SlideShare a Scribd company logo
IBM i Security and GDPR
Becky Hjellming
Senior Director, Product Marketing
This presentation and all related materials are provided for informational
purposes only, and are not intended to provide, and should not be relied
on for, legal advice pertaining to the subject matter.
If you have specific questions on how this may affect your organization,
you should consult your legal advisor.
Disclaimer
2
IBM i Security for
GDPR Compliance
GDPR enforcement began May 25, 2018.
The EU General Data Protection Regulation (GDPR) is
“designed to harmonize data privacy laws across
Europe, to protect and empower all EU citizens data
privacy and to reshape the way organizations across
the region approach data privacy.”
IBM i security is not only critical for GDPR compliance,
but also supports compliance with other security
regulations and benefits the business.
3
The GDPR regulation applies to two categories of organizations:
• Controllers – Organizations of any kind or individuals that
determine how to process personal data. Controllers are
responsible for collecting consent, controlling access to that
data, and managing requests from data subjects
• Processors – Organizations of any kind or individuals that
process personal data on behalf of the controller.
Who Does GDPR Apply To?
GDPR applies to every
organization that
stores, processes or
otherwise uses data
relating to E.U. citizens
4
GDPR is all about respecting and protecting personal data
• The regulation is comprised of 173 recitals and 99 articles
• Many recitals and articles mention the need for data security
IT imperatives for complying with GDPR
1. Protecting data
2. Tracking activity / detecting violations
3. Assessing risks
GDPR and IBM i Security
1
2
3
5
Data protection encompasses preventing an individual’s personally identifiable
information from
• Being stolen
• Being seen by an unauthorized person
• Being used in a way outside the scope of the individual’s consent
GDPR doesn’t dictate technologies that should be used aside from mentions of
encryption and pseudonymization.
Every organization is expected to make a reasonable determination of what data
protection measures they need to take given the nature of the data they handle.
6
Imperative #1 –
Protecting Data
Global access control prevents unauthorized access to systems and data
• Password management and multi-factor authentication
• Management of object authorities
• Control of access via network protocols, system or user commands, SQL statements,
file opens and more
Elevated authority management restricts the use of powerful profiles
• Management of powerful profiles and temporarily elevated authorities
• Enforcement of session timeouts
Sensitive data protection ensures authorized individuals can only read sensitive data
• Encryption
• Pseudonymization (also known as tokenization, scrambling, shuffling, and anonymization)
• Masking
7
Key Technologies
for Protecting Data
GDPR requires that organizations have mechanisms in place
to track:
• How personal data is used
• How that data is accessed within systems
If a breach of confidentiality or inappropriate use of an individual’s data
occurs, the organization must:
• Quickly detect and remediate the violation
• Report the extent of the breach in a timely fashion
8
Imperative 2 –
Tracking Activity / Detecting Violations
System activity logging tracks all system access and sensitive data activity
• Searchable, filterable views into IBM i System Audit and user journals
• Reports and alerts on databases changes or system changes
• Logs of all access to sensitive files (who, when, how) with before/after details
Policy compliance management to detect object and configuration settings that
may be in violation of your security policies
• Automatic comparison of security policy and object and system settings
Global access control to alert administrators to violations
• Notification of access violations
9
Key Technologies
for Tracking Activity / Detecting Violations
Several provisions within GDPR mandate security risk assessments on a regular
basis
An IBM i assessment should analyze security in the IBM i environment, comparing
system configurations with known security best practices. Key areas that must be
covered include, but aren’t limited to:
• System values
• Default passwords
• Disabled users
• Command line users
Many compliance regulations require that assessments be conducted by a person
or process independent from the IT staff that manage or otherwise use the system
10
Imperative #3
Assessing Risk
• Distribution of powerful users
• Library authorities
• Open ports
• Exit-point programs
Self-service risk assessment tool provides insights into security vulnerabilities for
your internal team
• Doesn’t meet “separation of duties” requirement
• Gives you an idea where you stand
Risk assessment services obtains a third-party assessment of all potential security
exposures in your IBM i environment. Look for:
• Expertise in IBM i security
• Depth of breadth of analysis
• A detailed report with explanations, recommendations and guidance
• Summary report for management team
11
Key Technologies and Services
for Assessing Risk
Expanded partnership
opportunities with
companies who require
GDPR compliance of their
partners
Improved quality of data as
individuals take the
opportunity to review and
update their personal
information
Reduced possibility of fines
and impact to your
reputation
Goodwill and trust from
customers, prospects,
vendors, and employees
when they recognize your
efforts to respect the
privacy and security
Addressing GDPR
can helps you meet
other regulations,
while obtaining a
competitive
advantage
12
Data Privacy
Protect the privacy of data at-rest
or in-motion to prevent data
breaches
Access Control
Ensure comprehensive control of
unauthorized access and the
ability to trace any activity,
suspicious or otherwise
Compliance Monitoring
Gain visibility into all security activity
on your IBM i and optionally
feed it to an enterprise console
Security Risk Assessment
Assess your security threats
and vulnerabilities
13
Syncsort offers
leading security
solutions and expert
services to address
GDPR requirements
for IBM i security
Syncsort
Can Help!
To learn more about Syncsort’s security
technologies and services for IBM i, visit
www.syncsort.com/assure
Or contact Syncsort at
info@syncsort.com
Learn More!
14
Flash Friday: Data Quality & GDPR

More Related Content

PPTX
GDPR & IBM i Security
DOCX
Security Management Strategies and Defense and their uses.
PPTX
Sensitive data
PPTX
Information security group presentation ppt
PPTX
IBM i Security: Identifying the Events That Matter Most
PPTX
Data Security Explained
PPTX
Sensitive Data Exposure
PPTX
Data security
GDPR & IBM i Security
Security Management Strategies and Defense and their uses.
Sensitive data
Information security group presentation ppt
IBM i Security: Identifying the Events That Matter Most
Data Security Explained
Sensitive Data Exposure
Data security

What's hot (19)

PPTX
Access Control Systems
PPTX
Access control systems
PPT
Database & Data Security
PPTX
IBM i Security SIEM Integration
PPTX
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
DOCX
Data Security
PDF
Data Security
PDF
Mn bfdsprivacy
PPTX
Essential Layers of IBM i Security: Security Monitoring and Auditing
PPT
Information Security Management.Introduction
PDF
Cybersecurity 101 - Auditing Cyber Security
PDF
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
PPTX
Essential Layers of IBM i Security: File and Field Security
PPTX
Data security
PDF
Personal Data Protection in Indonesia
PPTX
Compliance regulations with Data Centric Security | Seclore
PPTX
Benefits of automating data protection | Seclore
PPTX
what is data security full ppt
PPTX
How to do pci compliance in google apps presentation
Access Control Systems
Access control systems
Database & Data Security
IBM i Security SIEM Integration
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
Data Security
Data Security
Mn bfdsprivacy
Essential Layers of IBM i Security: Security Monitoring and Auditing
Information Security Management.Introduction
Cybersecurity 101 - Auditing Cyber Security
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Essential Layers of IBM i Security: File and Field Security
Data security
Personal Data Protection in Indonesia
Compliance regulations with Data Centric Security | Seclore
Benefits of automating data protection | Seclore
what is data security full ppt
How to do pci compliance in google apps presentation
Ad

Similar to Flash Friday: Data Quality & GDPR (20)

PPTX
GDPR Part 2: Quest Relevance
PPTX
The general data protection act overview
PDF
Impact of GDPR on Third Party and M&A Security
PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
PPTX
EU's General Data Protection Regulation (GDPR)
PDF
GDPR: The Application Security Twist
PPTX
Improve IT Security and Compliance with Mainframe Data in Splunk
PDF
Complying with Cybersecurity Regulations for IBM i Servers and Data
PPT
Ch5-20_CISA.ppt About CISA Certification
PPT
Security Management Practices
PDF
Protecting Your Business from Unauthorized IBM i Access
PDF
CyNation - 7 things you should know about EU-GDPR
PPT
DATA SECURITY AND CONTROL.ppt
PPTX
Vuzion Love Cloud GDPR Event
PPTX
Data protection within development
PDF
GDPR and API Security
PDF
Toreon adding privacy by design in secure application development oss18 v20...
PDF
5 key steps for SMBs for reaching GDPR Compliance
PDF
7 Key GDPR Requirements & the Role of Data Governance
ODP
GDPR and ISO 27001 - how to be compliant
GDPR Part 2: Quest Relevance
The general data protection act overview
Impact of GDPR on Third Party and M&A Security
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
EU's General Data Protection Regulation (GDPR)
GDPR: The Application Security Twist
Improve IT Security and Compliance with Mainframe Data in Splunk
Complying with Cybersecurity Regulations for IBM i Servers and Data
Ch5-20_CISA.ppt About CISA Certification
Security Management Practices
Protecting Your Business from Unauthorized IBM i Access
CyNation - 7 things you should know about EU-GDPR
DATA SECURITY AND CONTROL.ppt
Vuzion Love Cloud GDPR Event
Data protection within development
GDPR and API Security
Toreon adding privacy by design in secure application development oss18 v20...
5 key steps for SMBs for reaching GDPR Compliance
7 Key GDPR Requirements & the Role of Data Governance
GDPR and ISO 27001 - how to be compliant
Ad

More from Precisely (20)

PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
PDF
The Changing Compliance Landscape in 2025.pdf
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
The Changing Compliance Landscape in 2025.pdf

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Spectroscopy.pptx food analysis technology
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Encapsulation theory and applications.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Getting Started with Data Integration: FME Form 101
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Dropbox Q2 2025 Financial Results & Investor Presentation
Spectroscopy.pptx food analysis technology
NewMind AI Weekly Chronicles - August'25-Week II
Encapsulation theory and applications.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Getting Started with Data Integration: FME Form 101
Spectral efficient network and resource selection model in 5G networks
Diabetes mellitus diagnosis method based random forest with bat algorithm
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
“AI and Expert System Decision Support & Business Intelligence Systems”
Digital-Transformation-Roadmap-for-Companies.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
20250228 LYD VKU AI Blended-Learning.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?

Flash Friday: Data Quality & GDPR

  • 1. IBM i Security and GDPR Becky Hjellming Senior Director, Product Marketing
  • 2. This presentation and all related materials are provided for informational purposes only, and are not intended to provide, and should not be relied on for, legal advice pertaining to the subject matter. If you have specific questions on how this may affect your organization, you should consult your legal advisor. Disclaimer 2
  • 3. IBM i Security for GDPR Compliance GDPR enforcement began May 25, 2018. The EU General Data Protection Regulation (GDPR) is “designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy.” IBM i security is not only critical for GDPR compliance, but also supports compliance with other security regulations and benefits the business. 3
  • 4. The GDPR regulation applies to two categories of organizations: • Controllers – Organizations of any kind or individuals that determine how to process personal data. Controllers are responsible for collecting consent, controlling access to that data, and managing requests from data subjects • Processors – Organizations of any kind or individuals that process personal data on behalf of the controller. Who Does GDPR Apply To? GDPR applies to every organization that stores, processes or otherwise uses data relating to E.U. citizens 4
  • 5. GDPR is all about respecting and protecting personal data • The regulation is comprised of 173 recitals and 99 articles • Many recitals and articles mention the need for data security IT imperatives for complying with GDPR 1. Protecting data 2. Tracking activity / detecting violations 3. Assessing risks GDPR and IBM i Security 1 2 3 5
  • 6. Data protection encompasses preventing an individual’s personally identifiable information from • Being stolen • Being seen by an unauthorized person • Being used in a way outside the scope of the individual’s consent GDPR doesn’t dictate technologies that should be used aside from mentions of encryption and pseudonymization. Every organization is expected to make a reasonable determination of what data protection measures they need to take given the nature of the data they handle. 6 Imperative #1 – Protecting Data
  • 7. Global access control prevents unauthorized access to systems and data • Password management and multi-factor authentication • Management of object authorities • Control of access via network protocols, system or user commands, SQL statements, file opens and more Elevated authority management restricts the use of powerful profiles • Management of powerful profiles and temporarily elevated authorities • Enforcement of session timeouts Sensitive data protection ensures authorized individuals can only read sensitive data • Encryption • Pseudonymization (also known as tokenization, scrambling, shuffling, and anonymization) • Masking 7 Key Technologies for Protecting Data
  • 8. GDPR requires that organizations have mechanisms in place to track: • How personal data is used • How that data is accessed within systems If a breach of confidentiality or inappropriate use of an individual’s data occurs, the organization must: • Quickly detect and remediate the violation • Report the extent of the breach in a timely fashion 8 Imperative 2 – Tracking Activity / Detecting Violations
  • 9. System activity logging tracks all system access and sensitive data activity • Searchable, filterable views into IBM i System Audit and user journals • Reports and alerts on databases changes or system changes • Logs of all access to sensitive files (who, when, how) with before/after details Policy compliance management to detect object and configuration settings that may be in violation of your security policies • Automatic comparison of security policy and object and system settings Global access control to alert administrators to violations • Notification of access violations 9 Key Technologies for Tracking Activity / Detecting Violations
  • 10. Several provisions within GDPR mandate security risk assessments on a regular basis An IBM i assessment should analyze security in the IBM i environment, comparing system configurations with known security best practices. Key areas that must be covered include, but aren’t limited to: • System values • Default passwords • Disabled users • Command line users Many compliance regulations require that assessments be conducted by a person or process independent from the IT staff that manage or otherwise use the system 10 Imperative #3 Assessing Risk • Distribution of powerful users • Library authorities • Open ports • Exit-point programs
  • 11. Self-service risk assessment tool provides insights into security vulnerabilities for your internal team • Doesn’t meet “separation of duties” requirement • Gives you an idea where you stand Risk assessment services obtains a third-party assessment of all potential security exposures in your IBM i environment. Look for: • Expertise in IBM i security • Depth of breadth of analysis • A detailed report with explanations, recommendations and guidance • Summary report for management team 11 Key Technologies and Services for Assessing Risk
  • 12. Expanded partnership opportunities with companies who require GDPR compliance of their partners Improved quality of data as individuals take the opportunity to review and update their personal information Reduced possibility of fines and impact to your reputation Goodwill and trust from customers, prospects, vendors, and employees when they recognize your efforts to respect the privacy and security Addressing GDPR can helps you meet other regulations, while obtaining a competitive advantage 12
  • 13. Data Privacy Protect the privacy of data at-rest or in-motion to prevent data breaches Access Control Ensure comprehensive control of unauthorized access and the ability to trace any activity, suspicious or otherwise Compliance Monitoring Gain visibility into all security activity on your IBM i and optionally feed it to an enterprise console Security Risk Assessment Assess your security threats and vulnerabilities 13 Syncsort offers leading security solutions and expert services to address GDPR requirements for IBM i security Syncsort Can Help!
  • 14. To learn more about Syncsort’s security technologies and services for IBM i, visit www.syncsort.com/assure Or contact Syncsort at info@syncsort.com Learn More! 14