platforms must revoke relevant permissions, update access control lists, and trigger reviews of existing access grants. <a href="https://www.kiteworks.com/platform/digital-rights-management-drm/">Digital rights management</a> systems can enforce these restrictions at the content level, ensuring that consent decisions translate into technical controls rather than relying on user compliance.</p><h2>Avoiding Common Consent Governance Pitfalls</h2><p>Organizations frequently treat consent as a standalone legal obligation rather than an integrated governance control. This approach creates regulatory risk, operational inefficiency, and audit failures. Legal DPOs must ensure that consent management integrates with broader data protection infrastructure.</p><p>Another critical pitfall involves inadequate preparation for regulatory audits. Legal DPOs must implement systems that produce consent records on demand, support complex queries across consent histories, and present evidence in formats that satisfy legal and regulatory requirements. <a href="https://www.kiteworks.com/platform/simple/secure-file-sharing/">Secure data sharing</a> platforms must honor consent preferences when transferring data to third parties, partners, and external recipients where consent validity faces the most scrutiny.</p><p>The most dangerous mistake is assuming that consent collected years ago remains valid indefinitely. Legal DPOs must establish review cycles that re-evaluate consent validity, determine when refresh is necessary, and implement re-consent workflows when processing purposes evolve.</p><h2>Future-Proofing Consent Governance Infrastructure</h2><p>Consent obligations will only intensify as AI-driven personalization introduces new processing vectors and organizations operate across multiple jurisdictions with diverging consent standards. Amendment 13 and frameworks like the GDPR are accelerating toward expectations of real-time consent verification&#8212;where organizations must prove not only that consent was collected correctly but that it governs data handling in the moment it is exercised.</p><p>Legal DPOs who build consent governance infrastructure today, centered on centralized evidence collection, <a href="https://www.kiteworks.com/platform/security/zero-trust-architecture-security-functions/">zero trust enforcement</a>, and integrated revocation workflows, will be positioned to meet these demands as they evolve rather than scrambling to retrofit compliance after regulatory standards have already shifted.</p><p>The transformation from checkbox compliance to evidence-based consent governance represents both a challenge and an opportunity for legal DPOs to demonstrate measurable value in reducing regulatory risk and operational complexity.</p><h2>Resources</h2><p>&#8226; <a href="https://www.kiteworks.com/platform/visibility/content-communication-visibility/">Content Communication Visibility</a></p><p>&#8226; <a href="https://www.kiteworks.com/platform/compliance/legal-hold-for-ediscovery/">Legal Hold for eDiscovery</a></p><p>&#8226; <a href="https://www.kiteworks.com/platform/visibility/ciso-dashboard/">CISO Dashboard</a></p><p>&#8226; <a href="https://www.kiteworks.com/platform/private-data-network/">Private Data Network</a></p><p>&#8226; <a href="https://www.kiteworks.com/platform/compliance/regulatory-compliance/">Regulatory Compliance Platform</a></p>]]></content:encoded></item><item><title><![CDATA[Medical Device Networks Are Zero Trust's Biggest Challenge]]></title><description><![CDATA[Healthcare organizations manage volumes of sensitive data that dwarf most other sectors, yet their security models remain dangerously outdated.]]></description><link>https://kiteworks.substack.com/p/medical-device-networks-are-zero</link><guid isPermaLink="false">https://kiteworks.substack.com/p/medical-device-networks-are-zero</guid><dc:creator><![CDATA[Patrick Spencer]]></dc:creator><pubDate>Tue, 21 Apr 2026 21:19:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!z3Xy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f657711-d27f-4778-a63e-e1f0cfd9af72_1472x832.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img style="" src="https://substackcdn.com/image/fetch/$s_!z3Xy!,w_1100,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f657711-d27f-4778-a63e-e1f0cfd9af72_1472x832.jpeg" alt="Cover Image" data-component-name="ImageToDOM"></p><p>Healthcare organizations manage volumes of sensitive data that dwarf most other sectors, yet their security models remain dangerously outdated. Traditional perimeter-based defenses collapse when <a href="https://www.kiteworks.com/hipaa-compliance/healthcare-zero-trust-security-implementation/">medical devices connect directly to clinical networks</a>, creating pathways that attackers exploit to move laterally from compromised infusion pumps to administrative systems holding financial data. The uncomfortable truth: most healthcare CISOs know their current security architecture can't protect patient data in today's interconnected clinical environment.</p><h2>Why Now: Connected Medical Devices Shatter Security Assumptions</h2><p>The proliferation of connected medical devices has fundamentally broken healthcare's security model. Infusion pumps, diagnostic imaging systems, and patient monitoring devices often run outdated operating systems that cannot support multi-factor authentication or modern encryption standards. These devices must connect to clinical networks to transmit data to electronic health record systems, but they create attack vectors that traditional perimeter security cannot address.</p><p>Remote access patterns compound this challenge. Clinicians access patient records from home networks, specialists review diagnostic images from mobile devices, and healthcare administrators manage billing systems through cloud-based portals. VPNs extend the network perimeter to remote locations, but once authenticated, users often gain broad access to systems and data unrelated to their clinical roles.</p><p>Regulatory frameworks recognize these limitations. <a href="https://www.kiteworks.com/platform/compliance/hipaa-compliance/">HIPAA compliance requirements</a> demand that healthcare organizations implement access controls based on role and context, maintain detailed audit trails that capture who accessed what data and when, and encrypt sensitive information both at rest and in transit.</p><h2>What Zero Trust Architecture Delivers for Healthcare</h2><p><a href="https://www.kiteworks.com/platform/security/zero-trust-architecture-security-functions/">Zero trust security functions</a> eliminate the concept of a trusted internal network. Instead, they treat every access request as untrusted until verified, regardless of whether the request originates from inside or outside the organization's network perimeter. This verification process evaluates multiple factors including user identity, device security posture, location, time of access, and the sensitivity of the requested resource.</p><p>For healthcare organizations, zero trust architecture must accommodate clinical workflows that require rapid access to patient data during emergencies while maintaining strict controls over routine access. A trauma surgeon responding to a critical case needs immediate access to a patient's medication history, allergies, and prior imaging studies. Zero trust controls must authenticate the surgeon's identity, verify that the device meets security baselines, confirm that the access request aligns with the surgeon's role and the patient's care team, and grant time-limited access to only the necessary records.</p><p>Implementing zero trust requires integration across identity and access management systems, network infrastructure, endpoint security tools, and data protection platforms. Identity and access management systems provide the authentication and authorization foundation, verifying user identities through multi-factor authentication and evaluating access requests against role-based policies.</p><h2>Implementation Path: Start with Identity, Segment Networks, Protect Data</h2><p>Identity verification forms the foundation of zero trust security. Healthcare organizations must authenticate users before granting access to any system or data, but authentication mechanisms must balance security requirements with clinical realities. Multi-factor authentication works well for administrative users logging into billing systems from office workstations, but it creates friction for clinicians who need rapid access to patient records during emergencies.</p><p>Contextual authentication addresses this challenge by adapting verification requirements based on risk. A clinician accessing non-sensitive administrative data from a managed device within the hospital network might authenticate with a password and smart card. The same clinician accessing patient records remotely from a personal device would face additional verification such as biometric authentication or a push notification to a registered mobile device.</p><p>Network segmentation divides the healthcare organization's infrastructure into isolated zones with strictly controlled communication pathways. Clinical networks that connect medical devices should operate separately from administrative networks that handle billing and human resources systems. Electronic health record systems that store patient data should reside in dedicated network segments with enhanced monitoring and access controls.</p><p>Microsegmentation extends this approach by creating granular security zones at the workload or application level rather than the network level. Instead of placing all medical devices in a single isolated network segment, microsegmentation policies define rules for individual device types. An MRI scanner in the radiology department can communicate with the radiology information system and the picture archiving and communication system, but not with infusion pumps in the intensive care unit or patient monitors in the surgical suite.</p><h2>Securing Data in Motion Between Healthcare Partners</h2><p>Patient data flows constantly between healthcare organizations, specialists, laboratories, payers, and public health authorities. These data exchanges happen through email attachments, file transfer protocols, application programming interfaces, and web portals, creating numerous opportunities for data exposure, unauthorized access, or interception.</p><p>Traditional security controls focus on encrypting data at rest within databases and file systems using standards such as AES-256, but sensitive data faces greatest risk when moving between organizations. Email systems that transport patient records as attachments often lack end-to-end encryption. File transfer protocols that move diagnostic imaging studies between hospitals may use encryption in transit but lack granular access controls that restrict which users can download files at the destination.</p><p><a href="https://www.kiteworks.com/platform/simple/secure-file-sharing/">Secure file sharing controls</a> address these risks by enforcing zero trust principles at the data level rather than the network or application level. These controls classify data based on sensitivity, apply encryption and access policies that travel with the data regardless of where it moves, and maintain detailed audit trails of every access attempt.</p><p><a href="https://www.kiteworks.com/platform/simple/managed-file-transfer/">Managed file transfer systems</a> ensure that data-aware controls scale across thousands of daily data exchanges without creating operational bottlenecks. When a clinician initiates a file transfer containing patient records, automated workflows evaluate the destination against approved partner organizations, verify that the recipient has a legitimate need to access the data, apply encryption and access controls based on data sensitivity, and route the transfer through secure channels.</p><h2>Pitfalls to Avoid: Don't Let Perfect Become the Enemy of Good</h2><p>The biggest mistake healthcare organizations make is attempting to implement zero trust as a single, comprehensive project. This approach creates overwhelming complexity and delays security improvements while threats continue to evolve. Instead, successful implementations start with high-risk areas such as third-party vendor access or remote clinician authentication, demonstrate measurable security improvements, and then expand to additional use cases.</p><p>Another common pitfall is underestimating the integration requirements between existing security tools and new zero trust controls. <a href="https://www.kiteworks.com/platform/compliance/regulatory-compliance/">Regulatory compliance frameworks</a> require seamless audit trails across all systems, but disparate security tools often create gaps in logging and monitoring that auditors will identify during examinations.</p><h2>Conclusion: Zero Trust as Healthcare's Security Foundation</h2><p>Healthcare organizations implementing zero trust security need a platform that secures sensitive data in motion with the same rigor that zero trust principles bring to identity, network, and endpoint security. The architectural components of zero trust span identity and access management, network segmentation, endpoint security, continuous monitoring, and sensitive data protection, but success requires coordinated implementation across all these domains.</p><p>For security leaders and IT executives, zero trust security delivers measurable outcomes including reduced mean time to detect lateral movement, faster containment of ransomware incidents, audit-ready access logs, and regulatory defensibility when demonstrating compliance with data protection requirements. These benefits require coordinated implementation across identity systems, network infrastructure, endpoints, and data protection platforms, supported by governance frameworks that maintain policy alignment with regulatory requirements and operational needs.</p><h2>Resources</h2><p>&#8226; <a href="https://www.kiteworks.com/platform/template-platform/private-data-network/">Private Data Network Platform</a></p><p>&#8226; <a href="https://www.kiteworks.com/platform/visibility/ciso-dashboard/">CISO Dashboard and Visibility</a></p><p>&#8226; <a href="https://www.kiteworks.com/hipaa-compliance/healthcare-zero-trust-security-implementation/">Healthcare Zero Trust Implementation Guide</a></p><p>&#8226; <a href="https://www.kiteworks.com/platform/security/zero-trust-architecture-security-functions/">Zero Trust Architecture Security Functions</a></p><p>&#8226; <a href="https://www.kiteworks.com/platform/compliance/hipaa-compliance/">HIPAA Compliance Platform</a></p>]]></content:encoded></item><item><title><![CDATA[Five Critical Risks Banks Face When Using US Cloud Providers for Cross-Border Data Transfers]]></title><description><![CDATA[Banks operating across borders face a dangerous blind spot: cross-border data transfer risks that traditional perimeter security cannot address.]]></description><link>https://kiteworks.substack.com/p/five-critical-risks-banks-face-when</link><guid isPermaLink="false">https://kiteworks.substack.com/p/five-critical-risks-banks-face-when</guid><dc:creator><![CDATA[Patrick Spencer]]></dc:creator><pubDate>Tue, 21 Apr 2026 15:31:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!soDI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8873da12-dfbb-4edc-9ab1-c998857b3d6a_1472x832.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img style="" src="https://substackcdn.com/image/fetch/$s_!soDI!,w_1100,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8873da12-dfbb-4edc-9ab1-c998857b3d6a_1472x832.jpeg" alt="Cover Image" data-component-name="ImageToDOM"></p><p>Banks operating across borders face a dangerous blind spot: <a href="https://www.kiteworks.com/cybersecurity-risk-management/cross-border-data-transfer-risks-banks/">cross-border data transfer risks</a> that traditional perimeter security cannot address. Financial institutions using US cloud providers expose themselves to five interconnected risks that can trigger regulatory intervention, reputational damage, or operational disruption through a single governance gap.</p><h2>Why Cross-Border Data Transfer Risks Demand Immediate Attention</h2><p>Regulatory enforcement around cross-border data transfers is tightening rapidly. Supervisory authorities now expect real-time compliance evidence rather than periodic audit snapshots. The emergence of AI-assisted cloud processing introduces new vectors for unauthorized data access that existing governance frameworks were not designed to address.</p><p>Banks can no longer rely on contractual protections alone. When customer information, transaction records, and proprietary financial models move between jurisdictions with divergent legal frameworks, technical controls become the only defensible protection layer.</p><h2>What Effective Cross-Border Data Protection Looks Like</h2><p>Secure cross-border data transfers require unified technical controls that operate independently of cloud provider infrastructure. Banks need <a href="https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/">zero trust architecture</a> that evaluates every transfer request against data-aware policies considering data classification, user identity, recipient verification, and applicable regulatory requirements.</p><p>Effective protection involves <a href="https://www.kiteworks.com/secure-file-sharing/real-world-examples-of-end-to-end-encryption/">end-to-end encryption</a> using AES-256 for data at rest and TLS 1.3 for data in transit, with keys the bank controls exclusively. This approach eliminates reliance on cloud provider key management services and prevents temporary decryption at intermediate nodes.</p><h2>Implementation Path: Building Defensible Data Transfer Architecture</h2><p>Banks should begin by implementing <a href="https://www.kiteworks.com/secure-file-transfer/data-classification-what-it-is-types-and-best-practices/">data classification</a> systems that automatically tag data objects with jurisdiction metadata and regulatory sensitivity levels. This foundation enables automated enforcement of data residency requirements at the transfer level.</p><p>Next, deploy <a href="https://www.kiteworks.com/secure-file-sharing/secure-file-sharing-essential-data-encryption-best-practices/">encryption best practices</a> that protect data from source to authorized recipient without relying on cloud infrastructure. Configure encryption policies that balance protection requirements with performance considerations to avoid degrading application responsiveness.</p><p>Finally, establish cryptographically verified <a href="https://www.kiteworks.com/regulatory-compliance/audit-log/">audit trails</a> that capture transfer metadata, access decisions, encryption status, and recipient verification in tamper-proof logs. These systems must operate independently of cloud provider logging to provide authoritative records that regulators can trust.</p><h2>Pitfalls to Avoid: Common Cross-Border Transfer Mistakes</h2><p>Banks often assume cloud providers handle encryption comprehensively, creating dangerous gaps where data may be decrypted at load balancers, application gateways, or content delivery networks. Standard cloud provider logging captures infrastructure events rather than data protection decisions, failing to provide the forensic detail necessary for regulatory examinations.</p><h2>Conclusion</h2><p>The five data transfer risks&#8212;foreign legal access, encryption gaps, third-party visibility failures, inadequate audit trails, and continuous compliance deficits&#8212;do not operate in isolation. Each reinforces the others, creating exploitable gaps across the entire data transfer architecture. Financial institutions that invest now in unified, data-aware transfer architectures will be better positioned to demonstrate regulatory defensibility as enforcement expectations continue to evolve.</p><h2>Resources</h2><ul><li><p><a href="https://www.kiteworks.com/platform/template-platform/private-data-network/">Private Data Network Platform</a></p></li><li><p><a href="https://www.kiteworks.com/platform/compliance/data-sovereignty/">Data Sovereignty Compliance</a></p></li><li><p><a href="https://www.kiteworks.com/platform/security/zero-trust-architecture-security-functions/">Zero Trust Architecture Security</a></p></li><li><p><a href="https://www.kiteworks.com/platform/compliance/gdpr-compliance/">GDPR Compliance Platform</a></p></li><li><p><a href="https://www.kiteworks.com/platform/simple/managed-file-transfer/">Managed File Transfer</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Your Cost-Optimization Vendor Just Became the Breach]]></title><description><![CDATA[ShinyHunters didn't hack Rockstar Games. They hacked Rockstar's cloud analytics vendor. 78.6 million records later, here's what that means for your Snowflake access controls.]]></description><link>https://kiteworks.substack.com/p/your-cost-optimization-vendor-just</link><guid isPermaLink="false">https://kiteworks.substack.com/p/your-cost-optimization-vendor-just</guid><dc:creator><![CDATA[Patrick Spencer]]></dc:creator><pubDate>Tue, 21 Apr 2026 00:03:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!S5Ol!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f7a051-8ddb-4432-a4f2-8b9f4ecb1643_450x300.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!S5Ol!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f7a051-8ddb-4432-a4f2-8b9f4ecb1643_450x300.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!S5Ol!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f7a051-8ddb-4432-a4f2-8b9f4ecb1643_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!S5Ol!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f7a051-8ddb-4432-a4f2-8b9f4ecb1643_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!S5Ol!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f7a051-8ddb-4432-a4f2-8b9f4ecb1643_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!S5Ol!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f7a051-8ddb-4432-a4f2-8b9f4ecb1643_450x300.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!S5Ol!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f7a051-8ddb-4432-a4f2-8b9f4ecb1643_450x300.jpeg" width="450" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/11f7a051-8ddb-4432-a4f2-8b9f4ecb1643_450x300.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:450,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:48485,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://kiteworks.substack.com/i/194830143?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f7a051-8ddb-4432-a4f2-8b9f4ecb1643_450x300.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!S5Ol!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f7a051-8ddb-4432-a4f2-8b9f4ecb1643_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!S5Ol!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f7a051-8ddb-4432-a4f2-8b9f4ecb1643_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!S5Ol!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f7a051-8ddb-4432-a4f2-8b9f4ecb1643_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!S5Ol!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f7a051-8ddb-4432-a4f2-8b9f4ecb1643_450x300.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A cloud cost-monitoring vendor called Anandot had access to Rockstar Games&#8217; Snowflake environment. Routine integration. Service account with elevated permissions. The kind of connection that lives in a procurement spreadsheet and never makes it onto the CISO&#8217;s risk register.</p><p>In April 2026, ShinyHunters <a href="https://www.blackfog.com/the-state-of-ransomware-2026/">announced the breach</a>. Not by attacking Rockstar directly &#8212; by pivoting through Anandot&#8217;s Snowflake footprint. Contracts. Financial documents. Go-to-market plans. An estimated 78.6 million records of corporate intelligence, exfiltrated through a vendor that existed to <em>save money on cloud bills</em>.</p><p>Think about that for a second. The tool your finance team uses to optimize cloud spending may have broader access to your data warehouse than your security team realizes.</p><h3><strong>This Is a Pattern, Not an Anomaly</strong></h3><p>I&#8217;ve been tracking the third-party breach data all year, and the Rockstar incident fits a trend that should make every CISO uncomfortable.</p><p>The <a href="https://content.blackkite.com/ebook/2026-third-party-breach-report/">2026 Black Kite Third-Party Breach Report</a> counted 136 verified third-party breach events in 2025. Those events produced 719 publicly named victims &#8212; and an estimated 26,000 additional affected companies that were never named. The median time from breach to public disclosure? Seventy-three days. More than two months of silent exposure.</p><p>Here&#8217;s the part that should keep you up at night: Among the top 50 most-connected vendors that Black Kite monitors, 84% had critical CVSS 8+ vulnerabilities, 62% had corporate credentials circulating in stealer logs, and 70% had a CISA KEV-listed flaw. These aren&#8217;t fringe vendors. They&#8217;re the ones everybody uses.</p><p>The <a href="https://www.weforum.org/publications/global-cybersecurity-outlook-2026/">World Economic Forum 2026 Global Cybersecurity Outlook</a> now reports that 65% of large companies rank third-party and <a href="https://www.kiteworks.com/risk-compliance-glossary/supply-chain-risk-management/">supply chain</a> vulnerabilities as their greatest resilience challenge &#8212; up from 54% the prior year. The trend line is vertical.</p><h3><strong>Why Cloud Data Warehouses Are the Perfect Target</strong></h3><p>Cloud platforms like Snowflake, BigQuery, and Redshift are designed to centralize data and make it accessible. That&#8217;s the value proposition. It&#8217;s also the attack surface.</p><p>The <a href="https://cpl.thalesgroup.com/sites/default/files/content/campaigns/data-threat-report/2026-thales-data-threat-report.pdf">2026 Thales Data Threat Report</a> ranks cloud storage (35%), SaaS applications (34%), and cloud management infrastructure (32%) as the top three attack targets for the third straight year. Only 33% of organizations have complete knowledge of where their data is stored.</p><p>That visibility gap is the problem. The data that accumulates in analytics platforms &#8212; contracts, financial models, customer segmentation, pricing strategy &#8212; often arrives there without anyone making an explicit security decision about it. It&#8217;s <em>business data</em>, not <em>regulated data</em>, so it skips the controls that <a href="https://www.kiteworks.com/risk-compliance-glossary/pii-phi/">PII</a> would trigger. Until it gets stolen, and suddenly it&#8217;s the most sensitive information in the company.</p><p>The <a href="https://www.crowdstrike.com/en-us/global-threat-report/">CrowdStrike 2026 Global Threat Report</a> confirms the attacker&#8217;s perspective: SaaS platforms aggregate high-value data but are under-monitored relative to endpoints. Both eCrime and state-nexus actors are actively searching cloud estates for exactly the kind of corporate intelligence that Rockstar lost.</p><h3><strong>The Vendor Risk Score Illusion</strong></h3><p>Here&#8217;s where it gets uncomfortable. Across roughly 200,000 organizations that Black Kite monitors, the average cyber risk grade is 90.27 out of 100. An A.</p><p>Yet 53.77% of those organizations have at least one critical vulnerability.</p><p>High grades coexist with weak fundamentals. A vendor can pass a security questionnaire while its service account credentials sit in a stealer log. The questionnaire doesn&#8217;t ask about that. It asks whether <a href="https://www.kiteworks.com/secure-file-sharing/public-vs-private-key-encryption/">encryption</a> is enabled and whether an <a href="https://www.kiteworks.com/risk-compliance-glossary/incident-response-plan/">incident response plan</a> exists.</p><p>The <a href="https://www.kiteworks.com/sites/default/files/resources/kiteworks-report-2026-data-security-compliance-risk-forecast.pdf">Kiteworks 2026 Data Security and Compliance Risk Forecast</a> adds another dimension: Only 39% of organizations have unified data exchange approaches with enforcement-level <a href="https://www.kiteworks.com/regulatory-compliance/audit-log/">audit trails</a>. The other 61% are stitching together logs from different systems &#8212; if those logs exist at all. When vendor access anomalies happen in that 61%, nobody sees them until the damage is done.</p><h3><strong>What the Architecture Actually Needs to Look Like</strong></h3><p>The fix isn&#8217;t better questionnaires. It&#8217;s governance at the data layer.</p><p>Organizations need a control plane that applies consistent policy enforcement, <a href="https://www.kiteworks.com/secure-file-sharing/secure-file-sharing-with-access-control/">access controls</a>, and <a href="https://www.kiteworks.com/regulatory-compliance/audit-log/">audit logging</a> across every channel where sensitive data moves &#8212; email, <a href="https://www.kiteworks.com/risk-compliance-glossary/secure-file-sharing-definition/">file sharing</a>, APIs, <a href="https://www.kiteworks.com/risk-compliance-glossary/sftp/">SFTP</a>, <a href="https://www.kiteworks.com/risk-compliance-glossary/managed-file-transfer/">managed file transfer</a>, and cloud integrations alike. When a vendor accesses data through any of these channels, the same governance engine evaluates the request, logs the activity, and enforces least-privilege boundaries.</p><p>This is the pattern that platforms like <a href="https://www.kiteworks.com/">Kiteworks</a> are building around: one policy engine, one consolidated <a href="https://www.kiteworks.com/regulatory-compliance/audit-log/">audit log</a>, one security architecture across all data exchange methods. The alternative &#8212; different tools with different policies and different logs for each channel &#8212; is what creates the blind spots that ShinyHunters exploited.</p><h3><strong>What to Do Monday Morning</strong></h3><p><strong>Audit every vendor integration with your cloud data warehouses.</strong> Identify every service account, API key, and persistent credential. If you can&#8217;t produce that list in 24 hours, you have a visibility problem that needs to be fixed before anything else.</p><p><strong>Enforce time-bound, least-privilege access for analytics vendors.</strong> A cost-monitoring tool does not need persistent read access to your entire data warehouse. Scope it. Rotate credentials. Require re-authentication for anything outside normal patterns.</p><p><strong>Unify your audit logging.</strong> If your Snowflake access logs, file transfer logs, and email logs live in separate systems, you will not detect the next Anandot-style pivot. Consolidate them into a single view.</p><p><strong>Stop treating cloud analytics platforms as low-risk.</strong> The data that accumulates there for business intelligence is often the same data &#8212; contracts, financials, strategy docs &#8212; that you protect carefully everywhere else. Apply the same encryption, access controls, and monitoring standards.</p><div><hr></div><p>The Rockstar breach isn&#8217;t a gaming industry problem. It&#8217;s a cloud analytics problem. And if your organization uses Snowflake, BigQuery, Redshift, or any data warehouse with third-party vendor integrations, it&#8217;s your problem too.</p><p>The question isn&#8217;t whether your vendors have good security scores. It&#8217;s whether you can see what they&#8217;re accessing, right now, and whether you&#8217;d know if someone else was using their credentials to do it.</p>]]></content:encoded></item><item><title><![CDATA[Your Applications Were Never Safe. Mythos Just Proved It.]]></title><description><![CDATA[AI found thousands of zero-days in weeks. The only question that matters now: When the breach succeeds, what does the attacker find?]]></description><link>https://kiteworks.substack.com/p/your-applications-were-never-safe</link><guid isPermaLink="false">https://kiteworks.substack.com/p/your-applications-were-never-safe</guid><dc:creator><![CDATA[Patrick Spencer]]></dc:creator><pubDate>Mon, 20 Apr 2026 19:59:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mmaV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9f283b-3dc1-4828-91b2-515266d07ed1_450x300.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mmaV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9f283b-3dc1-4828-91b2-515266d07ed1_450x300.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mmaV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9f283b-3dc1-4828-91b2-515266d07ed1_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mmaV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9f283b-3dc1-4828-91b2-515266d07ed1_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mmaV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9f283b-3dc1-4828-91b2-515266d07ed1_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mmaV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9f283b-3dc1-4828-91b2-515266d07ed1_450x300.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mmaV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9f283b-3dc1-4828-91b2-515266d07ed1_450x300.jpeg" width="450" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d9f283b-3dc1-4828-91b2-515266d07ed1_450x300.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:450,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69728,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://kiteworks.substack.com/i/194826380?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9f283b-3dc1-4828-91b2-515266d07ed1_450x300.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mmaV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9f283b-3dc1-4828-91b2-515266d07ed1_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mmaV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9f283b-3dc1-4828-91b2-515266d07ed1_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mmaV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9f283b-3dc1-4828-91b2-515266d07ed1_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mmaV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9f283b-3dc1-4828-91b2-515266d07ed1_450x300.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In April 2026, Anthropic released Claude Mythos. Within weeks, it had discovered thousands of zero-day vulnerabilities across every major operating system and every major web browser. A 27-year-old TCP flaw in OpenBSD. A 16-year-old codec bug in FFmpeg. A 17-year-old remote code execution vulnerability in FreeBSD&#8217;s NFS server &#8212; fully exploited, autonomously, in about four hours.</p><p>Most of the cybersecurity industry responded with alarm. I had a different reaction: <em>finally</em>.</p><p>Not because I&#8217;m glad vulnerabilities exist. But because Mythos is doing something the security industry has failed to do for two decades: It&#8217;s making the case, irrefutably, that application-layer security is a losing game. The conversation is finally shifting to where it should have been all along &#8212; the data layer.</p><h3><strong>The Math Was Already Broken</strong></h3><p>I&#8217;ve spent years watching smart security teams pour enormous budgets into patching, scanning, and hardening applications. And I&#8217;ve watched those same teams get breached anyway. Not because they&#8217;re incompetent, but because the math doesn&#8217;t work.</p><p>In 2025, roughly 48,000 CVEs were published &#8212; about 131 per day &#8212; the seventh consecutive record-breaking year. Google Mandiant&#8217;s <a href="https://cloud.google.com/security/resources/m-trends">M-Trends 2026</a> report measured average time-to-exploit at <em>negative seven days</em>, meaning exploitation begins a week before the patch is even available. The average time to remediate? 74 days.</p><p>That&#8217;s not a gap. That&#8217;s a canyon.</p><p>The <a href="https://www.crowdstrike.com/en-us/resources/reports/global-threat-report/">CrowdStrike 2026 Global Threat Report</a> measured average eCrime breakout times of 29 minutes from initial access to lateral movement. The fastest: 27 seconds. CrowdStrike also documented an 89% increase in AI-enabled adversary attacks year-over-year and a 42% increase in <a href="https://www.kiteworks.com/risk-compliance-glossary/zero-day-exploits/">zero-day exploits</a> used before public disclosure.</p><p>Now layer AI offense on top. Before Mythos, Claude Opus 4.6 found 22 CVEs in Firefox&#8217;s C++ code in two weeks &#8212; the first bug in 20 minutes. Google&#8217;s Big Sleep found an exploitable SQLite flaw known, in Google&#8217;s own assessment, only to threat actors. XBOW became the first AI to hit #1 on HackerOne&#8217;s U.S. leaderboard, submitting over 1,060 vulnerability reports 85 times faster than human pentesters.</p><p>Then Mythos arrived and did all of that at once. Across everything.</p><p>Every CISO I know needs to internalize one truth: You cannot patch your way out of this.</p><h3><strong>The Only Question That Matters Now</strong></h3><p>If every application is vulnerable &#8212; and Mythos has demonstrated this conclusively &#8212; then the only question is: When an attacker gets through, what do they find?</p><p>A piece of data that is <a href="https://www.kiteworks.com/secure-file-sharing/public-vs-private-key-encryption/">encrypted</a> at the data layer, governed by embedded access policies, and controlled by keys the attacker doesn&#8217;t possess has no application surface to exploit. There is no buffer to overflow, no API to misconfigure, no dependency to poison. The data carries its own protection. A breach of the application becomes a breach of the container, not the contents.</p><p>This isn&#8217;t a fringe idea. <a href="https://csrc.nist.gov/pubs/sp/800/207/final">NIST SP 800-207</a> describes <a href="https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/">zero-trust architecture</a> as primarily focused on data protection. The <a href="https://www.cisa.gov/zero-trust-maturity-model">CISA Zero Trust Maturity Model</a> establishes Data as one of five pillars. The NSA&#8217;s April 2024 guidance says it directly: Traditional perimeter defenses alone are insufficient. It also acknowledges that the data pillar remains the least mature in most federal implementations.</p><p>Gartner projects that by 2026, 75% of organizations running GenAI will reprioritize spending toward unstructured data security. <a href="https://www.ibm.com/reports/data-breach">IBM&#8217;s 2025 Cost of a Data Breach Report</a> &#8212; U.S. average breach cost: $10.22 million, an all-time high &#8212; explicitly recommends <a href="https://www.kiteworks.com/secure-file-transfer/data-classification-what-it-is-types-and-best-practices/">data discovery, classification</a>, <a href="https://www.kiteworks.com/secure-file-sharing/secure-file-sharing-with-access-control/">access control</a>, <a href="https://www.kiteworks.com/secure-file-sharing/secure-file-sharing-essential-data-encryption-best-practices/">encryption</a>, and key management as the primary defense posture.</p><p>Everyone knows where we&#8217;re headed. Mythos just made &#8220;eventually&#8221; feel a lot more like &#8220;now.&#8221;</p><h3><strong>What This Looks Like in Practice</strong></h3><p>This is the problem <a href="https://www.kiteworks.com/">Kiteworks</a> was built to solve &#8212; applying <a href="https://www.kiteworks.com/risk-compliance-glossary/zero-trust-security/">zero-trust</a> principles at the data layer itself. Dual-layer <a href="https://www.kiteworks.com/risk-compliance-glossary/aes-256-encryption/">AES-256 encryption</a> at both file and disk levels. <a href="https://kiteworks.substack.com/https:/www.kiteworks.com/platform/compliance/fips-compliance/">FIPS 140-3</a> validated cryptographic modules. Customer-managed encryption keys. <a href="https://www.kiteworks.com/risk-compliance-glossary/attribute-based-access-control/">Attribute-based access controls</a> embedded directly within files, so protection travels with the data regardless of where it moves.</p><p>For the AI era specifically, <a href="https://www.kiteworks.com/platform/security/mcp-ai-integration/">Kiteworks&#8217; Secure MCP Server</a> enforces the same ABAC policies, encryption, and <a href="https://www.kiteworks.com/regulatory-compliance/audit-log/">audit logging</a> for every AI agent interaction with regulated data. Unlike model-level guardrails that can be circumvented by prompt injection, governance at the data access layer is the only layer AI agents cannot bypass.</p><h3><strong>Scariest AI Is Making Us Safer</strong></h3><p>There&#8217;s a deliberate irony in Anthropic naming this model &#8220;Mythos.&#8221; A mythos is a foundational narrative &#8212; a story that shapes how a culture understands its world.</p><p>Mythos isn&#8217;t creating new risk. Those vulnerabilities already existed. The 27-year-old OpenBSD flaw was sitting there the whole time. The OpenSSL bugs from 1998 were exploitable for a quarter century. What Mythos does is collapse the gap between what we know and what attackers know. It makes the fiction of &#8220;secure applications&#8221; visible to everyone &#8212; not just the researchers and nation-states who were already exploiting these flaws quietly.</p><p>That fiction was dangerous. It let organizations believe that patching was sufficient. It let boards approve security budgets built around the assumption that applications could be made safe.</p><p>Mythos destroys that assumption.</p><p>I&#8217;ve been making the argument for data-layer security for a long time. That an individual piece of data, encrypted and controlled, doesn&#8217;t have a vulnerability because there&#8217;s no application around it. That data-layer encryption, data-layer policies, data-layer controls become the critical investment in a world where all software is presumed vulnerable.</p><p>Mythos didn&#8217;t change my argument. It just made it impossible to ignore.</p><p>When every lock can be picked, the organizations that survive will be those that made the contents of the vault independently impenetrable.</p>]]></content:encoded></item><item><title><![CDATA[Fragmented Audit Trails Are Healthcare's Hidden Compliance Killer]]></title><description><![CDATA[Healthcare organizations face an unrelenting challenge: proving that patient data communications remain secure, compliant, and traceable across every channel and stakeholder.]]></description><link>https://kiteworks.substack.com/p/fragmented-audit-trails-are-healthcares</link><guid isPermaLink="false">https://kiteworks.substack.com/p/fragmented-audit-trails-are-healthcares</guid><dc:creator><![CDATA[Patrick Spencer]]></dc:creator><pubDate>Mon, 20 Apr 2026 17:01:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5owm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ace520-08ff-43e5-a5e1-7a59b4b429e2_1472x832.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img style="" src="https://substackcdn.com/image/fetch/$s_!5owm!,w_1100,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ace520-08ff-43e5-a5e1-7a59b4b429e2_1472x832.jpeg" alt="Cover Image" data-component-name="ImageToDOM"></p><p>Healthcare organizations face an unrelenting challenge: proving that patient data communications remain secure, compliant, and traceable across every channel and stakeholder. When sensitive health information moves between providers, payers, research institutions, and third-party vendors, <a href="https://www.kiteworks.com/hipaa-compliance/healthcare-unified-audit-trails-compliance/">fragmented audit trails create blind spots</a> that expose organizations to data compliance penalties, operational risk, and reputational damage. The solution lies in unified audit trails that consolidate visibility into a single, immutable record capturing every access event, modification, and transmission across the entire data lifecycle.</p><h2>Why Healthcare Audit Fragmentation Creates Critical Blind Spots</h2><p>Most healthcare organizations rely on multiple communication channels to exchange patient data. Clinical teams send imaging files through <a href="https://www.kiteworks.com/platform/simple/secure-file-sharing/">secure file sharing platforms</a>, administrative staff transmit eligibility documents via <a href="https://www.kiteworks.com/platform/simple/secure-email/">secure email capabilities</a>, and integration teams exchange electronic health records through APIs. Each channel generates its own audit logs in proprietary formats, stored in separate repositories with inconsistent retention policies and varying levels of detail.</p><p>This fragmentation creates three critical problems that expose organizations to significant risk. First, compliance teams cannot efficiently demonstrate comprehensive records of all patient data communications. When auditors request evidence of access controls or data handling practices, staff must manually export logs from each system, reconcile timestamps across different formats, and correlate events spanning multiple platforms. The resulting documentation is incomplete, time-consuming to produce, and difficult to verify.</p><p>Second, security teams lack visibility needed to detect suspicious patterns emerging across channels. An attacker who gains initial access through a compromised email account may escalate privileges by accessing file shares, then exfiltrate data through APIs. When audit logs remain siloed, these multi-stage attacks appear as isolated, benign events rather than coordinated campaigns.</p><h2>What Unified Audit Architecture Delivers for Healthcare</h2><p>Achieving unified audit trails requires an architecture that consolidates all patient data communications onto a single platform or establishes centralized instrumentation across heterogeneous systems. The consolidation approach simplifies governance by reducing audit sources, ensuring consistent policy enforcement, and eliminating gaps that emerge when different systems implement varying levels of logging detail.</p><p>A unified platform must support every communication channel through which patient data moves. File sharing functionality must provide granular access controls, expiration policies, and tracking of download events. API support must accommodate both synchronous and asynchronous data exchange while capturing request parameters, response payloads, and error conditions. <a href="https://www.kiteworks.com/platform/simple/managed-file-transfer/">Managed file transfer channels</a> must handle scheduled batch transmissions with retry logic, integrity verification, and delivery confirmation.</p><p>The platform must generate audit records automatically for every interaction without requiring manual configuration or custom instrumentation. Each record must capture standardized attributes including authenticated user identity, action performed, data object affected, timestamp with timezone information, source and destination identifiers, success or failure status, and contextual metadata such as file size, encryption method, and recipient organization. This standardization enables consistent analysis across all communication types and eliminates the need to reconcile differing log schemas.</p><h2>Implementation Path: From Fragmented to Unified</h2><p>Organizations achieve unified audit trails through a phased approach that begins with platform consolidation. Healthcare enterprises must first assess their current communication channels and identify which systems generate audit logs, what information those logs capture, and how long records are retained. This assessment reveals gaps in coverage and inconsistencies in logging detail that create compliance vulnerabilities.</p><p>The next phase involves establishing governance frameworks that define what activities require logging, how long records must be retained, who can access audit data, and what processes govern audit review and analysis. These frameworks translate <a href="https://www.kiteworks.com/platform/compliance/regulatory-compliance/">regulatory compliance obligations</a> into operational procedures that guide configuration decisions, access management, and monitoring practices.</p><p>Policy definitions must specify which communication channels fall within scope, which data classification levels require enhanced logging, and which user roles warrant additional scrutiny. Retention policies must balance regulatory requirements with storage economics and operational practicality. Organizations must retain audit records long enough to satisfy compliance obligations, support litigation holds, and enable retrospective security investigations while managing the cost and complexity of long-term storage.</p><p>The final implementation phase focuses on operationalizing unified audit capabilities through integration with security operations workflows. The platform must export audit data in formats compatible with SIEM systems, enabling correlation with logs from network devices, endpoint protection tools, and identity providers. Integration must support near real-time streaming rather than batch exports to minimize detection latency.</p><h2>Avoiding Common Unified Audit Trail Pitfalls</h2><p>Many healthcare organizations underestimate the governance requirements needed to operationalize unified audit trails effectively. Technology alone does not deliver unified audit capabilities. Organizations must establish clear procedures for review and analysis, define baseline behaviors for typical communication patterns, and assign ownership for alert triage, investigation, escalation, and resolution.</p><p>Another common pitfall involves inadequate protection of audit infrastructure itself. Unified audit trails represent high-value targets for attackers because they contain detailed information about security controls, communication patterns, and incident response procedures. Access to audit data must follow least-privilege principles, authentication must require multi-factor verification, and access events must themselves be logged to detect unauthorized audit queries.</p><h2>Conclusion: Transforming Compliance Through Unified Visibility</h2><p>Unified audit trails transform compliance from a point-in-time activity into a continuous posture that organizations can measure, monitor, and improve. By consolidating visibility across all communication channels into a single, immutable record, healthcare organizations eliminate blind spots inherent in fragmented logging while reducing operational burden of audit preparation and incident response. The architectural requirements include platform consolidation, automated record generation, immutability controls, and integration with security operations workflows. Organizations that invest now in purpose-built, unified audit infrastructure position themselves to adapt to evolving regulatory demands without costly re-architecture, turning compliance readiness into a durable operational capability rather than a recurring burden.</p><h2>Resources</h2><ul><li><p><a href="https://www.kiteworks.com/platform/template-platform/private-data-network/">Private Data Network Platform</a></p></li><li><p><a href="https://www.kiteworks.com/platform/compliance/hipaa-compliance/">HIPAA Compliance Solutions</a></p></li><li><p><a href="https://www.kiteworks.com/platform/visibility/ciso-dashboard/">CISO Dashboard Visibility</a></p></li><li><p><a href="https://www.kiteworks.com/hipaa-compliance/healthcare-unified-audit-trails-compliance/">Healthcare Unified Audit Trails</a></p></li><li><p><a href="https://www.kiteworks.com/platform/private-data-network/">Private Data Network</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[MCP Was Supposed to Make Enterprise AI Work. Instead, It Became the Pivot Point.]]></title><description><![CDATA[A &#8220;by design&#8221; flaw in the Model Context Protocol just turned every AI integration in your environment into a potential supply chain attack. Your SIEM won&#8217;t see it coming.]]></description><link>https://kiteworks.substack.com/p/mcp-was-supposed-to-make-enterprise</link><guid isPermaLink="false">https://kiteworks.substack.com/p/mcp-was-supposed-to-make-enterprise</guid><dc:creator><![CDATA[Patrick Spencer]]></dc:creator><pubDate>Fri, 17 Apr 2026 20:09:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!e-eS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F554ed1f0-9f43-4942-b4d3-247283033890_450x300.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!e-eS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F554ed1f0-9f43-4942-b4d3-247283033890_450x300.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!e-eS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F554ed1f0-9f43-4942-b4d3-247283033890_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!e-eS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F554ed1f0-9f43-4942-b4d3-247283033890_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!e-eS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F554ed1f0-9f43-4942-b4d3-247283033890_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!e-eS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F554ed1f0-9f43-4942-b4d3-247283033890_450x300.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!e-eS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F554ed1f0-9f43-4942-b4d3-247283033890_450x300.jpeg" width="450" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/554ed1f0-9f43-4942-b4d3-247283033890_450x300.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:450,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:111980,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://kiteworks.substack.com/i/194540581?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F554ed1f0-9f43-4942-b4d3-247283033890_450x300.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!e-eS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F554ed1f0-9f43-4942-b4d3-247283033890_450x300.jpeg 424w, https://substackcdn.com/image/fetch/$s_!e-eS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F554ed1f0-9f43-4942-b4d3-247283033890_450x300.jpeg 848w, https://substackcdn.com/image/fetch/$s_!e-eS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F554ed1f0-9f43-4942-b4d3-247283033890_450x300.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!e-eS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F554ed1f0-9f43-4942-b4d3-247283033890_450x300.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Last week, SecurityWeek dropped <a href="https://www.securityweek.com/by-design-flaw-in-mcp-could-enable-widespread-ai-supply-chain-attacks/">a story</a> that should have forced a meeting on every CISO&#8217;s calendar. Researchers at OX Security disclosed a fundamental flaw in Model Context Protocol &#8212; the plumbing that wires AI agents into your CRM, your code repo, your observability stack, your document store, your ticketing system, your MFT dashboard. The flaw is not a CVE. It is not something you patch. It is, as the researchers put it, &#8220;by design.&#8221;</p><p>Translation: The trust model is the vulnerability.</p><p>And here is the uncomfortable part. Your <a href="https://www.kiteworks.com/risk-compliance-glossary/what-is-security-information-and-event-management/">SIEM</a> won&#8217;t flag it. Your <a href="https://www.kiteworks.com/risk-compliance-glossary/data-loss-prevention-dlp/">DLP</a> won&#8217;t catch it. Your <a href="https://www.kiteworks.com/risk-compliance-glossary/endpoint-detection-response/">EDR</a> won&#8217;t see it. Because from every legacy control&#8217;s perspective, nothing anomalous happened. An agent you authorized made a tool call it was authorized to make, to a server it was authorized to reach, on behalf of a user who was authorized to ask. Data left. Nobody blinked.</p><h3>How MCP Became the Most Privileged Data Access Layer Nobody Governs</h3><p>Before MCP, enterprise AI integration was painful. Every LLM-to-system connection required custom auth, custom plumbing, custom security review. Teams shipped one integration a quarter. Then MCP standardized the protocol, and suddenly agents could reach anything &#8212; file shares, databases, internal APIs, SaaS apps &#8212; through a single standard.</p><p>The velocity was real. The integrations shipped. Developers loved it.</p><p>Security teams mostly missed the memo.</p><p><a href="https://www.kiteworks.com/sites/default/files/resources/kiteworks-report-2026-data-security-compliance-risk-forecast.pdf">Kiteworks 2026 Data Security and Compliance Risk Forecast</a> &#8212; based on survey data from organizations across healthcare, financial services, government, and tech &#8212; found that only 43% have a centralized <a href="https://www.kiteworks.com/risk-compliance-glossary/ai-data-gateway/">AI data gateway</a>. The other 57% are fragmented, partial, or running ad hoc controls that worked fine for one copilot but fall apart when five or ten agents are running simultaneously. 7% have no dedicated AI controls whatsoever.</p><p>The government numbers are worse: 90% have no centralized gateway. One-third have nothing.</p><p>These are organizations that handle citizen data, classified information, critical infrastructure. They&#8217;ve deployed AI. They just haven&#8217;t governed it.</p><p>Now add the MCP disclosure to that foundation. Every organization in that 57% is running MCP integrations. A single compromised server can pivot across the rest. That&#8217;s not a risk scenario. That&#8217;s math.</p><h3>This Isn&#8217;t Theoretical. It&#8217;s Already Been Done.</h3><p>In November 2025, Anthropic disclosed that it had detected and disrupted the first reported AI-orchestrated cyber-espionage campaign. The actor &#8212; which Anthropic attributes with high confidence to a Chinese state-sponsored group it labels GTG-1002 &#8212; used Claude Code plus MCP tools to run multiple Claude instances as autonomous orchestrators across the full intrusion life cycle: reconnaissance, vulnerability discovery, exploitation, lateral movement, credential harvesting, data analysis.</p><p>The campaign targeted roughly 30 entities. AI executed 80&#8211;90% of the tactical work. Humans stepped in only at four to six critical decision points per campaign &#8212; approving escalation, deciding what to exfiltrate. The <a href="https://www.weforum.org/publications/global-cybersecurity-outlook-2026/">World Economic Forum&#8217;s Global Cybersecurity Outlook 2026</a> called it the first confirmed case of agentic AI gaining access to high-value targets, including major tech companies and government agencies.</p><p>Read that paragraph again. Nation-state actors used standard Claude Code, standard MCP tooling, and standard agent orchestration to run 80% of an espionage campaign. No zero-day in the model. No exotic exploit in the protocol. Just MCP, used the way MCP is supposed to be used.</p><p>That&#8217;s what makes the April 15 disclosure different from the usual CVE-of-the-week. The attack surface isn&#8217;t theoretical. It&#8217;s the production infrastructure your engineering team deployed last quarter.</p><h3>The Attack Requires Zero Credentials and Zero Alerts</h3><p>Here&#8217;s the mechanics, and why they break every assumption baked into traditional security stacks.</p><p>An attacker poisons an input &#8212; a document, a URL, an email, a log entry, a web page, a form submission. The input contains instructions disguised as data. The agent, which cannot reliably tell instructions from data inside its context window, follows them. It issues a legitimate authenticated tool call to one of the connected MCP servers. The tool call executes. Data flows out.</p><p>No <a href="https://www.kiteworks.com/risk-compliance-glossary/phishing-attacks/">phishing</a>. No credentials. No <a href="https://www.kiteworks.com/risk-compliance-glossary/malware-based-attacks/">malware</a>. No perimeter breach.</p><p>The <a href="https://arxiv.org/abs/2602.20021">Agents of Chaos study</a> &#8212; twenty researchers led by Northeastern University&#8217;s BauLab, with participants from MIT, Harvard, Stanford, CMU and other institutions, published in February 2026 &#8212; documented this pattern exhaustively in a two-week live environment. Agents default to satisfying whoever is speaking most urgently. They have no self-model for recognizing when they&#8217;re exceeding authorization. They can&#8217;t reliably track which channels are visible to whom. Five of the OWASP Top 10 for LLM Applications mapped directly to the observed failures.</p><h3>Why the Fix Is Not a Patch</h3><p>The mitigations that circulated after the disclosure are directionally right. Isolate MCP services. Scope credentials per tool. Validate inputs. Monitor for anomalous tool calls. All of that is correct. None of it is sufficient.</p><p>The problem isn&#8217;t that the code is wrong. The problem is that the trust model is wrong. MCP was designed around the assumption that tools and agents act in good faith. Every serious AI research group of the last eighteen months has shown that assumption does not survive contact with reality.</p><p>Model-layer guardrails get bypassed. A 2025 <a href="https://arxiv.org/abs/2505.08148">study of 14,904 custom GPTs</a> found 96.51% vulnerable to roleplay attacks and 92.20% to system prompt leakage. Prompt injection defenses have been broken with single keywords. Every platform that&#8217;s shipped &#8220;AI safety&#8221; features has had them defeated, usually within weeks.</p><p>You cannot make this safer by trying harder at the model layer. You have to move the enforcement point.</p><p>That point is the data.</p><h3>The Architectural Answer: Data-Layer Governance</h3><p>Here&#8217;s what actually works. Stop trusting the agent. Stop trusting the MCP server. Stop trusting the prompt. Put the enforcement point at the data access layer &#8212; the place where the request is fulfilled, not the place where it was issued.</p><p>That means every AI data request authenticates independently. Every request gets evaluated against role- and attribute-based access policies in real time. Every request is logged with enough fidelity to reconstruct what happened &#8212; what was accessed, by which agent, for which user, under which policy decision. The agent can ask for anything; the data layer answers only what policy permits. When the agent is tricked, the data layer doesn&#8217;t care. The agent is not the enforcement point.</p><p>This is the architectural pattern that platforms like Kiteworks are building around &#8212; <a href="https://www.kiteworks.com/platform/security/mcp-ai-integration/">MCP</a> and <a href="https://www.kiteworks.com/platform/compliance/compliant-ai/">AI Data Gateway</a> capabilities that enforce governance at the data layer, independent of the model, independent of the prompt, independent of the agent framework. When the model is compromised, updated, or manipulated, the governance layer is still enforcing policy. Policy doesn&#8217;t live in the agent. Policy lives in the gateway.</p><p>It&#8217;s the same zero-trust argument the industry has been making about networks for fifteen years, finally applied to where it actually matters now: the data.</p><h3>What to Do Monday Morning</h3><p><strong>Inventory your MCP footprint. </strong>Most organizations don&#8217;t know how many MCP integrations they&#8217;re running. Start with every tool that added an AI assistant or AI-powered feature in the last eighteen months. Observability platforms. CRMs. Ticketing systems. Code editors. Collaboration suites. Document stores. If it can reach sensitive data and process untrusted input, it&#8217;s in scope.</p><p><strong>Reclassify MCP servers as critical data plane infrastructure. </strong>They&#8217;re not convenience utilities. They should go through the same change-control, threat modeling, and baseline configuration review as anything that touches regulated data. Add them to the <a href="https://www.kiteworks.com/risk-compliance-glossary/data-protection-impact-assessment/">DPIA</a> process.</p><p><strong>Move policy enforcement to the data layer. </strong>Don&#8217;t try to make the agent safer. Make the data layer refuse requests the agent isn&#8217;t authorized to fulfill, every time, independent of whatever the agent thinks it&#8217;s doing. <a href="https://www.kiteworks.com/sites/default/files/resources/kiteworks-report-2026-data-security-compliance-risk-forecast.pdf">63% of organizations</a> can&#8217;t enforce purpose limitations on AI agents. 60% can&#8217;t terminate a misbehaving agent. If those two numbers describe you, data-layer governance is the ceiling on how much AI you can safely deploy.</p><p><strong>Demand evidence-quality <a href="https://www.kiteworks.com/regulatory-compliance/audit-log/">audit logs</a>. </strong>When the next MCP pivot happens &#8212; and it will &#8212; the difference between a contained incident and a reportable breach is whether you can reconstruct exactly what the agent did. Tamper-evident logs. SIEM integration in real time. The Kiteworks Forecast found 33% of organizations lack AI <a href="https://www.kiteworks.com/regulatory-compliance/audit-log/">audit trails</a> entirely and 61% have fragmented logs not actionable in an investigation. That&#8217;s not a posture problem. That&#8217;s a disclosure problem waiting to happen.</p><p><strong>Put AI governance on the board&#8217;s agenda this quarter. </strong>54% of boards aren&#8217;t engaged on AI governance per the Kiteworks Forecast, and those organizations are 26&#8211;28 points behind on every control metric. The MCP disclosure is the forcing function. GTG-1002 is the use case. Use both.</p><p>The next MCP pivot is a matter of weeks, not quarters. The only question is whether, when it happens in your environment, the enforcement point was the data layer &#8212; or the model you were hoping would behave.</p><p>Hope is not a governance strategy.</p>]]></content:encoded></item><item><title><![CDATA[Three AI Security Patterns That Patches Can't Fix]]></title><description><![CDATA[Six critical AI vulnerabilities disclosed between June 2025 and April 2026 reveal a disturbing truth: enterprise AI security failures follow predictable patterns that individual platform patches cannot address.]]></description><link>https://kiteworks.substack.com/p/three-ai-security-patterns-that-patches</link><guid isPermaLink="false">https://kiteworks.substack.com/p/three-ai-security-patterns-that-patches</guid><dc:creator><![CDATA[Patrick Spencer]]></dc:creator><pubDate>Fri, 17 Apr 2026 15:31:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Pl1w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a82c20b-4fa9-4079-94cc-a457cedd5faa_1472x832.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><img style="" src="https://substackcdn.com/image/fetch/$s_!Pl1w!,w_1100,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a82c20b-4fa9-4079-94cc-a457cedd5faa_1472x832.jpeg" alt="Cover Image" data-component-name="ImageToDOM"></p><p>Six critical AI vulnerabilities disclosed between June 2025 and April 2026 reveal a disturbing truth: enterprise AI security failures follow predictable patterns that individual platform patches cannot address. The <a href="https://www.kiteworks.com/cybersecurity-risk-management/six-ai-vulnerabilities-three-failure-patterns/">AI vulnerability patterns</a> exposed in EchoLeak, ForcedLeak, GeminiJack, Reprompt, GrafanaGhost, and the OpenAI plugin ecosystem attack demonstrate that 82% of security detections are now malware-free &#8212; adversaries operate through legitimate tools, with AI as their preferred vector.</p><h2>Why Traditional Security Controls Fail Against AI Attacks</h2><p>The fundamental issue is architectural, not technical. Every vulnerability in this series exploited one of three distinct failure patterns that exist outside the scope of traditional security controls.</p><p>Pattern one involves untrusted input processing. External data enters systems through legitimate channels &#8212; emails, shared documents, web forms, URL parameters &#8212; and AI components later process this data without treating it as adversarial. EchoLeak's payload was a crafted email that Copilot ingested during routine queries. GeminiJack used a poisoned Google Doc that lay dormant until triggered by employee searches. The Cyera 2025 State of AI Data Security Report found that 83% of enterprises use AI daily, but only 13% have visibility into how AI accesses their data.</p><p>Pattern two centers on overly broad data access without per-operation enforcement. Five of the six vulnerabilities involved AI systems operating with broad, implicit data access and no individual request validation. Microsoft 365 Copilot has pre-configured access to the entire productivity suite. When injected instructions executed, these systems retrieved data far beyond user intentions because nothing evaluated each retrieval against policy.</p><p>Pattern three represents process containment failures. GrafanaGhost operated through trusted back-end enrichment processes with system-level privileges. The attack never triggered user-facing <a href="https://www.kiteworks.com/secure-file-sharing/secure-file-sharing-with-access-control/">access controls</a> because it operated through privileged processes that had functional capabilities they were never designed to use.</p><h2>What Effective AI Security Architecture Requires</h2><p>Building resilient AI security requires addressing all three patterns simultaneously through architectural controls that operate independently of AI models.</p><p>Input validation must extend to every data source AI touches. Organizations need to identify every channel where external data feeds into AI processing &#8212; emails, shared documents, form submissions, event logs, API responses, metadata fields. If external data reaches any AI component, treat that input as adversarial regardless of how deeply embedded it appears in trusted systems.</p><p>Per-operation access control replaces broad session-level authentication with individual request validation. Each AI data request requires authentication, policy evaluation, and logging with complete attribution. This means implementing OAuth 2.0 with credentials stored outside the AI's accessible context, real-time ABAC evaluation on every operation, and <a href="https://www.kiteworks.com/regulatory-compliance/audit-log/">tamper-evident audit trail</a> integration with SIEM systems.</p><p>Process containment applies least privilege to functional scope, not just data access. Back-end AI processes may need broad data read access, but they should not have the ability to render content, generate outbound requests, or invoke output routines unless explicitly required. The Kiteworks 2026 Forecast Report identified a 15-20 point gap between governance controls and containment controls &#8212; this functional scoping represents the containment control most organizations lack.</p><h2>Implementation Strategy for AI Security Controls</h2><p>Start with comprehensive AI integration inventory. Document every tool with AI features that processes external data or operates on behalf of users. Assess each integration against all three failure patterns to identify gaps.</p><p>Implement input validation boundaries first. Apply the same validation discipline used for web-facing user input to every data source AI processes. This requires treating emails, shared documents, event logs, and form fields as potential AI prompt injection vectors.</p><p>Deploy per-operation access enforcement for user-facing AI systems. Replace session-level authentication with request-level validation. Ensure credentials remain isolated from AI-accessible contexts and that every data retrieval generates attributable audit entries that feed into existing <a href="https://www.kiteworks.com/regulatory-compliance/data-compliance/">compliance requirements</a>.</p><p>Scope back-end AI processes to required functional capabilities only. Audit which APIs, rendering routines, and output channels each process can invoke. Remove unnecessary capabilities that create attack vectors like those exploited in GrafanaGhost.</p><h2>Avoiding Common AI Security Pitfalls</h2><p>Model-level guardrails represent the most dangerous misconception in AI security. Noma Security's researchers defeated Grafana's guardrails with a single keyword. Salesforce's Content Security Policy was bypassed with a five-dollar domain purchase. These guardrails are configuration settings inside the system being attacked &#8212; they supplement real controls but substitute for none of them.</p><p>Traditional <a href="https://www.kiteworks.com/cybersecurity-risk-management/">risk management</a> approaches that focus on data classification and user permissions miss the architectural gaps these vulnerabilities exploit. The AI processes data from dozens of sources, and nobody validates those sources for adversarial instructions.</p><p>Red-team AI integrations for all three patterns. Test for prompt injection through user-facing channels and through event data, log entries, metadata, and back-end data sources. Every vulnerability in this series was discovered by researchers, not by the organizations running the affected platforms.</p><h2>Building Resilient AI Security Architecture</h2><p>The patches are deployed, but the three architectural gaps remain open. Organizations that address only one or two patterns leave themselves vulnerable to the next variant that exploits whichever pattern they ignored.</p><p>Effective AI security requires input validation discipline, per-operation access enforcement, and process containment working together as an integrated defense system. These controls must operate independently of AI models and outside the AI's accessible context to survive prompt injection attacks.</p><p>The shift toward malware-free attacks through legitimate tools makes AI security architecture a critical business priority, not just a technical consideration.</p><h2>Resources</h2><ul><li><p><a href="https://www.kiteworks.com/platform/compliance/compliant-ai/">Compliant AI Platform</a></p></li><li><p><a href="https://www.kiteworks.com/platform/security/zero-trust-architecture-security-functions/">Zero Trust Architecture</a></p></li><li><p><a href="https://www.kiteworks.com/platform/simple/ai-data-gateway/">AI Data Gateway</a></p></li><li><p><a href="https://www.kiteworks.com/platform/visibility/ciso-dashboard/">CISO Dashboard</a></p></li><li><p><a href="https://www.kiteworks.com/platform/advanced-governance/">Advanced Governance</a></p></li></ul>]]></content:encoded></item></channel></rss>