SlideShare a Scribd company logo
1 of 25
Download to read offline
1VARONIS WHITEPAPER: GDPR Compliance With Varonis
WHITEPAPER
GDPR Compliance
With Varonis
VARONIS WHITEPAPER: GDPR Compliance With Varonis 2
Contents
Overview										3
Basic Identification								6
Identification and Risk								9
Prevent										12
Maintaining Least-Privileged Access						16
Minimize Sensitive Data								17
Right to be Forgotten								19
Monitor										20
Other Considerations								24
Get a GDPR Readiness Assessment						26
VARONIS WHITEPAPER: GDPR Compliance With Varonis 3
Overview
On May 25, 2018, the EU General Data Protection Regulation (GDPR)
will finally go into effect. It will be the most dramatic change in EU data
security and privacy law in over 20 years. Building on the existing Data
Protection Directive, the GDPR will enhance existing data security
and privacy protections and adds some significant new requirements,
including 72-hour breach notification and mandatory fines.
The GDPR is not a completely new model for data security but instead
builds on ideas from Privacy by Design (PbD) and other data security
principles. Broadly speaking, you could say that GDPR simply turns IT
practices and data security ideas into law. In fact, the GDPR (see article
40) will eventually allow companies (or in EU-speak, data controllers)
to show compliance to GDPR through compliance with existing data
standards, say ISO 27001 or PCI-DSS.
Is there an approach to data security that could encompass many
different standards and laws, including GDPR, and that could be the
basis of your organization’s program?
Data security researchers (see, for example, NIST’s CIS Framework)
generally organize data standards into broader categories. Here are
three that usually show up on these lists.
1.	Detect – Identify or spot vulnerabilities by analyzing file systems,
directory services, account activity, and user behavior. Develop the
organizational understanding to manage cybersecurity risk to systems,
assets, data, and capabilities
2.	Prevent/Protect - Limit the potential damage of future breaches
by locking down sensitive and stale data, reducing broad and global
access, and simplifying permissions.
3.	Sustain – Maintain a secure state by automating authorization
workflows, regular entitlement reviews, and the retention and
disposition of data. Monitor unusual user and system behaviors.
VARONIS WHITEPAPER: GDPR Compliance With Varonis 4
Of course, the GDPR is not an explicit data compliance standard with
hundreds of sub-controls. Instead, its requirements are in the form
of articles, offering general goals that have to be achieved, but not
saying how to achieve them. For more detailed insights into the GPDR,
we recommend reading our white paper, EU General Data Protection
Regulation:The New Rules for EU Data Security.
With this categorization scheme, we now we have a formula for
organizing the key GDPR requirements and a plan of attack:
Detect
Sustain
Protect
Security of Processing (Article 32)
Impact Assessment (Article 35)
Notification of a personal data breach
to the authority (Article 33)
Communication of a personal data breach
to the data subject (Article 34)
Data Protection by Design and Default (Article 25)
Right to Erasure (Article 17)
Records of Processing (Article 30)
DatAdvantage
GDPR Patterns
DataAlert
DatAdvantage
DataPrivilege
Data Transport Engine
DatAnswer
GDPR Article Varonis Product(s)
VARONIS WHITEPAPER: GDPR Compliance With Varonis 5
To summarize the three-step plan to meet GDPR: identify assets at
risk, protect those assets by maintaining appropriate permissions and
employ other privacy by design principles, and finally monitor these
assets for threats.
There’s actually a fourth step, which is that you feedback what you’ve
learned from the detection/monitoring phase back to the first step.
In other words, you fine-tune the first three steps based on what you
learned monitoring for threats or other weaknesses.
At Varonis, we take a data-centric view of data security. Through our
products, specifically DatAdvantage, DataPrivilege, DatAlert, and
our Data Classification Engine, we’re able to protect and eliminate or
reduce the risk of theft to part of the IT system where it makes most
sense to focus security efforts – not at the perimeter, which can be
bypassed, but on the data itself.
Let’s now walk through the plan.
VARONIS WHITEPAPER: GDPR Compliance With Varonis 6
In order to understand your potential vulnerabilities and risk, it makes
sense to do an inventory of your system, looking for specific assets and
risk. For Varonis, users, groups, and folders are the raw building blocks
used in all our risk reporting.
As a first step in complying with the GDPR, you’ll want to review basic
file system asset and account information. The following reports
generated by DatAdvantage can be of great help.
With DatAdvantage’s 4g report, Varonis lets security staff quickly
discover folders containing sensitive GDPR personal data, which is
often scattered across corporate file systems. This is great way to begin
the process of risk reduction.
Behind the scenes, the Varonis Data Classification Engine has already
scanned files using special filters that can identify patterns for personal
data identifier—phone number, account number, and rate the files
based on the number of hits.
Basic Identification
Classification Results (Selected Rules) Hit Count Risk%
Files with
Hits
Scan
Priority
GDPR UK (258/258), GDPR Belgium (120/120), GDPR Poland (120/120), American
Express (122/122), DE Personal Data Protection (120/120), MasterCard (175/175),
PCI Data Security Standards (PCI-DSS) (743/743), DE Landline Phone Numbers
(120/120), Visa (322/322)
2100 5.69 6 252
GDPR UK (134/134), GDPR Belgium (100/100), GDPR Poland (100/100), American
Express (102/102), DE Personal Data Protection (100/100), MasterCard (102/102),
PCI Data Security Standards (PCI-DSS) (446/446), DE Landline Phone Numbers
(100/100), Visa (322/322)
1394 3.77 2 254
▲▲ DatAdvantage 4g shows data classification results
VARONIS WHITEPAPER: GDPR Compliance With Varonis 7
To help specifically in identifying GDPR personal data, Varonis
introduced GDPR Patterns. It lets organizations discover GDPR personal
data — from national identification numbers to IBAN to blood type to
credit card information. This means that you’ll be able to generate
different reports on GDPR personal data: including permissions, open
access, and last time is was access or “staleness”.
Which GDPR data is no longer needed?
For folders, report 4f provides access paths, size, number of subfolder,
and the share path. By setting a last access time search criteria, one
can also produce a list of folders that have rarely used -- "stale date". As
we’ll see in the next section, this information helps in minimizing data
security risks.
Where is GDPR data overexposed?
Also very useful is the 4b report. It shows the permissions for a given
directory, optionally breaking out groups on the ACLs. It also provides
recommendations for group membership permission. If the access
controls for a known critical data set are to be inspected and adjusted
quickly, the 4b report will serve that purpose best.
The previous reports provide some core identification information
that then can be used in the remediations in the Protect phase.
As a reminder, the GDPR legislates common IT security practices
-- "implement appropriate technical and organizational measures".
DatAdvantage reports on widely exposed sensitive data, true group
membership lists, and stale data and user accounts will help IT group
implementing these measures.
8VARONIS WHITEPAPER: GDPR Compliance With Varonis
While the basic reports provide a good starting point, IT security staff
will need to dig deeper into the file system in order to identify sensitive
or critical data that can be a source of risk.
Generally, they’re looking for personally identifiable information (PII) or,
personal data, as it’s referred to in the GDPR, such as email addresses,
phone, driver’s license, and national identification numbers.
As we all know from major breaches over the last few years, poorly
protected folders — folders or directories with permission that are
for more generous than they need to be — is where the action is
for hackers. Once they get in, hackers simply leverage the access
permissions for the account they’ve taken over.
To help you dig deeper beyond the 4g report, the DatAdvantage 4c
report is the go-to report for finding globally exposed GDPR-style data
within specific files.
▲▲ Figure 3 DatAdvantage 4a report shows files with sensitive data that is globally available.
Access Path User/Group
Current
Permissions
Total Hit Count
(Inc. subfolders)
Classification Results
rojects11.txt (1)
Abstract
Everyone
FMRWX 10
GDPR UK (2/2), MasterCard (2/2), DE Personal
Data Protection (5/5), Visa (1/1)
C:share84ProjectData.txt (1)
Abstract
Everyone
FMRWX 113
GDPR Belgium (16/16), GDPR Poland (16/16), DE
Personal Data Protection (17/17), Mastercard
(5/5), PCI Data Security Standards (PCI-DSS)
(16/16), DE Landine Phone Numbers (16/16),
Visa (11/11)
Identification and Risk
VARONIS WHITEPAPER: GDPR Compliance With Varonis 9
There’s significant risk in having GDPR personal data in files accessible
to everyone in the organization. DatAdvantage’s 4a report shows you
these files. It is also possible to configure the 4a report to display only
folders that contain globally accessible GDPR personal data.
It can be used instead of the 4g report (from above) to provide a
more focused initial overview of your environment. By the way, as
you become more familiar with DataAdvantage’s flexible reporting
filters, you’ll likely find your own approach in your organization’s GDPR
security program.
We now have folders that are a potential source of data security risk.
What else do we want to identify?
Users that have accessed this folder is a good starting point.
There are a few ways to do this with DatAdvantage, but let’s just work
with the raw access audit log of every file event on a server, which is
available in the 2a report. By adding a directory path filter, you can
narrow down the results to a specific folder.
▲▲ Figure 4 DatAdvantage 2a report shows folders containing GDPR personal data.
Date User Name File Server Access Path Event Type
Event
Count
46806
7/6/2015 corp.localAlice Tanner Corpfs02b C:SharelegalCorporateFinance All event types 9
7/10/2015 corp.localAlice Tanner Corpfs02b C:SharelegalCorporateFinance All event types 35
7/2/2015 corp.localAlice Tanner Corpfs02b C:SharelegalCorporateFinance All event types 20
7/10/2015 corp.localAlice Tanner Corpfs02b
C:SharelegalCorporateDistrobution Agreements
DISTRIB (TEXIM EUROPE) V1 REVI.txt
All event types 1
1/7/2016 corp.localAlice Tanner Corpfs02b C:SharelegalCorporateCLA USES File opened 1
10VARONIS WHITEPAPER: GDPR Compliance With Varonis
Stale user accounts are another overlooked scenario that has potential
risk. Essentially, user accounts are often not disabled or removed
when an employee leaves the company or a contractor’s temporary
assignment is over.
For the proverbially disgruntled employee, it’s not unusual for this
former insider to still have access to his account after leaving the
company. Or for hackers to gain access to a no-longer used third-
party contractor’s account and then leverage that to hop into their real
target. In the Protect phase, we'll cover how Varonis can let you quickly
disable these accounts.
A full risk assessment program would also include identifying external
threats—new malware and new hacking techniques. It’s a separate
function from data asset identification. With this new real-world threat
intelligence, you then re-adjust the risk levels you’ve initially set and
then re-strategize. You’re doing this on a continual basis since it’s an
endless game of cyber cat-and-mouse with the hackers.
VARONIS WHITEPAPER: GDPR Compliance With Varonis 11
The second phase of the Varonis GDPR methodology involves
restructuring permissions, locking down or reducing overly exposed
personal data, and identifying data owners to ensure that the proper
preventive controls are in place. This eliminates areas of high
risk, reduces the potential surface area of attacks, simplifies the
environment, and begins involving stakeholders outside of IT Security.
In this phase, you’re also supporting a key GDPR principle,
minimization: taking the file and account information and looking for
ways to minimize who has access to personal data and reducing the
sensitive data.
Let’s see how we can do that in the Prevent phase.
One of the critical controls in this area is limiting access to only
authorized users. This is easier said done, but we’ve already laid the
groundwork above.
The guiding principles are least-privileged-access and role-based
access controls. In short: give appropriate users just the access they
need to their jobs or carry out roles.
Since we’re now at a point where we are about to take a real action,
we’ll need to shift from the DatAdvantage Reports section to the
Review area of DatAdvantage.
DataAdvantage provides graphical support for helping to identify
data ownership.
If you want to get more granular than just seeing who’s been accessing
a folder, you can view the actual access statistics of the top users with
the Statistics tab in DatAdvantage.
Prevent
VARONIS WHITEPAPER: GDPR Compliance With Varonis 12
This is a great help in understanding who is really using the folders.
The ultimate goal is to find the true users, and remove extraneous
groups and users, who perhaps needed occasional access but not as
part of their job role.
The key point is to first determine the folder’s owner — the one who
has the real knowledge and wisdom of what the folder is all about. This
may require some legwork on IT’s part in talking to the users, based on
the DatAdvantage stats, and working out the real-chain of command.
Once you use DatAdvantage to set the folder owners, these more
informed power users, as we’ll see, can independently manage who
gets access and whose access should be removed. The folder owner
will also automatically receive DatAdvantage reports, which will help
guide them in making future access decisions.
There’s another important point to make before we move one. IT has
long been responsible for provisioning access, without knowing the
business purpose. Varonis DatAdvantage assists IT in finding these
owners and then assisting them with minimizing or limiting access and
then formally managing the granting of access.
Another way DatAdvantage assists data owners is through its
automated recommendation engine. Owners often find these
recommendations helpful because they can easily spot users that have
changed roles, no longer need access, etc. The 4b report from the last
section would be helpful here since it lists ACL recommendations.
The DatAdvantage Work Area tab also directly provides
similar information.
VARONIS WHITEPAPER: GDPR Compliance With Varonis 13
Anyway, once the owner has done the housekeeping of restricting and
removing unnecessary users and groups, they’ll then want to put into
place a process for permission management.
Data standards and laws, such as GDPR, recognize the importance of
having security policies and procedures as part of on-going program –
i.e., not something an owner does once a year.
Varonis has an important part to play here as well.
▲▲ DatAdvantage 4g shows data classification results
VARONIS WHITEPAPER: GDPR Compliance With Varonis 14
How do ordinary users whose job role now requires then to access a
managed folder request permission to the owner?
This is where Varonis DataPrivilege enters the scene. Regular users will
interact with DataPrivilege to request access to a managed folder, and
then DataPrivilege manages the workflow process.
Maintaining Least-Privileged
Access
VARONIS WHITEPAPER: GDPR Compliance With Varonis 15
The owner of the folder has a parallel interface from which to receive
these requests and then grant or revoke permissions. The goal here is
to automate the workflow for enabling access permissions to be limited
to those who truly need it.
Another way to maintain least privilege access is to disable stale or
inactive accounts. They can be a potential security risk. For these
accounts, DatAdvantage lets you directly disable them through its
online interface, thereby saving you the extra step from having to go
into a directory service, say Active Directory!
VARONIS WHITEPAPER: GDPR Compliance With Varonis 16
Minimization is an important theme in security standards and laws.
These ideas are best represented in the principles of Privacy by Design
(PbD), which has good overall security advice: minimize the sensitive
data you collect, minimize who gets to see it, and minimize how long
you keep it.
In the case of GDPR these ideas are directly mentioned in “Data
Protection by Design and Default” (Article 25).
We’ve already seen how DatAdvantage can help minimize who gets
access. Another PbD principle is to reduce security risks by deleting or
archiving unnecessary or stale sensitive data embedded in files.
This make incredible sense, of course. Stale GDR personal data
can, for example, be consumer identifiers collected in short-term
marketing campaigns, but now residing in rarely used spreadsheets or
management presentations.
Your organization may no longer need it, but it’s just the kind of
monetizable data that hackers love to get their hands on.
Minimize Sensitive Data
VARONIS WHITEPAPER: GDPR Compliance With Varonis 17
DatAdvantage can find and identify file data that hasn’t been used
after a certain threshold date. Can the DatAdvantage 4f report (from
the previous section) be adjusted to find stale data that is also GDPR
personal data?
Yes.
You need to add the “hit count” filter and set the number of sensitive
data matches to an appropriate number.
The next step is to use the Data Transport Engine (DTE) available in
DatAdvantage (from the Tools menu). DTE allows you to create a rule
that will search for files to archive and delete if necessary.
The rule’s search criteria mirrors the same filters used in generating the
sensitive data reports in the previous section. The rule is doing the real
heavy-lifting of detecting and removing the stale, sensitive data.
Since the rule can also be saved, it then can be rerun again to enforce
the retention limits. Even better, DTE can automatically run the rule on
a periodic basis so then you never have to worry about stale GDPR
personal data in your file system.
VARONIS WHITEPAPER: GDPR Compliance With Varonis 18
Varonis can also help to meet another GDPR requirement, the “Right
to Erasure or Right to be Forgotten” (Article 17).
Under the GDPR, consumers have the right to request the deletion
of personal data related to them. This requirement covers not only
removal of personal data from structured databases but also within
file systems.
While it’s possible add to new classification rules to find a specific
customer— say using name or account number search criteria—
requesting deletion, an easier way to meet the right to erasure is
through Varonis DatAnswers. It’s our intelligent search engine for
scanning files.
Just as you would enter keywords into say Google, you can use
DatAnswers to find the files where personal data of a customer
requesting erasure is located. And then you can quarantine and adjust
the file’s data.
Right to be Forgotten
VARONIS WHITEPAPER: GDPR Compliance With Varonis 19
No data security strategy is foolproof, so you need a secondary
defense based on detection and monitoring controls: effectively you’re
watching the system and looking for unusual activities that would
indicate hacking.
Varonis DatAlert has a unique role to play in breach detection
because its underlying security platform is based on monitoring file
system activities.
By now everyone knows (or should know) that phishing and injection
attacks allow hackers to get around network defenses as they borrow
existing users’ credentials, and fully-undetectable (FUD) malware
means they can avoid detection by virus scanners.
So how do you detect the new generation of stealthy attackers?
No attacker can avoid using the file system to load their software,
copy files, and crawl a directory hierarchy looking for sensitive data to
exfiltrate. If you can spot their unique file activity patterns, then you
can stop before they remove or exfiltrate the data, or at least limit the
data exposure
We can’t cover all of DatAlert’s capabilities but since it has deep
insights into all file system information and events, and histories of user
behaviors, it’s in a powerful position to determine what’s out of the
normal activity range for a user account.
We call this user behavior analytics or UBA, and DatAlert comes
bundled with a suite of UBA threat models. You’re free to add your
own, of course, but the pre-defined models are quite powerful as is.
They include detecting crypto intrusions, ransomware activity, unusual
user access to sensitive data, unusual access to files containing
credentials, and more.
Monitor
VARONIS WHITEPAPER: GDPR Compliance With Varonis 20
All the alerts that are triggered can be tracked from the DatAlert
Dashboard. IT staff can either intervene and respond manually or
set up scripts to run automatically — for example, automatically
disable accounts.
The GDPR breach notification requirements (Articles 33, 34) requires
the supervising authority to be notified of the nature of the breach,
the categories of data and number of records exposed, as well as
measures taken to address the breach incident
DatAlert can provide all this information as well as remediate the
breach through automated scripts.
VARONIS WHITEPAPER: GDPR Compliance With Varonis 21
Here are few examples of some of the threat models that can
be detected and acted on:
Threat Model Description
Abnormal behavior:
Access to an unusual
number of idle GDPR files
Abnormal behavior:
Unusual number of GDPR
files with denied access
Abnormal behavior:
Unusual number of GDPR
files deleted or modified
Abnormal service behavior:
Access to atypical folders
containing GDPR data
A statistically significant increase was detected in number
of idle GDPR files opened by the user, compared to his
behavioral profile. Idle files are files the user did not create,
did not modify as part of his access, and previous to this
alert has not accessed them for a long time (though other
users may have accessed them recently). This may indicate
an attacker is searching for sensitive data assets to which
he has access, in order to exfiltrate the data.
A statistically significant increase was detected in the
number of GDPR files a user failed to access. This may
indicate an attacker is searching for and trying to gain
access to various data assets in order to exfiltrate data.
A statistically significant increase was detected in GDPR
files deleted or modified by the user, compared to his
behavioral profile. This may indicate an attacker is
attempting to damage or destroy critical data assets, as
part of a denial-of-service attack.
A service account accessed folders containing GDPR
data it had not accessed previously. Service accounts
can be expected to perform the same actions repeatedly;
therefore, a behavioral change is suspicious. Attackers may
impersonate a service account and exploit its privileges.
VARONIS WHITEPAPER: GDPR Compliance With Varonis 22
To help meet GDPR’s 72-hour window for providing information to
the data authorities, DatAlert lets you fine tune the threat behaviors to
focus just on GDPR personal data. In other words, you can get alerts
for, say, unusual file access to a folder containing phone or national
id numbers.
▲▲ Figure 9 DatAlert can be configured to trigger on threats affecting GDPR personal data.
VARONIS WHITEPAPER: GDPR Compliance With Varonis 23
It’s important to keep in mind that the GDPR is not a security standard.
It provides guidance – of course, enforced by the EU regulators – to
help ensure that personal data is protected.
GDPR asks you to “implement appropriate technical and organisational
measures to ensure a level of security appropriate to the risk” –
see Security of Processing (Article 25). The GDPR also says you
need a process for “regularly testing, assessing and evaluating the
effectiveness of technical and organisational measures”.
In other words, data security is something you do a continual basis.
We’ve shown in this white paper how Varonis software can help you
in a GDPR data security program. We didn’t cover all of Varonis’s
capabilities, and if you want more details, you can refer to our Varonis
Operational Plan. Ask our sales staff for a copy.
Many large organizations have likely been relying on existing data
security standards, such as PCI DSS or ISO 27001, and have already
implemented many of the detailed security controls in these standards.
If that’s the case, you’ll now need to focus these controls more
specifically on the protection of GDPR personal data.
The GDPR offers through its approved “codes of conduct” – see Article
40 – a way to gain “credit” for existing compliance.
Article 40 says that standards associations can submit their security
controls, say PCI DSS, to the European Data Protection Board
(EDPB) for approval. If a company then follows an officially approved
“code of conduct”, then this can dissuade regulators from taking
actions, including issuing fines, as long as the standards group — for
example, the PCI Security Standards Council — has its own monitoring
mechanism to check on compliance.
Other Considerations
VARONIS WHITEPAPER: GDPR Compliance With Varonis 24
The GDPR, though, goes a step further. It leaves open a path to official
certification of the data operations of a company, or as the GDPR refers
to it, a controller.
In effect, the regulators have the power (through article 40) to certify
a controller’s operations as GDPR compliant. The EU regulators can
also accredit other standards organization, such as PCI or ISO, to issue
directly these certifications as well.
The certifications will expire after three years at which point the
company will need to re-certify.
These certifications are entirely voluntary, but there’s obvious benefits to
many companies. The intent is to leverage the private sector’s existing
data standards, and give companies a more practical approach to
compliance with the GDPR’s technical and administrative requirements.
The EDPB is also expected to develop certification marks and seals for
consumers, as well as a registry of certified companies.
We’ll have to wait for more details to be published by the regulators on
GDPR certification.
VARONIS WHITEPAPER: GDPR Compliance With Varonis 25
Live Demo
Set up Varonis in your own environment and see how
to stop ransomware and protect your data.
info.varonis.com/demo
Data Risk Assessment
Get your risk profile, discover where you’re vulnerable,
and fix real security issues.
varonis.com/gdpr-ra
Get a GDPR
Readiness Assessment
Varonis is a
Fantastic Solution

More Related Content

What's hot

ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Kimberly Simon MBA
 
Top gdpr assessment tools
Top  gdpr assessment toolsTop  gdpr assessment tools
Top gdpr assessment toolsRajivarnan R
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditOmo Osagiede
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role HackerOne
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...Ulf Mattsson
 
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR RequirementsTeleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR RequirementsChris Doolittle
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Fasoo
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...Ulf Mattsson
 
Addressing analytics, data warehouse and Big Data challenges beyond database ...
Addressing analytics, data warehouse and Big Data challenges beyond database ...Addressing analytics, data warehouse and Big Data challenges beyond database ...
Addressing analytics, data warehouse and Big Data challenges beyond database ...Chris Doolittle
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processingTim Gough
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoGiulio Coraggio
 
Isaca new delhi india privacy and big data
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big dataUlf Mattsson
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 

What's hot (20)

ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Data Security Whitepaper
Data Security WhitepaperData Security Whitepaper
Data Security Whitepaper
 
Top gdpr assessment tools
Top  gdpr assessment toolsTop  gdpr assessment tools
Top gdpr assessment tools
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
 
Apani PCI-DSS Compliance
Apani PCI-DSS ComplianceApani PCI-DSS Compliance
Apani PCI-DSS Compliance
 
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR RequirementsTeleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
 
Addressing analytics, data warehouse and Big Data challenges beyond database ...
Addressing analytics, data warehouse and Big Data challenges beyond database ...Addressing analytics, data warehouse and Big Data challenges beyond database ...
Addressing analytics, data warehouse and Big Data challenges beyond database ...
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processing
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeo
 
Isaca new delhi india privacy and big data
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big data
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 

Similar to GDPR compliance with Varonis

Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
 
GDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation ChecklistGDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation ChecklistNetworkIQ
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore Seclore
 
GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.James Seville
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemIlonaThornburg83
 
Keep Calm and GDPR
Keep Calm and GDPRKeep Calm and GDPR
Keep Calm and GDPRMissMarvel70
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...ARMA International
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To ConsiderSymantec
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...Ulf Mattsson
 
Preparing for GDPR Compliance...
Preparing for GDPR Compliance...Preparing for GDPR Compliance...
Preparing for GDPR Compliance...James Ward
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAXeniT Solutions nv
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseElizabeth Dimit
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
Convince your board - Ten steps to GDPR compliance
Convince your board  - Ten steps to GDPR complianceConvince your board  - Ten steps to GDPR compliance
Convince your board - Ten steps to GDPR complianceDave James
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Adriana Sanford
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliancePeter Goldbrunner
 

Similar to GDPR compliance with Varonis (20)

Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
IDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPRIDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPR
 
GDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation ChecklistGDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation Checklist
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore
 
GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.
 
GDPR Webinar - feb
GDPR Webinar - febGDPR Webinar - feb
GDPR Webinar - feb
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
Keep Calm and GDPR
Keep Calm and GDPRKeep Calm and GDPR
Keep Calm and GDPR
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 
Preparing for GDPR Compliance...
Preparing for GDPR Compliance...Preparing for GDPR Compliance...
Preparing for GDPR Compliance...
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident Response
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Convince your board - Ten steps to GDPR compliance
Convince your board  - Ten steps to GDPR complianceConvince your board  - Ten steps to GDPR compliance
Convince your board - Ten steps to GDPR compliance
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 

Recently uploaded

Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargainingbartzlawgroup1
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Dr. Oliver Massmann
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理ss
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.tanughoshal0
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理e9733fc35af6
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书irst
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 

Recently uploaded (20)

Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 

GDPR compliance with Varonis

  • 1. 1VARONIS WHITEPAPER: GDPR Compliance With Varonis WHITEPAPER GDPR Compliance With Varonis
  • 2. VARONIS WHITEPAPER: GDPR Compliance With Varonis 2 Contents Overview 3 Basic Identification 6 Identification and Risk 9 Prevent 12 Maintaining Least-Privileged Access 16 Minimize Sensitive Data 17 Right to be Forgotten 19 Monitor 20 Other Considerations 24 Get a GDPR Readiness Assessment 26
  • 3. VARONIS WHITEPAPER: GDPR Compliance With Varonis 3 Overview On May 25, 2018, the EU General Data Protection Regulation (GDPR) will finally go into effect. It will be the most dramatic change in EU data security and privacy law in over 20 years. Building on the existing Data Protection Directive, the GDPR will enhance existing data security and privacy protections and adds some significant new requirements, including 72-hour breach notification and mandatory fines. The GDPR is not a completely new model for data security but instead builds on ideas from Privacy by Design (PbD) and other data security principles. Broadly speaking, you could say that GDPR simply turns IT practices and data security ideas into law. In fact, the GDPR (see article 40) will eventually allow companies (or in EU-speak, data controllers) to show compliance to GDPR through compliance with existing data standards, say ISO 27001 or PCI-DSS. Is there an approach to data security that could encompass many different standards and laws, including GDPR, and that could be the basis of your organization’s program? Data security researchers (see, for example, NIST’s CIS Framework) generally organize data standards into broader categories. Here are three that usually show up on these lists. 1. Detect – Identify or spot vulnerabilities by analyzing file systems, directory services, account activity, and user behavior. Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities 2. Prevent/Protect - Limit the potential damage of future breaches by locking down sensitive and stale data, reducing broad and global access, and simplifying permissions. 3. Sustain – Maintain a secure state by automating authorization workflows, regular entitlement reviews, and the retention and disposition of data. Monitor unusual user and system behaviors.
  • 4. VARONIS WHITEPAPER: GDPR Compliance With Varonis 4 Of course, the GDPR is not an explicit data compliance standard with hundreds of sub-controls. Instead, its requirements are in the form of articles, offering general goals that have to be achieved, but not saying how to achieve them. For more detailed insights into the GPDR, we recommend reading our white paper, EU General Data Protection Regulation:The New Rules for EU Data Security. With this categorization scheme, we now we have a formula for organizing the key GDPR requirements and a plan of attack: Detect Sustain Protect Security of Processing (Article 32) Impact Assessment (Article 35) Notification of a personal data breach to the authority (Article 33) Communication of a personal data breach to the data subject (Article 34) Data Protection by Design and Default (Article 25) Right to Erasure (Article 17) Records of Processing (Article 30) DatAdvantage GDPR Patterns DataAlert DatAdvantage DataPrivilege Data Transport Engine DatAnswer GDPR Article Varonis Product(s)
  • 5. VARONIS WHITEPAPER: GDPR Compliance With Varonis 5 To summarize the three-step plan to meet GDPR: identify assets at risk, protect those assets by maintaining appropriate permissions and employ other privacy by design principles, and finally monitor these assets for threats. There’s actually a fourth step, which is that you feedback what you’ve learned from the detection/monitoring phase back to the first step. In other words, you fine-tune the first three steps based on what you learned monitoring for threats or other weaknesses. At Varonis, we take a data-centric view of data security. Through our products, specifically DatAdvantage, DataPrivilege, DatAlert, and our Data Classification Engine, we’re able to protect and eliminate or reduce the risk of theft to part of the IT system where it makes most sense to focus security efforts – not at the perimeter, which can be bypassed, but on the data itself. Let’s now walk through the plan.
  • 6. VARONIS WHITEPAPER: GDPR Compliance With Varonis 6 In order to understand your potential vulnerabilities and risk, it makes sense to do an inventory of your system, looking for specific assets and risk. For Varonis, users, groups, and folders are the raw building blocks used in all our risk reporting. As a first step in complying with the GDPR, you’ll want to review basic file system asset and account information. The following reports generated by DatAdvantage can be of great help. With DatAdvantage’s 4g report, Varonis lets security staff quickly discover folders containing sensitive GDPR personal data, which is often scattered across corporate file systems. This is great way to begin the process of risk reduction. Behind the scenes, the Varonis Data Classification Engine has already scanned files using special filters that can identify patterns for personal data identifier—phone number, account number, and rate the files based on the number of hits. Basic Identification Classification Results (Selected Rules) Hit Count Risk% Files with Hits Scan Priority GDPR UK (258/258), GDPR Belgium (120/120), GDPR Poland (120/120), American Express (122/122), DE Personal Data Protection (120/120), MasterCard (175/175), PCI Data Security Standards (PCI-DSS) (743/743), DE Landline Phone Numbers (120/120), Visa (322/322) 2100 5.69 6 252 GDPR UK (134/134), GDPR Belgium (100/100), GDPR Poland (100/100), American Express (102/102), DE Personal Data Protection (100/100), MasterCard (102/102), PCI Data Security Standards (PCI-DSS) (446/446), DE Landline Phone Numbers (100/100), Visa (322/322) 1394 3.77 2 254 ▲▲ DatAdvantage 4g shows data classification results
  • 7. VARONIS WHITEPAPER: GDPR Compliance With Varonis 7 To help specifically in identifying GDPR personal data, Varonis introduced GDPR Patterns. It lets organizations discover GDPR personal data — from national identification numbers to IBAN to blood type to credit card information. This means that you’ll be able to generate different reports on GDPR personal data: including permissions, open access, and last time is was access or “staleness”. Which GDPR data is no longer needed? For folders, report 4f provides access paths, size, number of subfolder, and the share path. By setting a last access time search criteria, one can also produce a list of folders that have rarely used -- "stale date". As we’ll see in the next section, this information helps in minimizing data security risks. Where is GDPR data overexposed? Also very useful is the 4b report. It shows the permissions for a given directory, optionally breaking out groups on the ACLs. It also provides recommendations for group membership permission. If the access controls for a known critical data set are to be inspected and adjusted quickly, the 4b report will serve that purpose best. The previous reports provide some core identification information that then can be used in the remediations in the Protect phase. As a reminder, the GDPR legislates common IT security practices -- "implement appropriate technical and organizational measures". DatAdvantage reports on widely exposed sensitive data, true group membership lists, and stale data and user accounts will help IT group implementing these measures.
  • 8. 8VARONIS WHITEPAPER: GDPR Compliance With Varonis While the basic reports provide a good starting point, IT security staff will need to dig deeper into the file system in order to identify sensitive or critical data that can be a source of risk. Generally, they’re looking for personally identifiable information (PII) or, personal data, as it’s referred to in the GDPR, such as email addresses, phone, driver’s license, and national identification numbers. As we all know from major breaches over the last few years, poorly protected folders — folders or directories with permission that are for more generous than they need to be — is where the action is for hackers. Once they get in, hackers simply leverage the access permissions for the account they’ve taken over. To help you dig deeper beyond the 4g report, the DatAdvantage 4c report is the go-to report for finding globally exposed GDPR-style data within specific files. ▲▲ Figure 3 DatAdvantage 4a report shows files with sensitive data that is globally available. Access Path User/Group Current Permissions Total Hit Count (Inc. subfolders) Classification Results rojects11.txt (1) Abstract Everyone FMRWX 10 GDPR UK (2/2), MasterCard (2/2), DE Personal Data Protection (5/5), Visa (1/1) C:share84ProjectData.txt (1) Abstract Everyone FMRWX 113 GDPR Belgium (16/16), GDPR Poland (16/16), DE Personal Data Protection (17/17), Mastercard (5/5), PCI Data Security Standards (PCI-DSS) (16/16), DE Landine Phone Numbers (16/16), Visa (11/11) Identification and Risk
  • 9. VARONIS WHITEPAPER: GDPR Compliance With Varonis 9 There’s significant risk in having GDPR personal data in files accessible to everyone in the organization. DatAdvantage’s 4a report shows you these files. It is also possible to configure the 4a report to display only folders that contain globally accessible GDPR personal data. It can be used instead of the 4g report (from above) to provide a more focused initial overview of your environment. By the way, as you become more familiar with DataAdvantage’s flexible reporting filters, you’ll likely find your own approach in your organization’s GDPR security program. We now have folders that are a potential source of data security risk. What else do we want to identify? Users that have accessed this folder is a good starting point. There are a few ways to do this with DatAdvantage, but let’s just work with the raw access audit log of every file event on a server, which is available in the 2a report. By adding a directory path filter, you can narrow down the results to a specific folder. ▲▲ Figure 4 DatAdvantage 2a report shows folders containing GDPR personal data. Date User Name File Server Access Path Event Type Event Count 46806 7/6/2015 corp.localAlice Tanner Corpfs02b C:SharelegalCorporateFinance All event types 9 7/10/2015 corp.localAlice Tanner Corpfs02b C:SharelegalCorporateFinance All event types 35 7/2/2015 corp.localAlice Tanner Corpfs02b C:SharelegalCorporateFinance All event types 20 7/10/2015 corp.localAlice Tanner Corpfs02b C:SharelegalCorporateDistrobution Agreements DISTRIB (TEXIM EUROPE) V1 REVI.txt All event types 1 1/7/2016 corp.localAlice Tanner Corpfs02b C:SharelegalCorporateCLA USES File opened 1
  • 10. 10VARONIS WHITEPAPER: GDPR Compliance With Varonis Stale user accounts are another overlooked scenario that has potential risk. Essentially, user accounts are often not disabled or removed when an employee leaves the company or a contractor’s temporary assignment is over. For the proverbially disgruntled employee, it’s not unusual for this former insider to still have access to his account after leaving the company. Or for hackers to gain access to a no-longer used third- party contractor’s account and then leverage that to hop into their real target. In the Protect phase, we'll cover how Varonis can let you quickly disable these accounts. A full risk assessment program would also include identifying external threats—new malware and new hacking techniques. It’s a separate function from data asset identification. With this new real-world threat intelligence, you then re-adjust the risk levels you’ve initially set and then re-strategize. You’re doing this on a continual basis since it’s an endless game of cyber cat-and-mouse with the hackers.
  • 11. VARONIS WHITEPAPER: GDPR Compliance With Varonis 11 The second phase of the Varonis GDPR methodology involves restructuring permissions, locking down or reducing overly exposed personal data, and identifying data owners to ensure that the proper preventive controls are in place. This eliminates areas of high risk, reduces the potential surface area of attacks, simplifies the environment, and begins involving stakeholders outside of IT Security. In this phase, you’re also supporting a key GDPR principle, minimization: taking the file and account information and looking for ways to minimize who has access to personal data and reducing the sensitive data. Let’s see how we can do that in the Prevent phase. One of the critical controls in this area is limiting access to only authorized users. This is easier said done, but we’ve already laid the groundwork above. The guiding principles are least-privileged-access and role-based access controls. In short: give appropriate users just the access they need to their jobs or carry out roles. Since we’re now at a point where we are about to take a real action, we’ll need to shift from the DatAdvantage Reports section to the Review area of DatAdvantage. DataAdvantage provides graphical support for helping to identify data ownership. If you want to get more granular than just seeing who’s been accessing a folder, you can view the actual access statistics of the top users with the Statistics tab in DatAdvantage. Prevent
  • 12. VARONIS WHITEPAPER: GDPR Compliance With Varonis 12 This is a great help in understanding who is really using the folders. The ultimate goal is to find the true users, and remove extraneous groups and users, who perhaps needed occasional access but not as part of their job role. The key point is to first determine the folder’s owner — the one who has the real knowledge and wisdom of what the folder is all about. This may require some legwork on IT’s part in talking to the users, based on the DatAdvantage stats, and working out the real-chain of command. Once you use DatAdvantage to set the folder owners, these more informed power users, as we’ll see, can independently manage who gets access and whose access should be removed. The folder owner will also automatically receive DatAdvantage reports, which will help guide them in making future access decisions. There’s another important point to make before we move one. IT has long been responsible for provisioning access, without knowing the business purpose. Varonis DatAdvantage assists IT in finding these owners and then assisting them with minimizing or limiting access and then formally managing the granting of access. Another way DatAdvantage assists data owners is through its automated recommendation engine. Owners often find these recommendations helpful because they can easily spot users that have changed roles, no longer need access, etc. The 4b report from the last section would be helpful here since it lists ACL recommendations. The DatAdvantage Work Area tab also directly provides similar information.
  • 13. VARONIS WHITEPAPER: GDPR Compliance With Varonis 13 Anyway, once the owner has done the housekeeping of restricting and removing unnecessary users and groups, they’ll then want to put into place a process for permission management. Data standards and laws, such as GDPR, recognize the importance of having security policies and procedures as part of on-going program – i.e., not something an owner does once a year. Varonis has an important part to play here as well. ▲▲ DatAdvantage 4g shows data classification results
  • 14. VARONIS WHITEPAPER: GDPR Compliance With Varonis 14 How do ordinary users whose job role now requires then to access a managed folder request permission to the owner? This is where Varonis DataPrivilege enters the scene. Regular users will interact with DataPrivilege to request access to a managed folder, and then DataPrivilege manages the workflow process. Maintaining Least-Privileged Access
  • 15. VARONIS WHITEPAPER: GDPR Compliance With Varonis 15 The owner of the folder has a parallel interface from which to receive these requests and then grant or revoke permissions. The goal here is to automate the workflow for enabling access permissions to be limited to those who truly need it. Another way to maintain least privilege access is to disable stale or inactive accounts. They can be a potential security risk. For these accounts, DatAdvantage lets you directly disable them through its online interface, thereby saving you the extra step from having to go into a directory service, say Active Directory!
  • 16. VARONIS WHITEPAPER: GDPR Compliance With Varonis 16 Minimization is an important theme in security standards and laws. These ideas are best represented in the principles of Privacy by Design (PbD), which has good overall security advice: minimize the sensitive data you collect, minimize who gets to see it, and minimize how long you keep it. In the case of GDPR these ideas are directly mentioned in “Data Protection by Design and Default” (Article 25). We’ve already seen how DatAdvantage can help minimize who gets access. Another PbD principle is to reduce security risks by deleting or archiving unnecessary or stale sensitive data embedded in files. This make incredible sense, of course. Stale GDR personal data can, for example, be consumer identifiers collected in short-term marketing campaigns, but now residing in rarely used spreadsheets or management presentations. Your organization may no longer need it, but it’s just the kind of monetizable data that hackers love to get their hands on. Minimize Sensitive Data
  • 17. VARONIS WHITEPAPER: GDPR Compliance With Varonis 17 DatAdvantage can find and identify file data that hasn’t been used after a certain threshold date. Can the DatAdvantage 4f report (from the previous section) be adjusted to find stale data that is also GDPR personal data? Yes. You need to add the “hit count” filter and set the number of sensitive data matches to an appropriate number. The next step is to use the Data Transport Engine (DTE) available in DatAdvantage (from the Tools menu). DTE allows you to create a rule that will search for files to archive and delete if necessary. The rule’s search criteria mirrors the same filters used in generating the sensitive data reports in the previous section. The rule is doing the real heavy-lifting of detecting and removing the stale, sensitive data. Since the rule can also be saved, it then can be rerun again to enforce the retention limits. Even better, DTE can automatically run the rule on a periodic basis so then you never have to worry about stale GDPR personal data in your file system.
  • 18. VARONIS WHITEPAPER: GDPR Compliance With Varonis 18 Varonis can also help to meet another GDPR requirement, the “Right to Erasure or Right to be Forgotten” (Article 17). Under the GDPR, consumers have the right to request the deletion of personal data related to them. This requirement covers not only removal of personal data from structured databases but also within file systems. While it’s possible add to new classification rules to find a specific customer— say using name or account number search criteria— requesting deletion, an easier way to meet the right to erasure is through Varonis DatAnswers. It’s our intelligent search engine for scanning files. Just as you would enter keywords into say Google, you can use DatAnswers to find the files where personal data of a customer requesting erasure is located. And then you can quarantine and adjust the file’s data. Right to be Forgotten
  • 19. VARONIS WHITEPAPER: GDPR Compliance With Varonis 19 No data security strategy is foolproof, so you need a secondary defense based on detection and monitoring controls: effectively you’re watching the system and looking for unusual activities that would indicate hacking. Varonis DatAlert has a unique role to play in breach detection because its underlying security platform is based on monitoring file system activities. By now everyone knows (or should know) that phishing and injection attacks allow hackers to get around network defenses as they borrow existing users’ credentials, and fully-undetectable (FUD) malware means they can avoid detection by virus scanners. So how do you detect the new generation of stealthy attackers? No attacker can avoid using the file system to load their software, copy files, and crawl a directory hierarchy looking for sensitive data to exfiltrate. If you can spot their unique file activity patterns, then you can stop before they remove or exfiltrate the data, or at least limit the data exposure We can’t cover all of DatAlert’s capabilities but since it has deep insights into all file system information and events, and histories of user behaviors, it’s in a powerful position to determine what’s out of the normal activity range for a user account. We call this user behavior analytics or UBA, and DatAlert comes bundled with a suite of UBA threat models. You’re free to add your own, of course, but the pre-defined models are quite powerful as is. They include detecting crypto intrusions, ransomware activity, unusual user access to sensitive data, unusual access to files containing credentials, and more. Monitor
  • 20. VARONIS WHITEPAPER: GDPR Compliance With Varonis 20 All the alerts that are triggered can be tracked from the DatAlert Dashboard. IT staff can either intervene and respond manually or set up scripts to run automatically — for example, automatically disable accounts. The GDPR breach notification requirements (Articles 33, 34) requires the supervising authority to be notified of the nature of the breach, the categories of data and number of records exposed, as well as measures taken to address the breach incident DatAlert can provide all this information as well as remediate the breach through automated scripts.
  • 21. VARONIS WHITEPAPER: GDPR Compliance With Varonis 21 Here are few examples of some of the threat models that can be detected and acted on: Threat Model Description Abnormal behavior: Access to an unusual number of idle GDPR files Abnormal behavior: Unusual number of GDPR files with denied access Abnormal behavior: Unusual number of GDPR files deleted or modified Abnormal service behavior: Access to atypical folders containing GDPR data A statistically significant increase was detected in number of idle GDPR files opened by the user, compared to his behavioral profile. Idle files are files the user did not create, did not modify as part of his access, and previous to this alert has not accessed them for a long time (though other users may have accessed them recently). This may indicate an attacker is searching for sensitive data assets to which he has access, in order to exfiltrate the data. A statistically significant increase was detected in the number of GDPR files a user failed to access. This may indicate an attacker is searching for and trying to gain access to various data assets in order to exfiltrate data. A statistically significant increase was detected in GDPR files deleted or modified by the user, compared to his behavioral profile. This may indicate an attacker is attempting to damage or destroy critical data assets, as part of a denial-of-service attack. A service account accessed folders containing GDPR data it had not accessed previously. Service accounts can be expected to perform the same actions repeatedly; therefore, a behavioral change is suspicious. Attackers may impersonate a service account and exploit its privileges.
  • 22. VARONIS WHITEPAPER: GDPR Compliance With Varonis 22 To help meet GDPR’s 72-hour window for providing information to the data authorities, DatAlert lets you fine tune the threat behaviors to focus just on GDPR personal data. In other words, you can get alerts for, say, unusual file access to a folder containing phone or national id numbers. ▲▲ Figure 9 DatAlert can be configured to trigger on threats affecting GDPR personal data.
  • 23. VARONIS WHITEPAPER: GDPR Compliance With Varonis 23 It’s important to keep in mind that the GDPR is not a security standard. It provides guidance – of course, enforced by the EU regulators – to help ensure that personal data is protected. GDPR asks you to “implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk” – see Security of Processing (Article 25). The GDPR also says you need a process for “regularly testing, assessing and evaluating the effectiveness of technical and organisational measures”. In other words, data security is something you do a continual basis. We’ve shown in this white paper how Varonis software can help you in a GDPR data security program. We didn’t cover all of Varonis’s capabilities, and if you want more details, you can refer to our Varonis Operational Plan. Ask our sales staff for a copy. Many large organizations have likely been relying on existing data security standards, such as PCI DSS or ISO 27001, and have already implemented many of the detailed security controls in these standards. If that’s the case, you’ll now need to focus these controls more specifically on the protection of GDPR personal data. The GDPR offers through its approved “codes of conduct” – see Article 40 – a way to gain “credit” for existing compliance. Article 40 says that standards associations can submit their security controls, say PCI DSS, to the European Data Protection Board (EDPB) for approval. If a company then follows an officially approved “code of conduct”, then this can dissuade regulators from taking actions, including issuing fines, as long as the standards group — for example, the PCI Security Standards Council — has its own monitoring mechanism to check on compliance. Other Considerations
  • 24. VARONIS WHITEPAPER: GDPR Compliance With Varonis 24 The GDPR, though, goes a step further. It leaves open a path to official certification of the data operations of a company, or as the GDPR refers to it, a controller. In effect, the regulators have the power (through article 40) to certify a controller’s operations as GDPR compliant. The EU regulators can also accredit other standards organization, such as PCI or ISO, to issue directly these certifications as well. The certifications will expire after three years at which point the company will need to re-certify. These certifications are entirely voluntary, but there’s obvious benefits to many companies. The intent is to leverage the private sector’s existing data standards, and give companies a more practical approach to compliance with the GDPR’s technical and administrative requirements. The EDPB is also expected to develop certification marks and seals for consumers, as well as a registry of certified companies. We’ll have to wait for more details to be published by the regulators on GDPR certification.
  • 25. VARONIS WHITEPAPER: GDPR Compliance With Varonis 25 Live Demo Set up Varonis in your own environment and see how to stop ransomware and protect your data. info.varonis.com/demo Data Risk Assessment Get your risk profile, discover where you’re vulnerable, and fix real security issues. varonis.com/gdpr-ra Get a GDPR Readiness Assessment Varonis is a Fantastic Solution