SlideShare a Scribd company logo
1
Marc Linster, Ph.D.
SENIOR VICE PRESIDENT, PRODUCT DEVELOPMENT
EnterpriseDB
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
2
AGENDA
What is GDPR?
Database software
requirements
Key GDPR articles
EDB Postgres or PostgreSQL
Working with EDB
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
3
GENERALIZED DATA
PROTECTION REGULATION
EUROPEAN REGULATION
• Replacing Data Protection
Directive (95/46/EC)
• Applicable to organizations
that offer goods and services
in the EU
• Or collect/analyze data about
EU residents
• Not limited to EU companies
or organizations
TAKE NOTE
• Effective May 25, 2018,
114 days and counting
• Focuses on Personally
Identifiable Information (PII):
Names, pictures, email, phone number,
birth dates
• Differentiates between
Controllers and Processors
• Regulation has teeth:
Significant fines
• More details:
https://www.eugdpr.org
GDPR is not explicit about technical implementation and best practices are still emerging…
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
4
GDPR AND THE
DATABASE VENDOR
AUDITED AND ROBUST CAPABILITIES TO
MANAGE DATA SECURELY AND SAFELY
MOSTLY BUSINESS AS USUAL
• High Availability/Disaster Recovery
• Robust authentication and password management
• Role based access control to the data
• Encryption at rest and in transit
• Auditing
• SQL Injection Attack Protection
• Data redaction
COMMON SENSE FOR THE ENTERPRISE DBA
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
5
GDPR ARTICLES THAT DESERVE
YOUR ATTENTION
ARTICLE 17 Right to be forgotten, i.e., the right to erasure
http://www.privacy-regulation.eu/en/article-17-right-to-erasure-'right-to-be-forgotten'-GDPR.htm
ARTICLE 20 Right to data portability
http://www.privacy-regulation.eu/en/article-20-right-to-data-portability-GDPR.htm
ARTICLE 25 Data protection by design and by default
http://www.privacy-regulation.eu/en/article-25-data-protection-by-design-and-by-default-GDPR.htm
ARTICLE 32 Security of processing
http://www.privacy-regulation.eu/en/article-32-security-of-processing-GDPR.htm
ARTICLE 33 Notification of breach to the supervisory authority
http://www.privacy-regulation.eu/en/article-33-notification-of-a-personal-data-breach-to-the-supervisory-authority-GDPR.htm
ARTICLE 34 Notification of breach to the data subjecthttp://www.privacy-regulation.eu/en/article-34-communication-of-a-personal-data-breach-to-the-data-subject-GDPR.htm
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
6
ARTICLE 17:
RIGHT TO BE FORGOTTEN
“The data subject shall have the right to obtain
from the controller the erasure of personal data
concerning him or her without undue delay and
the controller shall have the obligation to erase
personal data without undue delay.”
GDPR is not explicit about technical implementation and best practices are still emerging…
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
REALLY
‘RIGHT TO ERASURE’
• DATA SUBJECT ASKED TO BE FORGOTTEN
• Withdrew consent
• The data is no longer necessary for its purpose
• Or other reason
• Can ‘erasure’ time frame coincide with the data retention period?
7
ARTICLE 17:
RIGHT TO BE FORGOTTEN
“The data subject shall have the right to obtain
from the controller the erasure of personal data
concerning him or her without undue delay and
the controller shall have the obligation to erase
personal data without undue delay.”
•This invalidates the backups, WALs and PITR capabilities
•Potentially conflicts with Article 32 (Security of Processing) as it
invalidates backups
DO WE ERASE THE DATA FROM BACKUPS?
•Collect all data subjects that want to be erased in a script that is run
after a database restore
DO WE ERASE DATA AFTER RESTORATION?
•Log only non-PII data (if possible)
•Encrypt all logs with PII
•Expire and securely erase logs as soon as possible
HOW DO WE DEAL WITH LOGS?
GDPR is not explicit about technical implementation and best practices are still emerging…
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
8
ARTICLE 20:
RIGHT TO DATA
PORTABILITY
GDPR is not explicit about technical implementation and best practices are still emerging…
Data subject can request their
data in a commonly used
machine readable format
Consider using JSONB, XML,
or CSV to export query results
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
9
ARTICLE 25 - DATA PROTECTION
BY DESIGN AND BY DEFAULT
DATA MINIMIZATION
• Keep as little PII as possible
• Keep it for as short a time as
possible
DATA
PSEUDONYMISATION
• Separate the PII (e.g., name,
etc.) from the facts (e.g., what
was bought when from which
merchant) to minimize risk of
breach of PII during data
processing or statistical
evaluation
• Tightly manage access to
and encrypt PII
Beware of possible re-identification
(87% of the US population can be identified using zip code, sex and age)
(a.k.a. Privacy by Design)
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
ARTICLE 32 – SECURITY
OF PROCESSING
10
Access control, password
profiles
ACID Transactional
Redaction and data masking
Very explicit technical instructions Disk level or column level encryption
High Availability
Disaster Recovery
Process
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.10
• Pseudonymisation and encryption of personal data
• Ability to ensure the ongoing confidentiality, integrity,
availability and resilience of processing systems and
services
• Ability to restore the availability and access to personal
data in a timely manner in the event of a physical or
technical incident
• Process for regularly testing, assessing and evaluating the
effectiveness of technical and organizational measures for
ensuring the security of the processing
SECURITY CONSIDERATIONS:
A MULTI-LAYER APPROACH
11
DB Host
Database files
Data
base
Data
base
Data
baseData access control:
• Tables
• Columns
• Rows
• Views
• Security barriers
DB Server
Authentication:
• Users
• Roles
• Password profiles
Data Center Physical access
Host access
DB Server network
access
File system encryption
Data file encryption
Data encryption
• Column based
encryption
DML/DDL Auditing
SQL Injection Attack
Prevention
Encryption in transit
Data
redaction/masking
Key
Management
System
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
12
Using views, functions, roles and
search paths definitions
Username [enterprisedb]: privilegeduser
mycompany=> select * from employees;
id | name | ssn | phone | birthday
----+--------------+-------------+------------+--------------------
1 | Sally Sample | 020-78-9345 | 5081234567 | 02-FEB-61 00:00:00
1 | Jane Doe | 123-33-9345 | 6171234567 | 14-FEB-63 00:00:00
1 | Bill Foo | 123-89-9345 | 9781234567 | 14-FEB-63 00:00:00
(3 rows)
Username [enterprisedb]: redacteduser
mycompany=> select * from employees;
id | name | ssn | phone | birthday
----+--------------+-------------+------------+--------------------
1 | Sally Sample | xxx-xx-9345 | 5081234567 | 02-FEB-02 00:00:00
1 | Jane Doe | xxx-xx-9345 | 6171234567 | 14-FEB-02 00:00:00
1 | Bill Foo | xxx-xx-9345 | 9781234567 | 14-FEB-02 00:00:00
(3 rows)
DATA REDACTION USING
POSTGRES TECHNIQUES
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
INTEGRITY AND RESILIENCE:
HA AND DR AT WORK
13
GDPR requires integrity, availability
and resilience
Combine HA, DR and Monitoring
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
14
ARTICLES 33 AND 34:
NOTIFICATION OF BREACH
DETECTION OF BREACH
• Auditing
• SQL Injection Attack detection
NOTIFICATION IS NOT REQUIRED
• Article 33: “… if the personal data breach is unlikely to result in a risk for the rights and freedoms
of natural persons”
• Article 34: “… the controller has “implemented appropriate technical and organizational protection
measures” that “render the data unintelligible to any person who is not authorized to access it,
such as encryption”
ENCRYPTION OF THE DATA IS KEY – BUT ITS NOT A PANACEA
• Data encryption must be combined with physical security, authentication, encryption at rest,
auditing and access control
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
15
Self-Supported
PostgreSQL
Password Management Not available
Authorization PostgreSQL RLS
Auditing Limited audit
capabilities
SQL Injection Attacks Not available
Encryption at Rest
DIY
24/7 Support DIY
HA/DR
Multiple open
source tools
Data Redaction
DIY
Secure Configuration
Best Practices
DIY
EDB POSTGRES OR SELF-SUPPORTED PostgreSQL?
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
16
Self-Supported
PostgreSQL
EDB Postgres
Password Management Not available EDB Password Profiles
Authorization PostgreSQL RLS EDB Virtual Private Database
Auditing Limited audit
capabilities
EPAS Audit with DML auditing for INSERT, UPDATE, DELETE, TRUNCATE by user and
database, syslog integration, etc. Manage audit logs separately from server logs
SQL Injection Attacks Not available EDB SQL/Protect
Encryption at Rest
DIY
Proven full-disk encryption procedure
Extension of pgCrypto to support secure key management
24/7 Support DIY Enterprise level SLA support with direct access to Postgres community leaders
HA/DR
Multiple open
source tools
EDB Management Tool Suite:
EDB Failover Manager
EDB Backup and Recovery
EDB Postgres Enterprise Manager
Data Redaction
DIY
Custom Data Views
EPAS 11: Built-in data redaction
Secure Configuration
Best Practices
DIY
EDB Postgres Advanced Server Secure Technology
Implementation Guideline (http://iase.disa.mil)
EDB POSTGRES OR SELF-SUPPORTED PostgreSQL?
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
17
5 WAYS FOR THE DBA TO BE
POSTGRES GDPR-READY
1. Read the GDPR, consult with peers and
get advice
2. Are you a Processor or a Controller?
3. Create an inventory of the information
subject to GDPR
•What do you have? Where is it? Who has access?
VALIDATE, VALIDATE, VALIDATE, VALIDATE…..
GDPR is not explicit about
technical implementation and
best practices are still
emerging…
4. Key Decisions
• Is the data needed? Anything you can get rid of?
• Are the servers protected (physical access, network access, host
access, authentication)
• Is the data protected (ACLs, encryption in transit and at rest)?
• Are the servers backed up, highly available and covered by enterprise-
level support?
• Is the right auditing in place?
• Can you leverage data redaction, data masking, and
pseudonymisation to further limit access to sensitive data?
5. Process to identify breaches (unauthorized access) and notification;
Process to implement ‘right to erasure’
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
18
NEXT STEPS
Discuss your
Postgres
infrastructure
with EDB
• Reliable,
robust and
secure
• Well supported
Leverage EDB’s
free training to
make sure your
team is up to
speed
Get your team
Postgres
Certified
Move from self-
supported
Postgres to
EDB Postgres
Get best practice
advice and
leverage best-of
breed
infrastructure to
create a secure,
safe, audited,
and robust data
management
capability
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
Contact us at info@EnterpriseDB.com
info@enterprisedb.com
Questions?
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
THANK YOU
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.

More Related Content

PPTX
Chapter 1 Law & Ethics
PDF
netconf and yang
PDF
Chapter 1 Introduction to Cloud Computing
PPT
Legal issues in cloud computing
PPT
Chapter14
PPTX
cloud computing models
PPTX
Big data ppt
PDF
Hadoop Ecosystem
Chapter 1 Law & Ethics
netconf and yang
Chapter 1 Introduction to Cloud Computing
Legal issues in cloud computing
Chapter14
cloud computing models
Big data ppt
Hadoop Ecosystem

What's hot (20)

PPT
PPTX
Network Connecting Devices UNIT 5
PDF
Enterprise Data Management Framework Overview
PPTX
Networking threads
PPTX
Big Data Analytics | What Is Big Data Analytics? | Big Data Analytics For Beg...
PPT
OSI Network Reference Model
PDF
Data Modeling Fundamentals
DOC
Centralized vs distrbution system
PPT
Data quality and bi
PDF
Webinar Data Mesh - Part 3
PPTX
Major issues in data mining
PPTX
Fog computing ( foggy cloud)
PDF
Essential Reference and Master Data Management
PDF
Data Mesh for Dinner
PPT
Hive(ppt)
PPTX
Is cambodia ready for AI?
PPTX
DOC
Mirth Connect as Interface Engine Case Study v2
PPT
data acquisition in computer forensics and
PPTX
Webofthing_WOT_vs_IOT.pptx
Network Connecting Devices UNIT 5
Enterprise Data Management Framework Overview
Networking threads
Big Data Analytics | What Is Big Data Analytics? | Big Data Analytics For Beg...
OSI Network Reference Model
Data Modeling Fundamentals
Centralized vs distrbution system
Data quality and bi
Webinar Data Mesh - Part 3
Major issues in data mining
Fog computing ( foggy cloud)
Essential Reference and Master Data Management
Data Mesh for Dinner
Hive(ppt)
Is cambodia ready for AI?
Mirth Connect as Interface Engine Case Study v2
data acquisition in computer forensics and
Webofthing_WOT_vs_IOT.pptx
Ad

Similar to 5 Ways to Make Your Postgres GDPR-Ready (20)

PPTX
Creating a Multi-Layered Secured Postgres Database
 
PDF
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
PDF
Best Practices in Security with PostgreSQL
 
PPTX
Best Practices in Security with PostgreSQL
 
PPTX
Enterprise-class security with PostgreSQL - 1
PDF
Best Practices in Security with PostgreSQL
 
PDF
Achieving Pci Compliace
PPTX
Data protection and privacy in the world of database DevOps
PPTX
GDPR Benefits and a Technical Overview
PPTX
PostgreSQL Security. How Do We Think?
PPTX
PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...
PPTX
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
DOCX
Database Security – Issues and Best PracticesOutline
PPTX
Is Encryption the Only Key to GDPR?
PPTX
Database security
PDF
databasesecurit-phpapp01.pdf
PDF
uu (2).pdf
PDF
Data- and database security & GDPR: end-to-end offer
PDF
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
PDF
Microsoft SQL Family and GDPR
Creating a Multi-Layered Secured Postgres Database
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
 
Best Practices in Security with PostgreSQL
 
Enterprise-class security with PostgreSQL - 1
Best Practices in Security with PostgreSQL
 
Achieving Pci Compliace
Data protection and privacy in the world of database DevOps
GDPR Benefits and a Technical Overview
PostgreSQL Security. How Do We Think?
PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
Database Security – Issues and Best PracticesOutline
Is Encryption the Only Key to GDPR?
Database security
databasesecurit-phpapp01.pdf
uu (2).pdf
Data- and database security & GDPR: end-to-end offer
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Microsoft SQL Family and GDPR
Ad

More from EDB (20)

PDF
Cloud Migration Paths: Kubernetes, IaaS, or DBaaS
 
PDF
Die 10 besten PostgreSQL-Replikationsstrategien für Ihr Unternehmen
 
PDF
Migre sus bases de datos Oracle a la nube
 
PDF
EFM Office Hours - APJ - July 29, 2021
 
PDF
Benchmarking Cloud Native PostgreSQL
 
PDF
Las Variaciones de la Replicación de PostgreSQL
 
PDF
NoSQL and Spatial Database Capabilities using PostgreSQL
 
PDF
Is There Anything PgBouncer Can’t Do?
 
PDF
Data Analysis with TensorFlow in PostgreSQL
 
PDF
Practical Partitioning in Production with Postgres
 
PDF
A Deeper Dive into EXPLAIN
 
PDF
IOT with PostgreSQL
 
PDF
A Journey from Oracle to PostgreSQL
 
PDF
Psql is awesome!
 
PDF
EDB 13 - New Enhancements for Security and Usability - APJ
 
PPTX
Comment sauvegarder correctement vos données
 
PDF
Cloud Native PostgreSQL - Italiano
 
PDF
New enhancements for security and usability in EDB 13
 
PDF
Cloud Native PostgreSQL - APJ
 
PDF
EDB Postgres & Tools in a Smart City Project
 
Cloud Migration Paths: Kubernetes, IaaS, or DBaaS
 
Die 10 besten PostgreSQL-Replikationsstrategien für Ihr Unternehmen
 
Migre sus bases de datos Oracle a la nube
 
EFM Office Hours - APJ - July 29, 2021
 
Benchmarking Cloud Native PostgreSQL
 
Las Variaciones de la Replicación de PostgreSQL
 
NoSQL and Spatial Database Capabilities using PostgreSQL
 
Is There Anything PgBouncer Can’t Do?
 
Data Analysis with TensorFlow in PostgreSQL
 
Practical Partitioning in Production with Postgres
 
A Deeper Dive into EXPLAIN
 
IOT with PostgreSQL
 
A Journey from Oracle to PostgreSQL
 
Psql is awesome!
 
EDB 13 - New Enhancements for Security and Usability - APJ
 
Comment sauvegarder correctement vos données
 
Cloud Native PostgreSQL - Italiano
 
New enhancements for security and usability in EDB 13
 
Cloud Native PostgreSQL - APJ
 
EDB Postgres & Tools in a Smart City Project
 

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Empathic Computing: Creating Shared Understanding
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation theory and applications.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
MIND Revenue Release Quarter 2 2025 Press Release
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation_ Review paper, used for researhc scholars
Assigned Numbers - 2025 - Bluetooth® Document
Empathic Computing: Creating Shared Understanding
Diabetes mellitus diagnosis method based random forest with bat algorithm
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation theory and applications.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Spectroscopy.pptx food analysis technology
Digital-Transformation-Roadmap-for-Companies.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Advanced methodologies resolving dimensionality complications for autism neur...

5 Ways to Make Your Postgres GDPR-Ready

  • 1. 1 Marc Linster, Ph.D. SENIOR VICE PRESIDENT, PRODUCT DEVELOPMENT EnterpriseDB © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 2. 2 AGENDA What is GDPR? Database software requirements Key GDPR articles EDB Postgres or PostgreSQL Working with EDB © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 3. 3 GENERALIZED DATA PROTECTION REGULATION EUROPEAN REGULATION • Replacing Data Protection Directive (95/46/EC) • Applicable to organizations that offer goods and services in the EU • Or collect/analyze data about EU residents • Not limited to EU companies or organizations TAKE NOTE • Effective May 25, 2018, 114 days and counting • Focuses on Personally Identifiable Information (PII): Names, pictures, email, phone number, birth dates • Differentiates between Controllers and Processors • Regulation has teeth: Significant fines • More details: https://www.eugdpr.org GDPR is not explicit about technical implementation and best practices are still emerging… © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 4. 4 GDPR AND THE DATABASE VENDOR AUDITED AND ROBUST CAPABILITIES TO MANAGE DATA SECURELY AND SAFELY MOSTLY BUSINESS AS USUAL • High Availability/Disaster Recovery • Robust authentication and password management • Role based access control to the data • Encryption at rest and in transit • Auditing • SQL Injection Attack Protection • Data redaction COMMON SENSE FOR THE ENTERPRISE DBA © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 5. 5 GDPR ARTICLES THAT DESERVE YOUR ATTENTION ARTICLE 17 Right to be forgotten, i.e., the right to erasure http://www.privacy-regulation.eu/en/article-17-right-to-erasure-'right-to-be-forgotten'-GDPR.htm ARTICLE 20 Right to data portability http://www.privacy-regulation.eu/en/article-20-right-to-data-portability-GDPR.htm ARTICLE 25 Data protection by design and by default http://www.privacy-regulation.eu/en/article-25-data-protection-by-design-and-by-default-GDPR.htm ARTICLE 32 Security of processing http://www.privacy-regulation.eu/en/article-32-security-of-processing-GDPR.htm ARTICLE 33 Notification of breach to the supervisory authority http://www.privacy-regulation.eu/en/article-33-notification-of-a-personal-data-breach-to-the-supervisory-authority-GDPR.htm ARTICLE 34 Notification of breach to the data subjecthttp://www.privacy-regulation.eu/en/article-34-communication-of-a-personal-data-breach-to-the-data-subject-GDPR.htm © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 6. 6 ARTICLE 17: RIGHT TO BE FORGOTTEN “The data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay.” GDPR is not explicit about technical implementation and best practices are still emerging… © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved. REALLY ‘RIGHT TO ERASURE’ • DATA SUBJECT ASKED TO BE FORGOTTEN • Withdrew consent • The data is no longer necessary for its purpose • Or other reason • Can ‘erasure’ time frame coincide with the data retention period?
  • 7. 7 ARTICLE 17: RIGHT TO BE FORGOTTEN “The data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay.” •This invalidates the backups, WALs and PITR capabilities •Potentially conflicts with Article 32 (Security of Processing) as it invalidates backups DO WE ERASE THE DATA FROM BACKUPS? •Collect all data subjects that want to be erased in a script that is run after a database restore DO WE ERASE DATA AFTER RESTORATION? •Log only non-PII data (if possible) •Encrypt all logs with PII •Expire and securely erase logs as soon as possible HOW DO WE DEAL WITH LOGS? GDPR is not explicit about technical implementation and best practices are still emerging… © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 8. 8 ARTICLE 20: RIGHT TO DATA PORTABILITY GDPR is not explicit about technical implementation and best practices are still emerging… Data subject can request their data in a commonly used machine readable format Consider using JSONB, XML, or CSV to export query results © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 9. 9 ARTICLE 25 - DATA PROTECTION BY DESIGN AND BY DEFAULT DATA MINIMIZATION • Keep as little PII as possible • Keep it for as short a time as possible DATA PSEUDONYMISATION • Separate the PII (e.g., name, etc.) from the facts (e.g., what was bought when from which merchant) to minimize risk of breach of PII during data processing or statistical evaluation • Tightly manage access to and encrypt PII Beware of possible re-identification (87% of the US population can be identified using zip code, sex and age) (a.k.a. Privacy by Design) © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 10. ARTICLE 32 – SECURITY OF PROCESSING 10 Access control, password profiles ACID Transactional Redaction and data masking Very explicit technical instructions Disk level or column level encryption High Availability Disaster Recovery Process © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.10 • Pseudonymisation and encryption of personal data • Ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services • Ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident • Process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing
  • 11. SECURITY CONSIDERATIONS: A MULTI-LAYER APPROACH 11 DB Host Database files Data base Data base Data baseData access control: • Tables • Columns • Rows • Views • Security barriers DB Server Authentication: • Users • Roles • Password profiles Data Center Physical access Host access DB Server network access File system encryption Data file encryption Data encryption • Column based encryption DML/DDL Auditing SQL Injection Attack Prevention Encryption in transit Data redaction/masking Key Management System © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 12. 12 Using views, functions, roles and search paths definitions Username [enterprisedb]: privilegeduser mycompany=> select * from employees; id | name | ssn | phone | birthday ----+--------------+-------------+------------+-------------------- 1 | Sally Sample | 020-78-9345 | 5081234567 | 02-FEB-61 00:00:00 1 | Jane Doe | 123-33-9345 | 6171234567 | 14-FEB-63 00:00:00 1 | Bill Foo | 123-89-9345 | 9781234567 | 14-FEB-63 00:00:00 (3 rows) Username [enterprisedb]: redacteduser mycompany=> select * from employees; id | name | ssn | phone | birthday ----+--------------+-------------+------------+-------------------- 1 | Sally Sample | xxx-xx-9345 | 5081234567 | 02-FEB-02 00:00:00 1 | Jane Doe | xxx-xx-9345 | 6171234567 | 14-FEB-02 00:00:00 1 | Bill Foo | xxx-xx-9345 | 9781234567 | 14-FEB-02 00:00:00 (3 rows) DATA REDACTION USING POSTGRES TECHNIQUES © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 13. INTEGRITY AND RESILIENCE: HA AND DR AT WORK 13 GDPR requires integrity, availability and resilience Combine HA, DR and Monitoring © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 14. 14 ARTICLES 33 AND 34: NOTIFICATION OF BREACH DETECTION OF BREACH • Auditing • SQL Injection Attack detection NOTIFICATION IS NOT REQUIRED • Article 33: “… if the personal data breach is unlikely to result in a risk for the rights and freedoms of natural persons” • Article 34: “… the controller has “implemented appropriate technical and organizational protection measures” that “render the data unintelligible to any person who is not authorized to access it, such as encryption” ENCRYPTION OF THE DATA IS KEY – BUT ITS NOT A PANACEA • Data encryption must be combined with physical security, authentication, encryption at rest, auditing and access control © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 15. 15 Self-Supported PostgreSQL Password Management Not available Authorization PostgreSQL RLS Auditing Limited audit capabilities SQL Injection Attacks Not available Encryption at Rest DIY 24/7 Support DIY HA/DR Multiple open source tools Data Redaction DIY Secure Configuration Best Practices DIY EDB POSTGRES OR SELF-SUPPORTED PostgreSQL? © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 16. 16 Self-Supported PostgreSQL EDB Postgres Password Management Not available EDB Password Profiles Authorization PostgreSQL RLS EDB Virtual Private Database Auditing Limited audit capabilities EPAS Audit with DML auditing for INSERT, UPDATE, DELETE, TRUNCATE by user and database, syslog integration, etc. Manage audit logs separately from server logs SQL Injection Attacks Not available EDB SQL/Protect Encryption at Rest DIY Proven full-disk encryption procedure Extension of pgCrypto to support secure key management 24/7 Support DIY Enterprise level SLA support with direct access to Postgres community leaders HA/DR Multiple open source tools EDB Management Tool Suite: EDB Failover Manager EDB Backup and Recovery EDB Postgres Enterprise Manager Data Redaction DIY Custom Data Views EPAS 11: Built-in data redaction Secure Configuration Best Practices DIY EDB Postgres Advanced Server Secure Technology Implementation Guideline (http://iase.disa.mil) EDB POSTGRES OR SELF-SUPPORTED PostgreSQL? © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 17. 17 5 WAYS FOR THE DBA TO BE POSTGRES GDPR-READY 1. Read the GDPR, consult with peers and get advice 2. Are you a Processor or a Controller? 3. Create an inventory of the information subject to GDPR •What do you have? Where is it? Who has access? VALIDATE, VALIDATE, VALIDATE, VALIDATE….. GDPR is not explicit about technical implementation and best practices are still emerging… 4. Key Decisions • Is the data needed? Anything you can get rid of? • Are the servers protected (physical access, network access, host access, authentication) • Is the data protected (ACLs, encryption in transit and at rest)? • Are the servers backed up, highly available and covered by enterprise- level support? • Is the right auditing in place? • Can you leverage data redaction, data masking, and pseudonymisation to further limit access to sensitive data? 5. Process to identify breaches (unauthorized access) and notification; Process to implement ‘right to erasure’ © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 18. 18 NEXT STEPS Discuss your Postgres infrastructure with EDB • Reliable, robust and secure • Well supported Leverage EDB’s free training to make sure your team is up to speed Get your team Postgres Certified Move from self- supported Postgres to EDB Postgres Get best practice advice and leverage best-of breed infrastructure to create a secure, safe, audited, and robust data management capability © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved. Contact us at info@EnterpriseDB.com
  • 19. info@enterprisedb.com Questions? © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 20. THANK YOU © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.

Editor's Notes

  • #20: Where are we headed. What are issues. Should talk to team.