NIST 800-53 REV 5 • SYSTEM AND INFORMATION INTEGRITY

SI-18(1)Automation Support

Correct or delete personally identifiable information that is inaccurate or outdated, incorrectly determined regarding impact, or incorrectly de-identified using {{ insert: param, si-18.01_odp }}.

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

Supplemental Guidance

The use of automated mechanisms to improve data quality may inadvertently create privacy risks. Automated tools may connect to external or otherwise unrelated systems, and the matching of records between these systems may create linkages with unintended consequences. Organizations assess and document these risks in their privacy impact assessments and make determinations that are in alignment with their privacy program plans. As data is obtained and used across the information life cycle, it is important to confirm the accuracy and relevance of personally identifiable information. Automated mechanisms can augment existing data quality processes and procedures and enable an organization to better identify and manage personally identifiable information in large-scale systems. For example, automated tools can greatly improve efforts to consistently normalize data or identify malformed data. Automated tools can also be used to improve the auditing of data and detect errors that may incorrectly alter personally identifiable information or incorrectly associate such information with the wrong individual. Automated capabilities backstop processes and procedures at-scale and enable more fine-grained detection and correction of data quality errors.

Practitioner Notes

Use automated tools to support PII quality operations — finding and fixing data quality issues at scale.

Example 1: Deploy data quality software (like Informatica Data Quality or Microsoft Data Quality Services) that automatically identifies duplicate records, standardizes address formats, and flags inconsistencies in PII fields across your databases.

Example 2: Use email verification services to automatically validate email addresses in your customer database. Invalid addresses are flagged for removal or update, reducing bounce rates and ensuring communications reach the right people.