GENERAL DATA PROTECTION REGULATION
A developer’s story
DISCLAIMER
This is not “legal advice” and all points made should be checked
with your company’s legal department or consult a legal advisor
for your specific situation!
GDPR
What is it?
GENERAL DATA PROTECTION REGULATION (GDPR)
➤ More strict modification of already existing advisories (not rules) of best practices
towards protecting privacy data in EU
➤ Become law in all 28 EU countries on May 25, 2018
➤ Impact all businesses that collect and process privacy related data of EU data
subjects (even outside of EU)
“GDPR is a risk based approach
-Cindy E. Compert - IBM Security
WHAT GDPR WANTS TO PROTECT
Religion & Beliefs
Physical Appearance
Cultural Background
Sexual Orientation
Social Status
Financial Strength Mental State
Medical Conditions
Studies & Education
Memberships
Loyalty Programs
Identity & Nationality
WHAT IS CONSIDERED “PRIVATE DATA”?
➤ Name, email address, home address, phone number
➤ Social security number, national identity number, passport number
➤ Medical data, social status, religion, political views, sexual orientation, nationality,
financial balance
➤ Concert tickets, travel arrangements, library cards, loyalty programs
➤ IP addresses with timestamps
➤ and much more…
PII
Personal Identifiable Information
Information that can identify a single individual
RULE OF THUMB
Any piece of information that can point to a single individual
within the EU
WHY CARE ABOUT
GDPR?
Why do I need to invest so much in
being ready?
PROTECT & SERVE
➤ Protect data of EU data subjects
➤ Secure the way you store data
➤ Audit access to data
➤ Know what data is kept in the company
FINES & PENALTIES
➤ up to 10 million Euro or 2% of annual
global turnover
➤ up to 20 million Euro or 4% of annual
global turnover for more severe
infringements
IMPROVING KNOWLEDGE
on the private data collected and processed by your company and
who had access to it.
SERVICE BINGO
IMPROVE SECURITY
GDPR is a risk based approach to protect privacy data. All
measures to ensure this protection will improve your overal
security.
GDPR
COMPLIANCE
The nitty-gritty
ASSESS
ASSESS AND PREPARE
➤ Assess all data across
➤ Clients
➤ Employees
➤ Suppliers
➤ Contacts
➤ Develop a GDPR readiness roadmap
➤ Identify personal data
LOOK OUT FOR KEY IDENTIFIERS
➤ When privacy data contains keys
➤ email address
➤ social security number
➤ national identity number
➤ …
DESIGN
DESIGN
➤ Governance (how are you going to protect the data?)
➤ Training (how are employees handling the data?)
➤ Communication (how is data communicated?)
➤ Processes (how is data processed?)
STANDARDS AND PROCEDURES
➤ Create a company wide standards to handle data
➤ Create procedures for
➤ Collecting data
➤ Processing data
➤ Exchanging data
TRANSFORM
AUTOMATION IS KEY
➤ Develop and implement
➤ Procedures
➤ Processes
➤ Tools
➤ Deliver GDPR training
➤ Adhere to
➤ Privacy by design
➤ Security by design
DATA MANAGEMENT POLICIES
➤ Data must be protected
➤ Collect the minimum amount of data
➤ Store the data safely (with encryption) and securely
➤ Anonymise the data before processing
➤ Ensure these policies are enforced
OPERATE
IN OPERATION
➤ Execute automated business processes
➤ Monitor security and privacy
➤ Manage data access and consent rights
RIGHT FOR DATA INSIGHT AND “BE FORGOTTEN”
➤ Data subjects
➤ Can request insight in data collected
➤ Can request to be forgotten
CONFORM
MAKE SURE YOU CONFORM TO YOUR POLICIES
➤ Assess that your procedures are implemented
➤ Monitor data access
➤ Report on data activity
➤ Audit on a regular basis the security of your data
➤ Evaluate continuously adherence to GDPR standards
PATH TO GDPR COMPLIANCY
ASSESS TRANSFORMDESIGN OPERATE CONFORM
PATH TO GDPR COMPLIANCY
ASSESS TRANSFORMDESIGN OPERATE CONFORM
PATH TO GDPR COMPLIANCY
ASSESS TRANSFORMDESIGN OPERATE CONFORM
PATH TO GDPR COMPLIANCY
ASSESS TRANSFORMDESIGN OPERATE CONFORM
PATH TO GDPR COMPLIANCY
ASSESS TRANSFORMDESIGN OPERATE CONFORM
PATH TO GDPR COMPLIANCY
ASSESS TRANSFORMDESIGN OPERATE CONFORM
SOME EXAMPLES
Some technical tips
PASSWORD MANAGEMENT
➤ Don’t store data access passwords in common repository
➤ Don’t keep passwords in environment variables*
➤ Make use of an Identity Management System to manage
➤ SSH keys
➤ API keys
➤ DSN’s
➤ Public keys
(*) Why not use environment variables: diogomonica.com
USE A TEAM PASSWORD
MANAGER
ENFORCE 2FA FOR EVERYONE!
AUDIT TRAILS WITH MIDDLEWARE
➤ Log access to data
➤ Automate anonymising of privacy data
➤ Automate encryption of privacy data
What’s wrong with this picture?
Why display full name details?
Why display email addresses?
Why display phone numbers?
REDUCE ACCESS TO DETAILS
If a user has other ways to communicate with your clients,
remove the visible display of common data elements like full
names, email and shipment addresses and phone numbers.
Do you see the difference?
Not full name display
Integrated communication functionality
SAME FUNCTIONALITY, BUT KEEPS DATA HIDDEN
➤ Prevents accidentally exposing email and phone numbers (e.g. during a call)
➤ Hides details from end-user, but functionality is still provided
➤ Sending out an email uses build-in mail client
➤ Making calls uses a phone middleware used in the company
➤ Gives clear audit trail on who accessed what
NOT 100% PROTECTION, BUT…
➤ We remove the personal one-on-one communication with customers
➤ We add better access management on customer communication
➤ Full audit trail now possible as communication stays in-application
➤ Less chance for data loss as contact details are kept away from users
…AND DON’T FORGET TO ENCRYPT YOUR STORAGE & COMMUNICATIONS!
App
Data Storage
File Storage
Log Storage
Backup Storage
Public - private key exchange| encrypted data storage
EMAIL MARKETING
CONTACT DATA
Opt-in , always
NOT OPT-IN
/dev/null is the place to be
LIMIT EXPIRATION
Don’t keep longer than needed
AUTOMATE IT!
NEXT STEPS
Get started now to be ready
GET STARTED NOW
DON’T START BLINDLY
KNOW WHAT TO PROTECT!
EVALUATE REGULARLY
GOAL: PROTECT PRIVACY
SOME RESOURCES
➤ European Commission: Protection of personal data
➤ EU GDPR Infograph
➤ Charting the Course to GDPR: Setting Sail
➤ Deloitte GDPR Series
➤ InfoSecurity Group GDPR Checklist
➤ Securing MongoDB
➤ Table and tablespace encryption on MariaDB 10.1
THE CLOCK IS TICKING…
Please leave feedback on joind.in to improve this talk
and grab the slides on your way out.
in it2PROFESSIONAL PHP SERVICES
Michelangelo van Dam
Zend Certified Engineer
contact@in2it.be - www.in2it.be - T in2itvof - F in2itvof
Microsoft Azure
Zend Framework
Consulting
Quality Assurance &
Disaster Recovery
JOIN THE DISCUSSION
https://in2.se/gdpr-updates
General Data Protection Regulation, a developer's story

General Data Protection Regulation, a developer's story

  • 1.
    GENERAL DATA PROTECTIONREGULATION A developer’s story
  • 3.
    DISCLAIMER This is not“legal advice” and all points made should be checked with your company’s legal department or consult a legal advisor for your specific situation!
  • 4.
  • 5.
    GENERAL DATA PROTECTIONREGULATION (GDPR) ➤ More strict modification of already existing advisories (not rules) of best practices towards protecting privacy data in EU ➤ Become law in all 28 EU countries on May 25, 2018 ➤ Impact all businesses that collect and process privacy related data of EU data subjects (even outside of EU)
  • 6.
    “GDPR is arisk based approach -Cindy E. Compert - IBM Security
  • 8.
    WHAT GDPR WANTSTO PROTECT Religion & Beliefs Physical Appearance Cultural Background Sexual Orientation Social Status Financial Strength Mental State Medical Conditions Studies & Education Memberships Loyalty Programs Identity & Nationality
  • 9.
    WHAT IS CONSIDERED“PRIVATE DATA”? ➤ Name, email address, home address, phone number ➤ Social security number, national identity number, passport number ➤ Medical data, social status, religion, political views, sexual orientation, nationality, financial balance ➤ Concert tickets, travel arrangements, library cards, loyalty programs ➤ IP addresses with timestamps ➤ and much more…
  • 10.
    PII Personal Identifiable Information Informationthat can identify a single individual
  • 11.
    RULE OF THUMB Anypiece of information that can point to a single individual within the EU
  • 12.
    WHY CARE ABOUT GDPR? Whydo I need to invest so much in being ready?
  • 13.
    PROTECT & SERVE ➤Protect data of EU data subjects ➤ Secure the way you store data ➤ Audit access to data ➤ Know what data is kept in the company
  • 14.
    FINES & PENALTIES ➤up to 10 million Euro or 2% of annual global turnover ➤ up to 20 million Euro or 4% of annual global turnover for more severe infringements
  • 15.
    IMPROVING KNOWLEDGE on theprivate data collected and processed by your company and who had access to it.
  • 16.
  • 18.
    IMPROVE SECURITY GDPR isa risk based approach to protect privacy data. All measures to ensure this protection will improve your overal security.
  • 19.
  • 20.
  • 21.
    ASSESS AND PREPARE ➤Assess all data across ➤ Clients ➤ Employees ➤ Suppliers ➤ Contacts ➤ Develop a GDPR readiness roadmap ➤ Identify personal data
  • 22.
    LOOK OUT FORKEY IDENTIFIERS ➤ When privacy data contains keys ➤ email address ➤ social security number ➤ national identity number ➤ …
  • 23.
  • 24.
    DESIGN ➤ Governance (howare you going to protect the data?) ➤ Training (how are employees handling the data?) ➤ Communication (how is data communicated?) ➤ Processes (how is data processed?)
  • 25.
    STANDARDS AND PROCEDURES ➤Create a company wide standards to handle data ➤ Create procedures for ➤ Collecting data ➤ Processing data ➤ Exchanging data
  • 26.
  • 27.
    AUTOMATION IS KEY ➤Develop and implement ➤ Procedures ➤ Processes ➤ Tools ➤ Deliver GDPR training ➤ Adhere to ➤ Privacy by design ➤ Security by design
  • 28.
    DATA MANAGEMENT POLICIES ➤Data must be protected ➤ Collect the minimum amount of data ➤ Store the data safely (with encryption) and securely ➤ Anonymise the data before processing ➤ Ensure these policies are enforced
  • 29.
  • 30.
    IN OPERATION ➤ Executeautomated business processes ➤ Monitor security and privacy ➤ Manage data access and consent rights
  • 31.
    RIGHT FOR DATAINSIGHT AND “BE FORGOTTEN” ➤ Data subjects ➤ Can request insight in data collected ➤ Can request to be forgotten
  • 32.
  • 33.
    MAKE SURE YOUCONFORM TO YOUR POLICIES ➤ Assess that your procedures are implemented ➤ Monitor data access ➤ Report on data activity ➤ Audit on a regular basis the security of your data ➤ Evaluate continuously adherence to GDPR standards
  • 34.
    PATH TO GDPRCOMPLIANCY ASSESS TRANSFORMDESIGN OPERATE CONFORM
  • 35.
    PATH TO GDPRCOMPLIANCY ASSESS TRANSFORMDESIGN OPERATE CONFORM
  • 36.
    PATH TO GDPRCOMPLIANCY ASSESS TRANSFORMDESIGN OPERATE CONFORM
  • 37.
    PATH TO GDPRCOMPLIANCY ASSESS TRANSFORMDESIGN OPERATE CONFORM
  • 38.
    PATH TO GDPRCOMPLIANCY ASSESS TRANSFORMDESIGN OPERATE CONFORM
  • 39.
    PATH TO GDPRCOMPLIANCY ASSESS TRANSFORMDESIGN OPERATE CONFORM
  • 40.
  • 41.
    PASSWORD MANAGEMENT ➤ Don’tstore data access passwords in common repository ➤ Don’t keep passwords in environment variables* ➤ Make use of an Identity Management System to manage ➤ SSH keys ➤ API keys ➤ DSN’s ➤ Public keys (*) Why not use environment variables: diogomonica.com
  • 42.
    USE A TEAMPASSWORD MANAGER
  • 43.
    ENFORCE 2FA FOREVERYONE!
  • 44.
    AUDIT TRAILS WITHMIDDLEWARE ➤ Log access to data ➤ Automate anonymising of privacy data ➤ Automate encryption of privacy data
  • 45.
    What’s wrong withthis picture?
  • 46.
    Why display fullname details?
  • 47.
  • 48.
  • 49.
    REDUCE ACCESS TODETAILS If a user has other ways to communicate with your clients, remove the visible display of common data elements like full names, email and shipment addresses and phone numbers.
  • 50.
    Do you seethe difference?
  • 51.
  • 52.
  • 54.
    SAME FUNCTIONALITY, BUTKEEPS DATA HIDDEN ➤ Prevents accidentally exposing email and phone numbers (e.g. during a call) ➤ Hides details from end-user, but functionality is still provided ➤ Sending out an email uses build-in mail client ➤ Making calls uses a phone middleware used in the company ➤ Gives clear audit trail on who accessed what
  • 56.
    NOT 100% PROTECTION,BUT… ➤ We remove the personal one-on-one communication with customers ➤ We add better access management on customer communication ➤ Full audit trail now possible as communication stays in-application ➤ Less chance for data loss as contact details are kept away from users
  • 57.
    …AND DON’T FORGETTO ENCRYPT YOUR STORAGE & COMMUNICATIONS! App Data Storage File Storage Log Storage Backup Storage Public - private key exchange| encrypted data storage
  • 58.
  • 59.
  • 60.
    NOT OPT-IN /dev/null isthe place to be
  • 61.
  • 62.
  • 63.
    NEXT STEPS Get startednow to be ready
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
    SOME RESOURCES ➤ EuropeanCommission: Protection of personal data ➤ EU GDPR Infograph ➤ Charting the Course to GDPR: Setting Sail ➤ Deloitte GDPR Series ➤ InfoSecurity Group GDPR Checklist ➤ Securing MongoDB ➤ Table and tablespace encryption on MariaDB 10.1
  • 69.
    THE CLOCK ISTICKING…
  • 71.
    Please leave feedbackon joind.in to improve this talk and grab the slides on your way out.
  • 72.
    in it2PROFESSIONAL PHPSERVICES Michelangelo van Dam Zend Certified Engineer contact@in2it.be - www.in2it.be - T in2itvof - F in2itvof Microsoft Azure Zend Framework Consulting Quality Assurance & Disaster Recovery
  • 73.