Secure Environment for Regulated Research Data
Reflecting MSU’s commitment to research security compliance, MSU’s Information Technology Services (ITS), the MSU Research Security Committee, and the University Research Organization (URO) established the Michigan State University Regulated Research Enclave (RRE), an access-restricted computing environment designed to support research projects that involve Controlled Unclassified Information (CUI) and other regulated or sponsor-controlled data. The RRE is designed to align with NIST SP 800-171 Rev. 2 requirements for protecting CUI in nonfederal systems and organizations.
Compliance Status
MSU has completed a CMMC Level 2 Self-Assessment, completed a successful independent CMMC Certified Third-Party Assessor Organization (C3PAO) CMMC Level 2 mock assessment, and is preparing for an independent C3PAO CMMC Level 2 certification assessment.
When You Should Use the RRE
The RRE is appropriate when your project includes:
- Controlled Unclassified Information (CUI) including data marked or treated as CUI by a sponsor or partner.
- Sponsor-controlled technical data or research data with restricted sharing requirements.
- Regulated datasets requiring enhanced access controls, monitoring, and auditability.
Projects are determined to belong in the RRE during the proposal submission/award process or through the MSU Technologies agreements team. For questions, please contact ResearchSecurity@msu.edu.
What the RRE Provides
Researchers and sponsors can expect:
- An environment designed to meet CMMC Level 2 requirements.
- Restricted access to authorized users only.
- A controlled workspace for processing and storing regulated research information.
- Enhanced monitoring and logging to support compliance and accountability.
- Encryption for data in transit and at rest.
Platform and environment
The RRE operates within Microsoft 365 GCC High and Azure Government (GovCloud). Researchers access the enclave through a secured, locked-down virtual machine (VM) workspace designed to restrict access and help ensure regulated data remains within the approved environment.
How Access Works
Access is granted based on project need and approval. Users must follow enclave requirements for identity, device, and workspace use. Data must remain within approved services and workflows.
Policies and Expectations
The RRE is governed by institutional security and research data handling policies appropriate for regulated research. Users are expected to follow requirements for access control, data handling, collaboration, and incident reporting to protect sponsor and university interests.
Questions
For questions about the Regulated Research Enclave, please contact ResearchSecurity@msu.edu.