SlideShare a Scribd company logo
Data protection and privacy in the world of database DevOps
Data protection & privacy in the
world of database DevOps
Grant Fritchey
www.scarydba.com
grant@scarydba.com
@GFritchey
www.linkedin.com/in/scarydba
Agenda
• What is DevOps?
• Extending DevOps to databases
• Impact of database DevOps on data governance and
compliance
• James Boother – Sales & Marketing Director, Coeo
What is DevOps
“DevOps is the union of people,
process, and products to enable
continuous delivery of value to our
end users.”
Donovan Brown,
Principal DevOps Program Manager, Microsoft
Extending DevOps to databases
• Business-critical data needs to be safely and correctly preserved
• Databases carry state that needs to be managed as part of
rolling out new or updating existing software
Benefits of Database DevOps
• Databases are in sync with application development
• Reliable traceability of database changes
• Removal of the database bottleneck in agile delivery processes
• Frequent releases, requiring less dev and DBA time
• Audit trail of who has accessed what data, when and where
Impact of DevOps on Data Governance
64% of respondents said
DevOps had a positive
impact on Data Governance
& Compliance
Database DevOps as a foundation for compliance
• Monitoring - a key component for resilience
• Change control & testing - reliable, repeatable, consistent
• Provisioning and masking - compliant distribution of data
• Automation - a durable and consistent audit trail
James Boother
Sales & Marketing Director
Coeo
blog.coeo.com
james@coeo.com
@jimmyboo
www.linkedin.com/in/JamesBoo
ther
What is GDPR?
Common myths
Mapping GDPR to DevOps
Next steps
Q&A
Agenda
What is GDPR?
Mutually agreed European
General Data Protection
Regulation (GDPR)
Will come into force on May 25
2018
Replaces the 1995 data
protection regulation.
Supersedes the UK Data
Protection Act 1998
Any organisation operating
within Europe needs to adhere
What is GDPR?
http://eur-lex.europa.eu/legal-
content/EN/TXT/PDF/?uri=CELEX:32016R0679
&from=EN
The right to be informed
The right of access
The right to rectification
The right to erasure
The right to restrict processing
The right to data portability
The right to object
Rights related to automated decision making
and profiling
Individual’s rights
Name
Identification number
Email address
Online user identifier
Social media posts
Physical, physiological, or genetic
information
Medical information
Location
Bank details
IP address
Cookies
Examples of personal data covered by GDPR
https://aka.ms/gdprsqlwhitepaper
Penalties
Size of offence Penalty
Small Up to €10 million or 2%
global turnover
Serious Consequences Up to €20 million or 4%
global turnover
Current UK Up to £500,000
Elizabeth Denham, the UK's information
commissioner, says
"The GDPR is a step change for data
protection,"
"It's still an evolution, not a revolution".
Words of advice from the ICO
ICO 12 step process
https://ico.org.uk/media/for-
organisations/documents/1624219/preparing-for-the-gdpr-12-steps.pdf
1. Awareness
2. Information you hold
3. Communicating privacy information
4. Individuals’ rights
5. Subject access requests
6. Lawful basis for processing personal data
7. Consent
8. Children
9. Data breaches
10. Data protection by design and data
protection impact awareness
11. Data projection officers
12. International
Common Myths
Myth #1
I can’t comply with
GDPR and use
DevOps
Click to edit Master title styleMyth #1 - Mapping GDPR to DevOps
- Users have access only to the data needed
- Implement data protection by design and by
default
- Test for security regressions such as
unprotected PII data
- Identifying code-level security regressions such
as code that returns data to non-privileged
users
- Use Generated sample data or Dynamic
data masking instead of copying un-
sanitized production data into non-
production environments
- PII data is encrypted or pseudo-anonymised
- Users have the right level of access
- Encrypted connections using TLS or Always
Encrypted
- Dynamic Data Masking
- Row-level Security
- Sysadmin access for DBAs
- Restricted access for everyone else
- Audit access and ability to identify
compromised data
- Encrypted backups
- Removing data from backups
Myth #2
I only need to worry
about production
Click to edit Master title styleMyth #2 – Identifying all of the Personal Data you hold
https://docs.microsoft.com/en-us/azure/sql-database/sql-vulnerability-assessment
Myth #3
Holding data in
Azure prevents me
from complying with
GDPR
Click to edit Master title styleMyth #3 – Azure advanced data protection features
Feature SQLDB SQL Server
Vulnerability Assessment  Coming soon
TDE On by default Available in Enterprise
Threat detection 
Auditing  
Dynamic data masking  
Always encrypted  
Encrypted connections  
AAD User login with MFA  (With SSMS 17)
Next steps
Technical readiness
Create a repeatable
deployment process
Setup monitoring of
access to the
environments
Remediate any
technical risks identified
during the assessment
Next Steps
Compliance readiness
Nominate a Data
Protection Officer
Assess your
environment
Identify the personal
data across all
environments
Prepare a breach
response plan
Two Work Streams:
Further reading
Topic Blog post
Introducing Always Encrypted https://blog.coeo.com/mattrobertshaw/2
017/05/08/introducing-always-encrypted
Securing connections to SQL Server with
TLS
https://blog.coeo.com/securing-
connections-to-sql-server-with-tls
How Vulnerable is Your Data? Stop
Malware Attacks using Azure SQL
Database
https://blog.coeo.com/how-vulnerable-
is-your-data-stop-malware-attacks-
using-azure-sql-database
The GDPR and You https://www.scarydba.com/2017/11/13/th
e-gdpr-and-you/
Q&A

More Related Content

PDF
7 Key GDPR Requirements & the Role of Data Governance
PDF
The Rise of Data Ethics and Security - AIDI Webinar
PPTX
General Data Protection Regulation (GDPR)
PPTX
GDPR How to get started?
PPTX
EU's General Data Protection Regulation (GDPR)
PDF
Addressing analytics, data warehouse and Big Data challenges beyond database ...
PDF
Data security and privacy
PPTX
Cloud Compliance Auditing - Closer 2011
7 Key GDPR Requirements & the Role of Data Governance
The Rise of Data Ethics and Security - AIDI Webinar
General Data Protection Regulation (GDPR)
GDPR How to get started?
EU's General Data Protection Regulation (GDPR)
Addressing analytics, data warehouse and Big Data challenges beyond database ...
Data security and privacy
Cloud Compliance Auditing - Closer 2011

What's hot (20)

PDF
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
PDF
Building the Governance Ready Enterprise for GDPR Compliance December 2017
PDF
Boldon James - How Data Classification can harness the power of Big Data
PDF
Urgensi RUU Perlindungan Data Pribadi
PDF
Cross border - off-shoring and outsourcing privacy sensitive data
PDF
Data Privacy Readiness Test
PDF
Building the Governance Ready Enterprise for GDPR Compliance
PDF
Practical steps to GDPR compliance
PPTX
How to turn GDPR into a Strategic Advantage using Connected Data
PPTX
GDPR & Your Cloud Provider - What You Need to Know
PDF
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
PDF
GDPR Compliance
PDF
Cloud Auditing
PPTX
The EU General Protection Regulation and how Oracle can help
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PDF
Wp security-data-safe
PPT
How Network Data Loss Prevention is Implemented
PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
PPTX
GDPR Part 2: Quest Relevance
PPTX
Data Protection Forum meetup 23052017
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Boldon James - How Data Classification can harness the power of Big Data
Urgensi RUU Perlindungan Data Pribadi
Cross border - off-shoring and outsourcing privacy sensitive data
Data Privacy Readiness Test
Building the Governance Ready Enterprise for GDPR Compliance
Practical steps to GDPR compliance
How to turn GDPR into a Strategic Advantage using Connected Data
GDPR & Your Cloud Provider - What You Need to Know
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
GDPR Compliance
Cloud Auditing
The EU General Protection Regulation and how Oracle can help
Technology Overview - Symantec Data Loss Prevention (DLP)
Wp security-data-safe
How Network Data Loss Prevention is Implemented
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR Part 2: Quest Relevance
Data Protection Forum meetup 23052017
Ad

Similar to Data protection and privacy in the world of database DevOps (20)

PPT
Dstca
PDF
Microsoft Office 365 Security and Compliance
PDF
Cloud Computing
PDF
Big Data LDN 2017: Applied AI for GDPR
PDF
SureSkills GDPR - Discover the Smart Solution
PPTX
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
PPTX
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
PDF
PREPARING FOR THE GDPR
PDF
Office 365 Security, Privacy and Compliance - SMB Nation 2015
PPT
Database auditing essentials
PPTX
How Vulnerable is Your Critical Data?
PDF
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
PPSX
Shield db data security
PPSX
Shield db data security
PPSX
Shield db data security
PDF
Safeguarding Sensitive Data with Encryption
PDF
Bridging the Data Security Gap
PPTX
Observe it v67 webinar v5
PPT
Life After Compliance march 2010 v2
Dstca
Microsoft Office 365 Security and Compliance
Cloud Computing
Big Data LDN 2017: Applied AI for GDPR
SureSkills GDPR - Discover the Smart Solution
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
PREPARING FOR THE GDPR
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Database auditing essentials
How Vulnerable is Your Critical Data?
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
Shield db data security
Shield db data security
Shield db data security
Safeguarding Sensitive Data with Encryption
Bridging the Data Security Gap
Observe it v67 webinar v5
Life After Compliance march 2010 v2
Ad

More from Red Gate Software (20)

PDF
The future of DevOps: fully left-shifted deployments with version control and...
PDF
Embracing DevOps through database migrations with Flyway
PPTX
Database DevOps for Managed Service Providers
PDF
Mizuho Financial: Launching our Database DevOps journey
PDF
7 steps to effective SQL Server monitoring
PDF
Level up your deployments for SQL Source Control
PDF
Key findings from the 2020 state of database dev ops report
PPTX
Extend DevOps to Your SQL Server Databases
PDF
2019 year in review slides
PPTX
What we learned at PASS Summit in 2019
PPTX
Quality in Software Development: Anglia Ruskin University
PPTX
How SQL Change Automation helps you deliver value faster
PPTX
DevOps essentials from Abel Wang and Steve Jones
PPTX
Successfully migrating existing databases to Azure
PPTX
The Ultimate Guide to Choosing and Implementing the Right Monitoring Tool
PDF
Everything You Need to Know About the 2019 DORA Accelerate State of DevOps Re...
PDF
Using Redgate, AKS and Azure to bring DevOps to your database
PDF
Using Redgate, AKS and Azure to bring DevOps to your Database
PDF
How to Pitch a Software Development Initiative and Ignite Culture Change
PDF
Taming the Wild West
The future of DevOps: fully left-shifted deployments with version control and...
Embracing DevOps through database migrations with Flyway
Database DevOps for Managed Service Providers
Mizuho Financial: Launching our Database DevOps journey
7 steps to effective SQL Server monitoring
Level up your deployments for SQL Source Control
Key findings from the 2020 state of database dev ops report
Extend DevOps to Your SQL Server Databases
2019 year in review slides
What we learned at PASS Summit in 2019
Quality in Software Development: Anglia Ruskin University
How SQL Change Automation helps you deliver value faster
DevOps essentials from Abel Wang and Steve Jones
Successfully migrating existing databases to Azure
The Ultimate Guide to Choosing and Implementing the Right Monitoring Tool
Everything You Need to Know About the 2019 DORA Accelerate State of DevOps Re...
Using Redgate, AKS and Azure to bring DevOps to your database
Using Redgate, AKS and Azure to bring DevOps to your Database
How to Pitch a Software Development Initiative and Ignite Culture Change
Taming the Wild West

Recently uploaded (20)

PDF
Nekopoi APK 2025 free lastest update
PPTX
Essential Infomation Tech presentation.pptx
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
history of c programming in notes for students .pptx
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
AI in Product Development-omnex systems
PPTX
Transform Your Business with a Software ERP System
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
Nekopoi APK 2025 free lastest update
Essential Infomation Tech presentation.pptx
How to Choose the Right IT Partner for Your Business in Malaysia
history of c programming in notes for students .pptx
Navsoft: AI-Powered Business Solutions & Custom Software Development
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Understanding Forklifts - TECH EHS Solution
Odoo POS Development Services by CandidRoot Solutions
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
AI in Product Development-omnex systems
Transform Your Business with a Software ERP System
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
2025 Textile ERP Trends: SAP, Odoo & Oracle
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
VVF-Customer-Presentation2025-Ver1.9.pptx
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Design an Analysis of Algorithms I-SECS-1021-03
Operating system designcfffgfgggggggvggggggggg
Softaken Excel to vCard Converter Software.pdf
How to Migrate SBCGlobal Email to Yahoo Easily

Data protection and privacy in the world of database DevOps

  • 2. Data protection & privacy in the world of database DevOps
  • 4. Agenda • What is DevOps? • Extending DevOps to databases • Impact of database DevOps on data governance and compliance • James Boother – Sales & Marketing Director, Coeo
  • 5. What is DevOps “DevOps is the union of people, process, and products to enable continuous delivery of value to our end users.” Donovan Brown, Principal DevOps Program Manager, Microsoft
  • 6. Extending DevOps to databases • Business-critical data needs to be safely and correctly preserved • Databases carry state that needs to be managed as part of rolling out new or updating existing software
  • 7. Benefits of Database DevOps • Databases are in sync with application development • Reliable traceability of database changes • Removal of the database bottleneck in agile delivery processes • Frequent releases, requiring less dev and DBA time • Audit trail of who has accessed what data, when and where
  • 8. Impact of DevOps on Data Governance 64% of respondents said DevOps had a positive impact on Data Governance & Compliance
  • 9. Database DevOps as a foundation for compliance • Monitoring - a key component for resilience • Change control & testing - reliable, repeatable, consistent • Provisioning and masking - compliant distribution of data • Automation - a durable and consistent audit trail
  • 10. James Boother Sales & Marketing Director Coeo blog.coeo.com james@coeo.com @jimmyboo www.linkedin.com/in/JamesBoo ther
  • 11. What is GDPR? Common myths Mapping GDPR to DevOps Next steps Q&A Agenda
  • 13. Mutually agreed European General Data Protection Regulation (GDPR) Will come into force on May 25 2018 Replaces the 1995 data protection regulation. Supersedes the UK Data Protection Act 1998 Any organisation operating within Europe needs to adhere What is GDPR? http://eur-lex.europa.eu/legal- content/EN/TXT/PDF/?uri=CELEX:32016R0679 &from=EN
  • 14. The right to be informed The right of access The right to rectification The right to erasure The right to restrict processing The right to data portability The right to object Rights related to automated decision making and profiling Individual’s rights
  • 15. Name Identification number Email address Online user identifier Social media posts Physical, physiological, or genetic information Medical information Location Bank details IP address Cookies Examples of personal data covered by GDPR https://aka.ms/gdprsqlwhitepaper
  • 16. Penalties Size of offence Penalty Small Up to €10 million or 2% global turnover Serious Consequences Up to €20 million or 4% global turnover Current UK Up to £500,000
  • 17. Elizabeth Denham, the UK's information commissioner, says "The GDPR is a step change for data protection," "It's still an evolution, not a revolution". Words of advice from the ICO
  • 18. ICO 12 step process https://ico.org.uk/media/for- organisations/documents/1624219/preparing-for-the-gdpr-12-steps.pdf 1. Awareness 2. Information you hold 3. Communicating privacy information 4. Individuals’ rights 5. Subject access requests 6. Lawful basis for processing personal data 7. Consent 8. Children 9. Data breaches 10. Data protection by design and data protection impact awareness 11. Data projection officers 12. International
  • 20. Myth #1 I can’t comply with GDPR and use DevOps
  • 21. Click to edit Master title styleMyth #1 - Mapping GDPR to DevOps - Users have access only to the data needed - Implement data protection by design and by default - Test for security regressions such as unprotected PII data - Identifying code-level security regressions such as code that returns data to non-privileged users - Use Generated sample data or Dynamic data masking instead of copying un- sanitized production data into non- production environments - PII data is encrypted or pseudo-anonymised - Users have the right level of access - Encrypted connections using TLS or Always Encrypted - Dynamic Data Masking - Row-level Security - Sysadmin access for DBAs - Restricted access for everyone else - Audit access and ability to identify compromised data - Encrypted backups - Removing data from backups
  • 22. Myth #2 I only need to worry about production
  • 23. Click to edit Master title styleMyth #2 – Identifying all of the Personal Data you hold https://docs.microsoft.com/en-us/azure/sql-database/sql-vulnerability-assessment
  • 24. Myth #3 Holding data in Azure prevents me from complying with GDPR
  • 25. Click to edit Master title styleMyth #3 – Azure advanced data protection features Feature SQLDB SQL Server Vulnerability Assessment  Coming soon TDE On by default Available in Enterprise Threat detection  Auditing   Dynamic data masking   Always encrypted   Encrypted connections   AAD User login with MFA  (With SSMS 17)
  • 27. Technical readiness Create a repeatable deployment process Setup monitoring of access to the environments Remediate any technical risks identified during the assessment Next Steps Compliance readiness Nominate a Data Protection Officer Assess your environment Identify the personal data across all environments Prepare a breach response plan Two Work Streams:
  • 28. Further reading Topic Blog post Introducing Always Encrypted https://blog.coeo.com/mattrobertshaw/2 017/05/08/introducing-always-encrypted Securing connections to SQL Server with TLS https://blog.coeo.com/securing- connections-to-sql-server-with-tls How Vulnerable is Your Data? Stop Malware Attacks using Azure SQL Database https://blog.coeo.com/how-vulnerable- is-your-data-stop-malware-attacks- using-azure-sql-database The GDPR and You https://www.scarydba.com/2017/11/13/th e-gdpr-and-you/
  • 29. Q&A

Editor's Notes

  • #3: Hi everybody, welcome to our webinar on Data protection & privacy in the world of database DevOps. All attendees are on mute, but please do leave questions in the Gotowebinar panel… We are recording the webinar and we’ll be sending you the recording and the slides tomorrow
  • #4: PASS President Microsoft MVP Author Redgate Evangelist
  • #5: After setting the scene by talking about what we mean by database DevOps and how it can be a solid foundation for compliance, I’ll hand over to our guest James Boother, Sales & Marketing Director at Coeo: James is Sales and Marketing Director at Coeo, a Microsoft Gold Partner providing consulting and managed services for Microsoft data platform and analytics technologies. He has extensive experience within the software industry, and before joining Coeo had 15 years’ experience working as a programmer, system architect, head of technology and consultant. James is also a Microsoft Certified Master for SQL Server and regularly present at industry and community events.
  • #7: A lot of dev shops out there are already utilizing best practices around application lifecycle management and rapid delivery of their application code but the databases are normally left out and there are still a lot of manual processes involved in delivering database changes. This is mainly because deployment of databases is not as easy as swapping out old code with a new one. Databases carry state and hold business critical data that needs to be safely preserved… and there are more and more data protection and privacy regulations for organizations to be compliant with.
  • #11: Now it’s time to introduce our guest speaker for today, James Boother of Coeo, for a closer look at the growing demands on dev teams within organisations to balance data protection and privacy requirements with rapid, reliable delivery.
  • #17: Smaller offences could result in fines of up to €10 million or two per cent of a firm's global turnover (whichever is greater). Those with more serious consequences can have fines of up to €20 million or four per cent of a firm's global turnover (whichever is greater). In the UK the ICO can currently fine up to £500,000
  • #19: Certain organisations (over 250 staff) must appoint a Data Protection Officer 72 hours – to report a data protection incident to the ICO (or governing body in a European country) Select which legal body you are registering with