NIST 800-53 REV 5 • SYSTEM AND SERVICES ACQUISITION
SA-8(20) — Secure Metadata Management
Implement the security design principle of secure metadata management in {{ insert: param, sa-08.20_odp }}.
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Supplemental Guidance
The principle of secure metadata management states that metadata are "first class" objects with respect to security policy when the policy requires either complete protection of information or that the security subsystem be self-protecting. The principle of secure metadata management is driven by the recognition that a system, subsystem, or component cannot achieve self-protection unless it protects the data it relies on for correct execution. Data is generally not interpreted by the system that stores it. It may have semantic value (i.e., it comprises information) to users and programs that process the data. In contrast, metadata is information about data, such as a file name or the date when the file was created. Metadata is bound to the target data that it describes in a way that the system can interpret, but it need not be stored inside of or proximate to its target data. There may be metadata whose target is itself metadata (e.g., the classification level or impact level of a file name), including self-referential metadata. The apparent secondary nature of metadata can lead to neglect of its legitimate need for protection, resulting in a violation of the security policy that includes the exfiltration of information. A particular concern associated with insufficient protections for metadata is associated with multilevel secure (MLS) systems. MLS systems mediate access by a subject to an object based on relative sensitivity levels. It follows that all subjects and objects in the scope of control of the MLS system are either directly labeled or indirectly attributed with sensitivity levels. The corollary of labeled metadata for MLS systems states that objects containing metadata are labeled. As with protection needs assessments for data, attention is given to ensure that the confidentiality and integrity protections are individually assessed, specified, and allocated to metadata, as would be done for mission, business, and system data.
Practitioner Notes
Secure metadata management means protecting the metadata (data about data) in your systems with the same rigor as the data itself. Metadata like access logs, classification labels, and timestamps can reveal sensitive information.
Example 1: Protect audit logs and access records with the same security controls as the data they describe. If your audit logs capture who accessed classified information and when, those logs are themselves sensitive. Store them in a protected, append-only log store with restricted access.
Example 2: When transmitting files with sensitivity labels or classification markings, ensure the metadata travels with the file and cannot be stripped in transit. In Microsoft Purview, sensitivity labels are embedded in the file and travel with it — verify that your DLP policies check the label metadata, not just the file contents.