SlideShare a Scribd company logo
Is Encryption the ONLY
Key to
G.D.P.R.
Joe Orlando 1
OBJECTIVE: Secure the Data
Secure the Personal
Identifiable Information (PII)
& Personal Health
Information (PHI) to
Prevent Unauthorized
Access and, in the event of
unauthorized access …
the data they get is
unintelligible.
GDPR requires businesses to implement “technical and organizational
measures to provide appropriate protection to the personal data they
hold.”
GDPR expressly states that such measures include:
1. The pseudonymization and encryption of personal data
2. Measures to ensure resilience of systems and services
processing data
3. Measures that allow businesses to restore the availability
and access to the data in the event of a breach
4. Frequent testing of the effectiveness of the security
measures
12/18/2017 3
Of the 261 pages of GDPR, “encryption” appears
• "...implement measures to mitigate those
risks, such as encryption." (P51. (83))
• "...appropriate safeguards, which may
include encryption" (P121 (4.e))
• "...including inter alia as appropriate: (a) the
pseudonymisation and encryption of personal
data." (P160 (1a))
• "...unintelligible to any person who is not
authorised to access it, such as encryption"
(P163 (3a))
12/18/2017 4
Beyond a “suggestion…”
GDPR includes a definition of “pseudonymisation”. According
to Article 4 No. 5 GDPR, pseudonymisation:
• “means the processing of personal data in such a manner
that the personal data can no longer be attributed to a
specific data subject without the use of additional
information, provided that such additional information is
kept separately and is subject to technical and
organisational measures to ensure that the personal data
are not attributed to an identified or identifiable natural
person”.
• pseudonymisation shall, like encryption, be one of the
“appropriate safeguards” of Article 6 Par. 4 (e) GDPR.
GDPR Recital 83
(83) In order to maintain security and to prevent processing
in infringement of this Regulation, the controller or
processor should evaluate the risks inherent in the
processing and implement measures to mitigate those
risks, such as encryption.
Those measures should ensure an appropriate level of
security, including confidentiality, taking into account the
state of the art and the costs of implementation in relation
to the risks and the nature of the personal data to be
protected.
Article 6 Paragraph 4
According to the compatibility test of Article 6 Par. 4 GDPR, account
should be taken inter alia of the possible consequences of the intended
further processing for data subjects. Since anonymisation,
pseudonymisation and encryption are privacy preserving
technologies [106] , in most cases applying these tools on the data
subject’s personal data will be in their interest.
Personal Data and Encryption in the European General Data Protection Regulation
Prof. Dr. Gerald Spindler
Philipp Schmechel
• The European Data Protection Supervisor has
gone as far to say that the use of end-to-end
encryption should be encouraged and when
necessary, mandated, in accordance with the
principle of data protection by design.
• This support for encryption has also been
echoed by the EU Article 29 Working Party,
which has stated that it would welcome new
obligations to use algorithms and standards
that have proven to be secure, to respect the
confidentiality of encrypted communications
and to prohibit the decryption, reverse
engineering or other monitoring of those
communications protected by encryption.
Things to Consider…
Encryption = Pseudymisation
When encrypting personal data, in accordance with Article 4 No. 5 GDPR, the encryption
key is the “additional information” which is “kept separately” and “subject to technical
and organizational measures”.
Hence safety measures such as a secure key management and the respective encryption
method used by the controller have to be used “to ensure that the personal data are not
attributed to an identified or identifiable natural person”. Therefore, because of its
existing assignment rule encryption is an example of pseudonymisation.
Personal Data and Encryption in the European General Data Protection Regulation
Prof. Dr. Gerald Spindler
Philipp Schmechel
Regulatory “PASS” if Using Encryption
“…in case of a data breach, the
controller is not required to
communicate to the data
subject if he or she has
implemented encryption as a
technical and organisational
protection measure”
(Article 34 Par. 3 (a) GDPR).
Trending
TRENDING
According to Mozilla’s statistics, an
encryption milestone was met in early 2017
when the average volume of encrypted
traffic on the internet surpassed the
average volume of unencrypted traffic.
The legal obligations for
encryption of personal data in
Europe and Asia
Field Fisher Waterhouse
Is there a Focus on Encryption?
If PII is used in the test
environment, it is required to be
protected at the same level that it is
protected in the production
environment, which can add
significantly to the time and expense
of testing the system.
NIST
If you are simulating a live environment, how does the IT
department do that? The simple answer is that it grabs a
bunch of data (technically, a sample) from its production
database and runs that through the testing process. This
isn’t an issue if the application is concerned with stock
control but it is an issue if the application deals with
individuals, as in a consumer sales application or a
human resources application. In these cases, unless
you have formal consent from the people whose data
you are using, then simply sampling the production
system for test data is illegal: you are using the data
for purposes for which it was not provided and you
are making that information available to people not
authorized to see it.
Work Group 29
Things to Consider…
A major data point stands out in the 2017 DBIR report: the
percentage of hacking related breaches involving the misuse
of stolen or weak credentials has reached 81%, effectively
putting it front and center in terms of tactics being leveraged
by attackers. That is four out of five breaches. No other
attacker technique detailed by Verizon comes close to this
number. To add some perspective: last year Verizon reported
that 63% of breaches involved credential misuse. These
numbers only serve to solidify what experts in identity
security know to be true - credential misuse is an epidemic
and is rapidly getting worse. The technique is particularly
damaging to the finance and healthcare industries.
Things to Consider…
The likelihood of
data going OUT
from INSIDE is
greater than the
likelihood of data
being exfiltrated
from OUTSIDE
Things to Consider…
OPTIONS (Easy to Hardest) RISK to PII/ PHI EXPOSURE (High to Low)
SUBSET DATA COMING OUT OF PRODUCTION
ACCESS MANAGEMENT & MONITORING
FIELD PRESERVING DATA MASKING
DATA PSEUDONYMIZATION
FIELD/ROW/COLUMN
ENCRYPTION
FULL DISK
ENCRYPTION
Things to Consider…
Other Steps to Take…
There are options… where to start
 Subsetting Data used in Test/QA and Dev
 Data Minimization
 Pseudonymisation / Masking
 Rigid Roles Based Access Controls and Management
 Reduce Unauthorized Access to PII/PHI
 Automatic Logging and Monitoring of User Activities (Regular Testing)
 Lock Down Download and Mobile Media Ability
 Make “Data in Motion” and “At Rest” Unintelligible
 Format Preserving Encryption
 Field; Column; Row Encryption
 Encrypt Workstations (& Laptops) or
 Full Disk Encryption with Individual Workstation Keys
 Provide end to end encryption (in motion and at rest)
12/18/2017 19
Some First Steps…
 Reduce the number of Access Points (Minimize User and
Authorized Access)
 Segregate, As Much As Possible, the Production Users –
Testers - Developers and QA Users
 Ensure Secure Data Transmission
 Rigidly Restrict Access by Well Defined Role/Authorization
 Prevent Data Download to Portable Media
 Ensure Comprehensive Training on Handling PII/PHI as
Part of Employee Code of Ethics
 Reduce # of people who are “authorized to see” Sensitive
Data (PII/PHI)
12/18/2017 20
Some First Steps…
 Minimize; Pseudonymise; Mask Data as Much as
Viable
 Ensure Data Secured “At Rest” and “In Motion”
 Rigidly Restrict Access by Well Defined
Role/Authorization
 Implement End Point Security (DLP)
 Deliberately Reduce Potential Attack Surfaces
(Vulnerabilities) that Potentially Expose PII/PHI
 Administer Regular Test & Audits on Internal and 3rd
Party “Data Privacy by Design and Default”
Procedures, Policies and Protocols
12/18/2017 21
OPTIONS (not mutually exclusive)
Data At Rest
• Pseudonymisation and
Masking
• Rigid Roles Based
Access Controls and
Management
• Encrypt Workstations
(& Laptops) to Prevent
Download and Export
Data In Motion
• Safe or Encrypted
Transfer (SFTP
(connection); encrypt
the data)
• TLS Tunnel and/or ZIX
for mail transport
Data In Use
• Data Minimization
• Data Subsetting
• Rigid Roles Based
Access Controls and
Management
• Pseudonymisation and
Masking
• Format Preserving
Encryption
• Field; Column;
Row Encryption
Options: Specific Ideas
Data At Rest
• File Share
• BitLocker
• USB/Media Lock
down
• DLP Policies
• Restricted Access to
Db
Data In Motion
• CASB
• DLP
• Network Protocols
• ACLS
• VPN
• Firewall
Data In Use
• Rigid User Access
Rules and Regular
Reviews
• Proactive User
Lifecycle
Management
• Multi Factor
Authentication
Thank you,
any questions?...
Appendix

More Related Content

PDF
GDPR 9 Step SIEM Implementation Checklist
PDF
Personal Data Protection in Indonesia
PDF
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
PDF
Data centric security key to digital business success - ulf mattsson - bright...
PDF
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
PDF
An Empirical Study on Information Security
PDF
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR 9 Step SIEM Implementation Checklist
Personal Data Protection in Indonesia
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Data centric security key to digital business success - ulf mattsson - bright...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
An Empirical Study on Information Security
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
GDPR solutions (JS Event 28/2/18) | Greenlight Computers

What's hot (17)

PDF
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
PDF
Where data security and value of data meet in the cloud brighttalk webinar ...
PDF
A Survey On Data Leakage Detection
PDF
Symantec Webinar Part 2 of 6 GDPR Compliance
PPTX
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
PDF
Information security and research data
PDF
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
PPT
Information Security Management. Security solutions copy
PPTX
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
PPTX
GDPR, Data Privacy and Cybersecurity - MIT Symposium
PDF
Isaca global journal - choosing the most appropriate data security solution ...
PDF
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
PPTX
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
PDF
The Business Case for Data Security
PPTX
A practical data privacy and security approach to ffiec, gdpr and ccpa
PDF
How Organizations can Secure Their Database From External Attacks
PDF
Cybersecurity 101 - Auditing Cyber Security
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Where data security and value of data meet in the cloud brighttalk webinar ...
A Survey On Data Leakage Detection
Symantec Webinar Part 2 of 6 GDPR Compliance
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Information security and research data
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Information Security Management. Security solutions copy
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Isaca global journal - choosing the most appropriate data security solution ...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
The Business Case for Data Security
A practical data privacy and security approach to ffiec, gdpr and ccpa
How Organizations can Secure Their Database From External Attacks
Cybersecurity 101 - Auditing Cyber Security
Ad

Similar to Is Encryption the Only Key to GDPR? (20)

PDF
Key Concepts for Protecting the Privacy of IBM i Data
PPTX
5 Ways to Make Your Postgres GDPR-Ready
 
PPTX
GDPR Webinar January 2018
 
PPTX
Isaca atlanta - practical data security and privacy
PPT
Protecting Sensitive Data using Encryption and Key Management
PPTX
Privacy & Data Protection
PPTX
ISACA Houston - Practical data privacy and de-identification techniques
PPTX
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
PDF
Continuous PCI and GDPR Compliance With Data-Centric Security
PPTX
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
PPTX
Protecting pii and phi exec summary
PDF
Encryption: Who, What, When, Where, and Why It's Not a Panacea
PPTX
GDPR: Protecting Your Data
PDF
3rd party considerations gdpr
PPTX
3rd party considerations Under GDPR and Privacy Laws
PPTX
Data protection within development
PPTX
Prevent million dollar fines - preparing for the EU General Data Regulation
PDF
Mind Your Business: Why Privacy Matters to the Successful Enterprise
PPTX
Privacy by Design - taking in account the state of the art
Key Concepts for Protecting the Privacy of IBM i Data
5 Ways to Make Your Postgres GDPR-Ready
 
GDPR Webinar January 2018
 
Isaca atlanta - practical data security and privacy
Protecting Sensitive Data using Encryption and Key Management
Privacy & Data Protection
ISACA Houston - Practical data privacy and de-identification techniques
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Continuous PCI and GDPR Compliance With Data-Centric Security
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protecting pii and phi exec summary
Encryption: Who, What, When, Where, and Why It's Not a Panacea
GDPR: Protecting Your Data
3rd party considerations gdpr
3rd party considerations Under GDPR and Privacy Laws
Data protection within development
Prevent million dollar fines - preparing for the EU General Data Regulation
Mind Your Business: Why Privacy Matters to the Successful Enterprise
Privacy by Design - taking in account the state of the art
Ad

More from Joe Orlando (16)

PDF
Ready for BI.pdf
PDF
Digital Marketing Strategy Presentation.pdf
PDF
Digital Marketing Strategy Presentation.pdf
PDF
Creating Brand Advocates
PPTX
Dealing with 3rd parties under gdpr
PDF
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
PPTX
GDPR KickOff Presentation - Getting EVERYONE UP TO SPEED
PDF
Why should customers do business with us?
PDF
The cloud primer
PDF
The brand advocate
PDF
Outsourcing checklist1
PDF
How can we innovate?
PDF
Sales and Marketing is BROKEN!
PDF
Pathways on bi.docx
PPTX
Digital Marketing Strategy Presentation
PDF
Digital marketing presentation jo
Ready for BI.pdf
Digital Marketing Strategy Presentation.pdf
Digital Marketing Strategy Presentation.pdf
Creating Brand Advocates
Dealing with 3rd parties under gdpr
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
GDPR KickOff Presentation - Getting EVERYONE UP TO SPEED
Why should customers do business with us?
The cloud primer
The brand advocate
Outsourcing checklist1
How can we innovate?
Sales and Marketing is BROKEN!
Pathways on bi.docx
Digital Marketing Strategy Presentation
Digital marketing presentation jo

Recently uploaded (20)

PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
DOCX
Euro SEO Services 1st 3 General Updates.docx
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
DOCX
Business Management - unit 1 and 2
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
Unit 1 Cost Accounting - Cost sheet
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPTX
2025 Product Deck V1.0.pptxCATALOGTCLCIA
PPTX
Principles of Marketing, Industrial, Consumers,
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
Types of control:Qualitative vs Quantitative
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
COST SHEET- Tender and Quotation unit 2.pdf
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
Probability Distribution, binomial distribution, poisson distribution
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Euro SEO Services 1st 3 General Updates.docx
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Business Management - unit 1 and 2
HR Introduction Slide (1).pptx on hr intro
Unit 1 Cost Accounting - Cost sheet
DOC-20250806-WA0002._20250806_112011_0000.pdf
Reconciliation AND MEMORANDUM RECONCILATION
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
2025 Product Deck V1.0.pptxCATALOGTCLCIA
Principles of Marketing, Industrial, Consumers,
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Types of control:Qualitative vs Quantitative
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx

Is Encryption the Only Key to GDPR?

  • 1. Is Encryption the ONLY Key to G.D.P.R. Joe Orlando 1
  • 2. OBJECTIVE: Secure the Data Secure the Personal Identifiable Information (PII) & Personal Health Information (PHI) to Prevent Unauthorized Access and, in the event of unauthorized access … the data they get is unintelligible.
  • 3. GDPR requires businesses to implement “technical and organizational measures to provide appropriate protection to the personal data they hold.” GDPR expressly states that such measures include: 1. The pseudonymization and encryption of personal data 2. Measures to ensure resilience of systems and services processing data 3. Measures that allow businesses to restore the availability and access to the data in the event of a breach 4. Frequent testing of the effectiveness of the security measures 12/18/2017 3
  • 4. Of the 261 pages of GDPR, “encryption” appears • "...implement measures to mitigate those risks, such as encryption." (P51. (83)) • "...appropriate safeguards, which may include encryption" (P121 (4.e)) • "...including inter alia as appropriate: (a) the pseudonymisation and encryption of personal data." (P160 (1a)) • "...unintelligible to any person who is not authorised to access it, such as encryption" (P163 (3a)) 12/18/2017 4
  • 5. Beyond a “suggestion…” GDPR includes a definition of “pseudonymisation”. According to Article 4 No. 5 GDPR, pseudonymisation: • “means the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organisational measures to ensure that the personal data are not attributed to an identified or identifiable natural person”. • pseudonymisation shall, like encryption, be one of the “appropriate safeguards” of Article 6 Par. 4 (e) GDPR.
  • 6. GDPR Recital 83 (83) In order to maintain security and to prevent processing in infringement of this Regulation, the controller or processor should evaluate the risks inherent in the processing and implement measures to mitigate those risks, such as encryption. Those measures should ensure an appropriate level of security, including confidentiality, taking into account the state of the art and the costs of implementation in relation to the risks and the nature of the personal data to be protected.
  • 7. Article 6 Paragraph 4 According to the compatibility test of Article 6 Par. 4 GDPR, account should be taken inter alia of the possible consequences of the intended further processing for data subjects. Since anonymisation, pseudonymisation and encryption are privacy preserving technologies [106] , in most cases applying these tools on the data subject’s personal data will be in their interest. Personal Data and Encryption in the European General Data Protection Regulation Prof. Dr. Gerald Spindler Philipp Schmechel
  • 8. • The European Data Protection Supervisor has gone as far to say that the use of end-to-end encryption should be encouraged and when necessary, mandated, in accordance with the principle of data protection by design. • This support for encryption has also been echoed by the EU Article 29 Working Party, which has stated that it would welcome new obligations to use algorithms and standards that have proven to be secure, to respect the confidentiality of encrypted communications and to prohibit the decryption, reverse engineering or other monitoring of those communications protected by encryption. Things to Consider…
  • 9. Encryption = Pseudymisation When encrypting personal data, in accordance with Article 4 No. 5 GDPR, the encryption key is the “additional information” which is “kept separately” and “subject to technical and organizational measures”. Hence safety measures such as a secure key management and the respective encryption method used by the controller have to be used “to ensure that the personal data are not attributed to an identified or identifiable natural person”. Therefore, because of its existing assignment rule encryption is an example of pseudonymisation. Personal Data and Encryption in the European General Data Protection Regulation Prof. Dr. Gerald Spindler Philipp Schmechel
  • 10. Regulatory “PASS” if Using Encryption “…in case of a data breach, the controller is not required to communicate to the data subject if he or she has implemented encryption as a technical and organisational protection measure” (Article 34 Par. 3 (a) GDPR).
  • 12. TRENDING According to Mozilla’s statistics, an encryption milestone was met in early 2017 when the average volume of encrypted traffic on the internet surpassed the average volume of unencrypted traffic.
  • 13. The legal obligations for encryption of personal data in Europe and Asia Field Fisher Waterhouse Is there a Focus on Encryption?
  • 14. If PII is used in the test environment, it is required to be protected at the same level that it is protected in the production environment, which can add significantly to the time and expense of testing the system. NIST If you are simulating a live environment, how does the IT department do that? The simple answer is that it grabs a bunch of data (technically, a sample) from its production database and runs that through the testing process. This isn’t an issue if the application is concerned with stock control but it is an issue if the application deals with individuals, as in a consumer sales application or a human resources application. In these cases, unless you have formal consent from the people whose data you are using, then simply sampling the production system for test data is illegal: you are using the data for purposes for which it was not provided and you are making that information available to people not authorized to see it. Work Group 29 Things to Consider…
  • 15. A major data point stands out in the 2017 DBIR report: the percentage of hacking related breaches involving the misuse of stolen or weak credentials has reached 81%, effectively putting it front and center in terms of tactics being leveraged by attackers. That is four out of five breaches. No other attacker technique detailed by Verizon comes close to this number. To add some perspective: last year Verizon reported that 63% of breaches involved credential misuse. These numbers only serve to solidify what experts in identity security know to be true - credential misuse is an epidemic and is rapidly getting worse. The technique is particularly damaging to the finance and healthcare industries. Things to Consider…
  • 16. The likelihood of data going OUT from INSIDE is greater than the likelihood of data being exfiltrated from OUTSIDE Things to Consider…
  • 17. OPTIONS (Easy to Hardest) RISK to PII/ PHI EXPOSURE (High to Low) SUBSET DATA COMING OUT OF PRODUCTION ACCESS MANAGEMENT & MONITORING FIELD PRESERVING DATA MASKING DATA PSEUDONYMIZATION FIELD/ROW/COLUMN ENCRYPTION FULL DISK ENCRYPTION Things to Consider…
  • 18. Other Steps to Take…
  • 19. There are options… where to start  Subsetting Data used in Test/QA and Dev  Data Minimization  Pseudonymisation / Masking  Rigid Roles Based Access Controls and Management  Reduce Unauthorized Access to PII/PHI  Automatic Logging and Monitoring of User Activities (Regular Testing)  Lock Down Download and Mobile Media Ability  Make “Data in Motion” and “At Rest” Unintelligible  Format Preserving Encryption  Field; Column; Row Encryption  Encrypt Workstations (& Laptops) or  Full Disk Encryption with Individual Workstation Keys  Provide end to end encryption (in motion and at rest) 12/18/2017 19
  • 20. Some First Steps…  Reduce the number of Access Points (Minimize User and Authorized Access)  Segregate, As Much As Possible, the Production Users – Testers - Developers and QA Users  Ensure Secure Data Transmission  Rigidly Restrict Access by Well Defined Role/Authorization  Prevent Data Download to Portable Media  Ensure Comprehensive Training on Handling PII/PHI as Part of Employee Code of Ethics  Reduce # of people who are “authorized to see” Sensitive Data (PII/PHI) 12/18/2017 20
  • 21. Some First Steps…  Minimize; Pseudonymise; Mask Data as Much as Viable  Ensure Data Secured “At Rest” and “In Motion”  Rigidly Restrict Access by Well Defined Role/Authorization  Implement End Point Security (DLP)  Deliberately Reduce Potential Attack Surfaces (Vulnerabilities) that Potentially Expose PII/PHI  Administer Regular Test & Audits on Internal and 3rd Party “Data Privacy by Design and Default” Procedures, Policies and Protocols 12/18/2017 21
  • 22. OPTIONS (not mutually exclusive) Data At Rest • Pseudonymisation and Masking • Rigid Roles Based Access Controls and Management • Encrypt Workstations (& Laptops) to Prevent Download and Export Data In Motion • Safe or Encrypted Transfer (SFTP (connection); encrypt the data) • TLS Tunnel and/or ZIX for mail transport Data In Use • Data Minimization • Data Subsetting • Rigid Roles Based Access Controls and Management • Pseudonymisation and Masking • Format Preserving Encryption • Field; Column; Row Encryption
  • 23. Options: Specific Ideas Data At Rest • File Share • BitLocker • USB/Media Lock down • DLP Policies • Restricted Access to Db Data In Motion • CASB • DLP • Network Protocols • ACLS • VPN • Firewall Data In Use • Rigid User Access Rules and Regular Reviews • Proactive User Lifecycle Management • Multi Factor Authentication