SlideShare a Scribd company logo
An Engineer’s Guide to Adding Strong Privacy
to Your Stack & CI/CD Process
WE’RE HIRING
Building Trust in
Data Driven Systems
@cillian #PrivacyAsCode
Cillian Kieran
Co-Founder & CEO at Ethyca
@cillian
medium.com/@cillian
privacy.dev
@cillian #PrivacyAsCode
E T H I C S D A T A
(n.) [eth-ik-ah]
Developer tools and infrastructure for privacy, enabling
engineers, product and data teams to rapidly build,
deploy and maintain respectful technology.
Ethyca
@cillian #PrivacyAsCode
Data Privacy Compliance
@cillian #PrivacyAsCode
Why It Matters
Active & Pending Privacy Regulations
in Nearly all Major Markets
Our New Normal Is To Be Heavily Regulated Like Finance & Pharma
CCPA
PIPEDA
FED GDPR
APPI
PPB
LGPD
POPI
APP
@cillian #PrivacyAsCode
@cillian #PrivacyAsCode
The Privacy Spectrum
Privacy for Lawyers & Engineers vs. The Opportunity
CI/CDLegal & GRC Potential
FrictionLists, Rules & Compliance Trust & Growth
Move Purposefully & Fix Things *
@cillian #PrivacyAsCode
(Or, Being Agile & Ethical)
* Credit: DJ Patil, Chief Data Scientist to Obama Administration and Ethyca investor.
Move Purposefully & Fix Things:
@cillian #PrivacyAsCode
1. A Privacy Model for Engineers
2. Mapping Privacy to the SDLC
3. Five Fundamentals of Privacy
4. Implementation Methods
5. Architectural Considerations
6. CICD Considerations
@cillian #PrivacyAsCode
The Data Privacy Model
Abstraction to form global model for Data Privacy Compliance *
Data Mapping
Inventory of data
defined as ‘personal
information’, including
sources, destinations,
system/user access,
the data use case(s)
and their TTL.
Consent & Objection
Provide mechanisms
for users to modify
which processes their
data is used in. Chiefly
for California, remove
their data from any
“data sales”.
Data Subject Rights
Provide mechanisms
for users to manage
data defined as
‘personal information’.
This includes retrieval/
access, update and
delete.
Data Entitlements
Constrain use of data
by services, systems
and internal users
based on the business
justifications or data
use cases they are
involved in.
Impact Assessments
As you build or
integrate systems,
assess the impact of
how these new data
processes will affect
your user and correct
any negative impact.
* Note: There are substantive differences between definitions and obligations for Data Privacy but
in seeking a blueprint for strong data privacy we believe these can be applied across markets.
@cillian #PrivacyAsCode
SDLC & Data Privacy
Requirements Design Implementation
</>
Testing Deployment Maintenance Data Processing
@cillian #PrivacyAsCode
SDLC & Data Privacy
Requirements Design Implementation
</>
Testing Deployment Maintenance Data Processing
Audit / Reporting
Consider your data
processes as an auditable
trail of activity. An
expanding supply chain
like view of processes.
@cillian #PrivacyAsCode
SDLC & Data Privacy
Requirements Design Implementation
</>
Testing Deployment Maintenance Data Processing
Mapping & Notation
Continuously maintained
data flows and data
models to understand
‘what’ data is ‘where’ and
‘why’.
Audit / Reporting
Consider your data
processes as an auditable
trail of activity. An
expanding supply chain
like view of processes.
@cillian #PrivacyAsCode
Data Mapping
A continuously updated inventory of data flow and annotation so you can:
• Categorize all personal information.
• Understand where data is retained.
• Identify the types of users for whom data is held.
• Identify internal systems or users that have data access rights.
• Map these data transactions to approved business processes.
• Identify if consent was appropriately collected.
• Know how long data is held (ttl)
@cillian #PrivacyAsCode
Data Mapping Methodologies
1. Aggregate schema, audit unstructured stores, document processes and map
data rights for all personal information. Establish cadence for regular review.
2. Automate with data discovery tools to identify personal information and
generate ‘map'. Ensure manual review as automation is imperfect.
3. Connect rights management, transaction analysis and system metadata to
generate map of personal information. Significant infra. & ops refactoring.
@cillian #PrivacyAsCode
@cillian #PrivacyAsCode
SDLC & Data Privacy
Requirements Design Implementation
</>
Testing Deployment Maintenance Data Processing
Mapping & Notation
Continuously maintained
data flows and data
models to understand
‘what’ data is ‘where’ and
‘why’.
Audit / Reporting
Consider your data
processes as an auditable
trail of activity. An
expanding supply chain
like view of processes.
@cillian #PrivacyAsCode
SDLC & Data Privacy
Requirements Design Implementation
</>
Testing Deployment Maintenance Data Processing
Data Subject Rights
Provide services allowing
users to manage personal
information, including
access/retrieval, updates,
deletion & consent.
Mapping & Notation
Continuously maintained
data flows and data
models to understand
‘what’ data is ‘where’ and
‘why’.
Audit / Reporting
Consider your data
processes as an auditable
trail of activity. An
expanding supply chain
like view of processes.
@cillian #PrivacyAsCode
Data Subject Rights
Your systems should have the ability to:
• Access: retrieve, categorize, and provide to requesting user all of their data.
• Rectify: edit an attribute of personal information that may be deemed incorrect.
• Delete: delete an attribute of personal information.
• Erase: completely erase a user’s personal information.
• Portability: retrieve, categorize, and provide users data in interoperable format.
@cillian #PrivacyAsCode
Data Subject Rights Methodologies
1. Write scripts for data retrieval against identities for each data store and prepare
a runbook to execute regularly. Unscalable, error prone, and not auditable.
2. Build service for data retrieval based on provided identities and expose across
stack for subject requests. Significant cycles to design, implement, & maintain.
@cillian #PrivacyAsCode
@cillian #PrivacyAsCode
Consent & Objection
You must provide the ability for your user to:
• opt-in: opt-in with clear understanding of what you're doing with their data.
• opt-out: modify consents for each activity you undertake with their data.
• object: object to having their data processed in any way.
• manage data sales: opt out of having their data sold to third parties.
• Ensure users are notified of changes to data processes.
• Ensure user’s consent flows through all your business processes.
@cillian #PrivacyAsCode
Consent & Objection Methodologies
1. Capture consent upfront and manually map flags across 3rd party systems with
data processes for given identities. Difficult to maintain parity across systems.
2. Implement (buy or build) consent manager to unify consent across data
processes. Good for SaaS business, less suited for owned infra.
3. Treat rights management, data processes, and consent as graph of relationships
for data privacy compliance. Significant infra. & ops refactoring to achieve.
@cillian #PrivacyAsCode
@cillian #PrivacyAsCode
SDLC & Data Privacy
Requirements Design Implementation
</>
Testing Deployment Maintenance Data Processing
Data Subject Rights
Provide services allowing
users to manage personal
information, including
access/retrieval, updates,
deletion & consent.
Mapping & Notation
Continuously maintained
data flows and data
models to understand
‘what’ data is ‘where’ and
‘why’.
Audit / Reporting
Consider your data
processes as an auditable
trail of activity. An
expanding supply chain
like view of processes.
@cillian #PrivacyAsCode
SDLC & Data Privacy
Requirements Design Implementation
</>
Testing Deployment Maintenance Data Processing
Data Subject Rights
Provide services allowing
users to manage personal
information, including
access/retrieval, updates,
deletion & consent.
Mapping & Notation
Continuously maintained
data flows and data
models to understand
‘what’ data is ‘where’ and
‘why’.
Audit / Reporting
Consider your data
processes as an auditable
trail of activity. An
expanding supply chain
like view of processes.
Data Entitlements
Fine grained entitlements
constraining services,
systems, engineers and
data teams to only
necessary data access.
@cillian #PrivacyAsCode
Data Entitlement
Support business data governance policies for minimization with respect to:
• encryption of all data in flight and at rest.
• ensure access to data is only provided for a given business activity.
• limit access to data for the duration of a given business activity.
• comprehensively log data access across business users and systems.
@cillian #PrivacyAsCode
Data Entitlement Methodologies
1. Institute fine grained access control based on specific business activities which
reflect permitted data policies. Easiest to initiate, labor intensive to scale.
2. Map data processes, consent, and entitlements together to manage data access
controls for systems and users. Significant infra. & ops refactoring to build.
@cillian #PrivacyAsCode
@cillian #PrivacyAsCode
SDLC & Data Privacy
Requirements Design Implementation
</>
Testing Deployment Maintenance Data Processing
Data Subject Rights
Provide services allowing
users to manage personal
information, including
access/retrieval, updates,
deletion & consent.
Mapping & Notation
Continuously maintained
data flows and data
models to understand
‘what’ data is ‘where’ and
‘why’.
Audit / Reporting
Consider your data
processes as an auditable
trail of activity. An
expanding supply chain
like view of processes.
Data Entitlements
Fine grained entitlements
constraining services,
systems, engineers and
data teams to only
necessary data access.
@cillian #PrivacyAsCode
SDLC & Data Privacy
Requirements Design Implementation
</>
Testing Deployment Maintenance Data Processing
Data Subject Rights
Provide services allowing
users to manage personal
information, including
access/retrieval, updates,
deletion & consent.
Mapping & Notation
Continuously maintained
data flows and data
models to understand
‘what’ data is ‘where’ and
‘why’.
Audit / Reporting
Consider your data
processes as an auditable
trail of activity. An
expanding supply chain
like view of processes.
Data Entitlements
Fine grained entitlements
constraining services,
systems, engineers and
data teams to only
necessary data access.
Impact Assessments
Assess the risk of data
processes to your user as
part of system design,
implementation and
ongoing data operations.
@cillian #PrivacyAsCode
Impact Assessment
Conduct impact assessments as part of product design and development:
• Assess impact of intended data process to your users.
• Reduce unnecessary risk wherever possible when identified.
• Provide clear documentation of ongoing assessment for any product or service
development process.
• Consider Impact Assessments part of your entire SDLC workflow.
@cillian #PrivacyAsCode
Impact Assessment Methodologies
1. Define and maintain a manual workflow comprised of impact analysis forms,
completed by eng., product, and data teams. High friction, unscalable.
2. Implement manual workflow for data entitlements based on completion of
impact assessment requests. High friction, unscalable.
3. Build static code review for privacy risks into CICD pipeline and monitor data
transactions in applications. New toolset and pipeline with real costs.
@cillian #PrivacyAsCode
Architectural Considerations
@cillian #PrivacyAsCode
@cillian #PrivacyAsCode
Manual Effort
The reality is manual data
notation, schema analysis.
Manual data rights
management supported
by comprehensive
security.
Privacy Preserving Architecture
Reality, Desired State(s) and Panacea
Passive Monitoring
Agents / instrumentation
to generate data lineage
with manual enrichment
for privacy related
classification.
PrivateSQL
Differential privacy
suitable for query/analysis
on SQL while protecting
underlying identities.
In-line Proxy
Similar to passive
instrumentation; low-
latency proxy that
monitors and actively
manages data access
based on entitlements.
Enclaves
Hardware-hardened
containers promise a
greater degree of
protection for both real-
time and batch processes.
Today Short-term Future
CICD Considerations
@cillian #PrivacyAsCode
@cillian #PrivacyAsCode
CICD Considerations
Reality, Desired State(s) and Panacea
Manual Effort
Manual effort requires
privacy code review,
impact assessments, edge
case planning, and more
documentation on data
processes.
Privacy by Design
Training in the 7 aspects
of privacy by design
assists product managers,
developers and teams to
build more respectful
systems.
Dev Data Behavior
Better policies on read-
replica of production data
source or general use of
production data in dev
should be minimized.
Entitlements &
Impacts
A future-state pipeline
connecting impact
assessments as code-
based workflows with
entitlements to data.
Static Code Analysis
Combining impact
assessments and data
access with analysis of
code for anomalies or
risks such as data
transposition.
Today Short-term Future
Summary
@cillian #PrivacyAsCode
@cillian #PrivacyAsCode
The Data Privacy Model
Abstraction to form global model for Data Privacy Compliance *
Data Mapping
Inventory of data
defined as ‘personal
information’, including
sources, destinations,
system/user access,
the data use case(s)
and their TTL.
Consent & Objection
Provide mechanisms
for users to modify
which processes their
data is used in. Chiefly
for California, remove
their data from any
“data sales”.
Data Subject Rights
Provide mechanisms
for users to manage
data defined as
‘personal information’.
This includes retrieval/
access, update and
delete.
Data Entitlements
Constrain use of data
by services, systems
and internal users
based on the business
justifications or data
use cases they are
involved in.
Impact Assessments
As you build or
integrate systems,
assess the impact of
how these new data
processes will affect
your user and correct
any negative impact.
* Note: There are substantive differences between definitions and obligations for Data Privacy but
in seeking a blueprint for strong data privacy we believe these can be applied across markets.
@cillian #PrivacyAsCode
Summary
Data privacy is a fast changing, high impact issue for developers:
#1 better data models/documentation maintenance helps.
#2 develop workflow for data retrieval, whether manual or automated.
#3 privacy consideration is often corner and edge case consideration.
#4 privacy should be part of your infrastructure either in, or between services and stores.
#5 consider how privacy analysis can be built into CICD (at pull/merge request).
@cillian #PrivacyAsCode
WE’RE HIRING

More Related Content

PPT
University Management System
PDF
నాలుగు మృగములను గూర్చిన వివరణ దానియేలు గ్రంథ ధ్యానములు
PPT
University Student Payment System ( USPS )
PDF
Pmkvy form
PPTX
How to Review Medicare Appeals in the SNF
PPT
Synopsis of Fee Management System
PDF
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
University Management System
నాలుగు మృగములను గూర్చిన వివరణ దానియేలు గ్రంథ ధ్యానములు
University Student Payment System ( USPS )
Pmkvy form
How to Review Medicare Appeals in the SNF
Synopsis of Fee Management System
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams

Similar to #DEVWEEK2020 Data Privacy in the Tech Stack & CI/CD Process (20)

PDF
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
PDF
Article Week 20-August-2024-Radha-Data Engineering Services (1).pdf
PPTX
Defining and Applying Data Governance in Today’s Business Environment
PDF
Open Source, Python based Privacy Engineering Tools
PPTX
Is your big data journey stalling? Take the Leap with Capgemini and Cloudera
PDF
DataOps , cbuswaw April '23
PDF
Sgcp14dunlea
PDF
Who, What, Where and How: Why You Want to Know
PDF
Intelligent Data Management NDMO_Data Catalog and Metadata Domain Specificati...
PDF
Intro to big data and applications -day 3
PDF
Intro to Data Science on Hadoop
PDF
The Data Lake - Balancing Data Governance and Innovation
PDF
Why data governance is the new buzz?
PDF
What Data Do You Have and Where is It?
PPTX
Data Science Salon 2018 - Building a true enterprise data governance platform...
PPTX
Data Analytics & Hospital Asset Managemenr
PDF
Setting Up the Data Lake
PDF
Big Data Analytics Architecture Powerpoint Presentation Slides
PDF
Why an AI-Powered Data Catalog Tool is Critical to Business Success
PDF
Privacera Databricks CCPA Webinar Feb 2020
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Article Week 20-August-2024-Radha-Data Engineering Services (1).pdf
Defining and Applying Data Governance in Today’s Business Environment
Open Source, Python based Privacy Engineering Tools
Is your big data journey stalling? Take the Leap with Capgemini and Cloudera
DataOps , cbuswaw April '23
Sgcp14dunlea
Who, What, Where and How: Why You Want to Know
Intelligent Data Management NDMO_Data Catalog and Metadata Domain Specificati...
Intro to big data and applications -day 3
Intro to Data Science on Hadoop
The Data Lake - Balancing Data Governance and Innovation
Why data governance is the new buzz?
What Data Do You Have and Where is It?
Data Science Salon 2018 - Building a true enterprise data governance platform...
Data Analytics & Hospital Asset Managemenr
Setting Up the Data Lake
Big Data Analytics Architecture Powerpoint Presentation Slides
Why an AI-Powered Data Catalog Tool is Critical to Business Success
Privacera Databricks CCPA Webinar Feb 2020
Ad

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
KodekX | Application Modernization Development
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Big Data Technologies - Introduction.pptx
PPT
Teaching material agriculture food technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Network Security Unit 5.pdf for BCA BBA.
Unlocking AI with Model Context Protocol (MCP)
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Encapsulation_ Review paper, used for researhc scholars
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Review of recent advances in non-invasive hemoglobin estimation
Programs and apps: productivity, graphics, security and other tools
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The AUB Centre for AI in Media Proposal.docx
MIND Revenue Release Quarter 2 2025 Press Release
KodekX | Application Modernization Development
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectral efficient network and resource selection model in 5G networks
Big Data Technologies - Introduction.pptx
Teaching material agriculture food technology
NewMind AI Weekly Chronicles - August'25 Week I
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Understanding_Digital_Forensics_Presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Network Security Unit 5.pdf for BCA BBA.
Ad

#DEVWEEK2020 Data Privacy in the Tech Stack & CI/CD Process

  • 1. An Engineer’s Guide to Adding Strong Privacy to Your Stack & CI/CD Process WE’RE HIRING Building Trust in Data Driven Systems @cillian #PrivacyAsCode
  • 2. Cillian Kieran Co-Founder & CEO at Ethyca @cillian medium.com/@cillian privacy.dev @cillian #PrivacyAsCode
  • 3. E T H I C S D A T A (n.) [eth-ik-ah] Developer tools and infrastructure for privacy, enabling engineers, product and data teams to rapidly build, deploy and maintain respectful technology. Ethyca @cillian #PrivacyAsCode
  • 4. Data Privacy Compliance @cillian #PrivacyAsCode Why It Matters
  • 5. Active & Pending Privacy Regulations in Nearly all Major Markets Our New Normal Is To Be Heavily Regulated Like Finance & Pharma CCPA PIPEDA FED GDPR APPI PPB LGPD POPI APP @cillian #PrivacyAsCode
  • 6. @cillian #PrivacyAsCode The Privacy Spectrum Privacy for Lawyers & Engineers vs. The Opportunity CI/CDLegal & GRC Potential FrictionLists, Rules & Compliance Trust & Growth
  • 7. Move Purposefully & Fix Things * @cillian #PrivacyAsCode (Or, Being Agile & Ethical) * Credit: DJ Patil, Chief Data Scientist to Obama Administration and Ethyca investor.
  • 8. Move Purposefully & Fix Things: @cillian #PrivacyAsCode 1. A Privacy Model for Engineers 2. Mapping Privacy to the SDLC 3. Five Fundamentals of Privacy 4. Implementation Methods 5. Architectural Considerations 6. CICD Considerations
  • 9. @cillian #PrivacyAsCode The Data Privacy Model Abstraction to form global model for Data Privacy Compliance * Data Mapping Inventory of data defined as ‘personal information’, including sources, destinations, system/user access, the data use case(s) and their TTL. Consent & Objection Provide mechanisms for users to modify which processes their data is used in. Chiefly for California, remove their data from any “data sales”. Data Subject Rights Provide mechanisms for users to manage data defined as ‘personal information’. This includes retrieval/ access, update and delete. Data Entitlements Constrain use of data by services, systems and internal users based on the business justifications or data use cases they are involved in. Impact Assessments As you build or integrate systems, assess the impact of how these new data processes will affect your user and correct any negative impact. * Note: There are substantive differences between definitions and obligations for Data Privacy but in seeking a blueprint for strong data privacy we believe these can be applied across markets.
  • 10. @cillian #PrivacyAsCode SDLC & Data Privacy Requirements Design Implementation </> Testing Deployment Maintenance Data Processing
  • 11. @cillian #PrivacyAsCode SDLC & Data Privacy Requirements Design Implementation </> Testing Deployment Maintenance Data Processing Audit / Reporting Consider your data processes as an auditable trail of activity. An expanding supply chain like view of processes.
  • 12. @cillian #PrivacyAsCode SDLC & Data Privacy Requirements Design Implementation </> Testing Deployment Maintenance Data Processing Mapping & Notation Continuously maintained data flows and data models to understand ‘what’ data is ‘where’ and ‘why’. Audit / Reporting Consider your data processes as an auditable trail of activity. An expanding supply chain like view of processes.
  • 13. @cillian #PrivacyAsCode Data Mapping A continuously updated inventory of data flow and annotation so you can: • Categorize all personal information. • Understand where data is retained. • Identify the types of users for whom data is held. • Identify internal systems or users that have data access rights. • Map these data transactions to approved business processes. • Identify if consent was appropriately collected. • Know how long data is held (ttl)
  • 14. @cillian #PrivacyAsCode Data Mapping Methodologies 1. Aggregate schema, audit unstructured stores, document processes and map data rights for all personal information. Establish cadence for regular review. 2. Automate with data discovery tools to identify personal information and generate ‘map'. Ensure manual review as automation is imperfect. 3. Connect rights management, transaction analysis and system metadata to generate map of personal information. Significant infra. & ops refactoring. @cillian #PrivacyAsCode
  • 15. @cillian #PrivacyAsCode SDLC & Data Privacy Requirements Design Implementation </> Testing Deployment Maintenance Data Processing Mapping & Notation Continuously maintained data flows and data models to understand ‘what’ data is ‘where’ and ‘why’. Audit / Reporting Consider your data processes as an auditable trail of activity. An expanding supply chain like view of processes.
  • 16. @cillian #PrivacyAsCode SDLC & Data Privacy Requirements Design Implementation </> Testing Deployment Maintenance Data Processing Data Subject Rights Provide services allowing users to manage personal information, including access/retrieval, updates, deletion & consent. Mapping & Notation Continuously maintained data flows and data models to understand ‘what’ data is ‘where’ and ‘why’. Audit / Reporting Consider your data processes as an auditable trail of activity. An expanding supply chain like view of processes.
  • 17. @cillian #PrivacyAsCode Data Subject Rights Your systems should have the ability to: • Access: retrieve, categorize, and provide to requesting user all of their data. • Rectify: edit an attribute of personal information that may be deemed incorrect. • Delete: delete an attribute of personal information. • Erase: completely erase a user’s personal information. • Portability: retrieve, categorize, and provide users data in interoperable format.
  • 18. @cillian #PrivacyAsCode Data Subject Rights Methodologies 1. Write scripts for data retrieval against identities for each data store and prepare a runbook to execute regularly. Unscalable, error prone, and not auditable. 2. Build service for data retrieval based on provided identities and expose across stack for subject requests. Significant cycles to design, implement, & maintain. @cillian #PrivacyAsCode
  • 19. @cillian #PrivacyAsCode Consent & Objection You must provide the ability for your user to: • opt-in: opt-in with clear understanding of what you're doing with their data. • opt-out: modify consents for each activity you undertake with their data. • object: object to having their data processed in any way. • manage data sales: opt out of having their data sold to third parties. • Ensure users are notified of changes to data processes. • Ensure user’s consent flows through all your business processes.
  • 20. @cillian #PrivacyAsCode Consent & Objection Methodologies 1. Capture consent upfront and manually map flags across 3rd party systems with data processes for given identities. Difficult to maintain parity across systems. 2. Implement (buy or build) consent manager to unify consent across data processes. Good for SaaS business, less suited for owned infra. 3. Treat rights management, data processes, and consent as graph of relationships for data privacy compliance. Significant infra. & ops refactoring to achieve. @cillian #PrivacyAsCode
  • 21. @cillian #PrivacyAsCode SDLC & Data Privacy Requirements Design Implementation </> Testing Deployment Maintenance Data Processing Data Subject Rights Provide services allowing users to manage personal information, including access/retrieval, updates, deletion & consent. Mapping & Notation Continuously maintained data flows and data models to understand ‘what’ data is ‘where’ and ‘why’. Audit / Reporting Consider your data processes as an auditable trail of activity. An expanding supply chain like view of processes.
  • 22. @cillian #PrivacyAsCode SDLC & Data Privacy Requirements Design Implementation </> Testing Deployment Maintenance Data Processing Data Subject Rights Provide services allowing users to manage personal information, including access/retrieval, updates, deletion & consent. Mapping & Notation Continuously maintained data flows and data models to understand ‘what’ data is ‘where’ and ‘why’. Audit / Reporting Consider your data processes as an auditable trail of activity. An expanding supply chain like view of processes. Data Entitlements Fine grained entitlements constraining services, systems, engineers and data teams to only necessary data access.
  • 23. @cillian #PrivacyAsCode Data Entitlement Support business data governance policies for minimization with respect to: • encryption of all data in flight and at rest. • ensure access to data is only provided for a given business activity. • limit access to data for the duration of a given business activity. • comprehensively log data access across business users and systems.
  • 24. @cillian #PrivacyAsCode Data Entitlement Methodologies 1. Institute fine grained access control based on specific business activities which reflect permitted data policies. Easiest to initiate, labor intensive to scale. 2. Map data processes, consent, and entitlements together to manage data access controls for systems and users. Significant infra. & ops refactoring to build. @cillian #PrivacyAsCode
  • 25. @cillian #PrivacyAsCode SDLC & Data Privacy Requirements Design Implementation </> Testing Deployment Maintenance Data Processing Data Subject Rights Provide services allowing users to manage personal information, including access/retrieval, updates, deletion & consent. Mapping & Notation Continuously maintained data flows and data models to understand ‘what’ data is ‘where’ and ‘why’. Audit / Reporting Consider your data processes as an auditable trail of activity. An expanding supply chain like view of processes. Data Entitlements Fine grained entitlements constraining services, systems, engineers and data teams to only necessary data access.
  • 26. @cillian #PrivacyAsCode SDLC & Data Privacy Requirements Design Implementation </> Testing Deployment Maintenance Data Processing Data Subject Rights Provide services allowing users to manage personal information, including access/retrieval, updates, deletion & consent. Mapping & Notation Continuously maintained data flows and data models to understand ‘what’ data is ‘where’ and ‘why’. Audit / Reporting Consider your data processes as an auditable trail of activity. An expanding supply chain like view of processes. Data Entitlements Fine grained entitlements constraining services, systems, engineers and data teams to only necessary data access. Impact Assessments Assess the risk of data processes to your user as part of system design, implementation and ongoing data operations.
  • 27. @cillian #PrivacyAsCode Impact Assessment Conduct impact assessments as part of product design and development: • Assess impact of intended data process to your users. • Reduce unnecessary risk wherever possible when identified. • Provide clear documentation of ongoing assessment for any product or service development process. • Consider Impact Assessments part of your entire SDLC workflow.
  • 28. @cillian #PrivacyAsCode Impact Assessment Methodologies 1. Define and maintain a manual workflow comprised of impact analysis forms, completed by eng., product, and data teams. High friction, unscalable. 2. Implement manual workflow for data entitlements based on completion of impact assessment requests. High friction, unscalable. 3. Build static code review for privacy risks into CICD pipeline and monitor data transactions in applications. New toolset and pipeline with real costs. @cillian #PrivacyAsCode
  • 30. @cillian #PrivacyAsCode Manual Effort The reality is manual data notation, schema analysis. Manual data rights management supported by comprehensive security. Privacy Preserving Architecture Reality, Desired State(s) and Panacea Passive Monitoring Agents / instrumentation to generate data lineage with manual enrichment for privacy related classification. PrivateSQL Differential privacy suitable for query/analysis on SQL while protecting underlying identities. In-line Proxy Similar to passive instrumentation; low- latency proxy that monitors and actively manages data access based on entitlements. Enclaves Hardware-hardened containers promise a greater degree of protection for both real- time and batch processes. Today Short-term Future
  • 32. @cillian #PrivacyAsCode CICD Considerations Reality, Desired State(s) and Panacea Manual Effort Manual effort requires privacy code review, impact assessments, edge case planning, and more documentation on data processes. Privacy by Design Training in the 7 aspects of privacy by design assists product managers, developers and teams to build more respectful systems. Dev Data Behavior Better policies on read- replica of production data source or general use of production data in dev should be minimized. Entitlements & Impacts A future-state pipeline connecting impact assessments as code- based workflows with entitlements to data. Static Code Analysis Combining impact assessments and data access with analysis of code for anomalies or risks such as data transposition. Today Short-term Future
  • 34. @cillian #PrivacyAsCode The Data Privacy Model Abstraction to form global model for Data Privacy Compliance * Data Mapping Inventory of data defined as ‘personal information’, including sources, destinations, system/user access, the data use case(s) and their TTL. Consent & Objection Provide mechanisms for users to modify which processes their data is used in. Chiefly for California, remove their data from any “data sales”. Data Subject Rights Provide mechanisms for users to manage data defined as ‘personal information’. This includes retrieval/ access, update and delete. Data Entitlements Constrain use of data by services, systems and internal users based on the business justifications or data use cases they are involved in. Impact Assessments As you build or integrate systems, assess the impact of how these new data processes will affect your user and correct any negative impact. * Note: There are substantive differences between definitions and obligations for Data Privacy but in seeking a blueprint for strong data privacy we believe these can be applied across markets.
  • 35. @cillian #PrivacyAsCode Summary Data privacy is a fast changing, high impact issue for developers: #1 better data models/documentation maintenance helps. #2 develop workflow for data retrieval, whether manual or automated. #3 privacy consideration is often corner and edge case consideration. #4 privacy should be part of your infrastructure either in, or between services and stores. #5 consider how privacy analysis can be built into CICD (at pull/merge request).