SlideShare a Scribd company logo
1
Marc Linster, Ph.D.
SENIOR VICE PRESIDENT, PRODUCT DEVELOPMENT
EnterpriseDB
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
2
AGENDA
What is GDPR?
Database software
requirements
Key GDPR articles
EDB Postgres or PostgreSQL
Working with EDB
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
3
GENERALIZED DATA
PROTECTION REGULATION
EUROPEAN REGULATION
• Replacing Data Protection
Directive (95/46/EC)
• Applicable to organizations
that offer goods and services
in the EU
• Or collect/analyze data about
EU residents
• Not limited to EU companies
or organizations
TAKE NOTE
• Effective May 25, 2018,
114 days and counting
• Focuses on Personally
Identifiable Information (PII):
Names, pictures, email, phone number,
birth dates
• Differentiates between
Controllers and Processors
• Regulation has teeth:
Significant fines
• More details:
https://www.eugdpr.org
GDPR is not explicit about technical implementation and best practices are still emerging…
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
4
GDPR AND THE
DATABASE VENDOR
AUDITED AND ROBUST CAPABILITIES TO
MANAGE DATA SECURELY AND SAFELY
MOSTLY BUSINESS AS USUAL
• High Availability/Disaster Recovery
• Robust authentication and password management
• Role based access control to the data
• Encryption at rest and in transit
• Auditing
• SQL Injection Attack Protection
• Data redaction
COMMON SENSE FOR THE ENTERPRISE DBA
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
5
GDPR ARTICLES THAT DESERVE
YOUR ATTENTION
ARTICLE 17 Right to be forgotten, i.e., the right to erasure
http://www.privacy-regulation.eu/en/article-17-right-to-erasure-'right-to-be-forgotten'-GDPR.htm
ARTICLE 20 Right to data portability
http://www.privacy-regulation.eu/en/article-20-right-to-data-portability-GDPR.htm
ARTICLE 25 Data protection by design and by default
http://www.privacy-regulation.eu/en/article-25-data-protection-by-design-and-by-default-GDPR.htm
ARTICLE 32 Security of processing
http://www.privacy-regulation.eu/en/article-32-security-of-processing-GDPR.htm
ARTICLE 33 Notification of breach to the supervisory authority
http://www.privacy-regulation.eu/en/article-33-notification-of-a-personal-data-breach-to-the-supervisory-authority-GDPR.htm
ARTICLE 34 Notification of breach to the data subjecthttp://www.privacy-regulation.eu/en/article-34-communication-of-a-personal-data-breach-to-the-data-subject-GDPR.htm
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
6
ARTICLE 17:
RIGHT TO BE FORGOTTEN
“The data subject shall have the right to obtain
from the controller the erasure of personal data
concerning him or her without undue delay and
the controller shall have the obligation to erase
personal data without undue delay.”
GDPR is not explicit about technical implementation and best practices are still emerging…
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
REALLY
‘RIGHT TO ERASURE’
• DATA SUBJECT ASKED TO BE FORGOTTEN
• Withdrew consent
• The data is no longer necessary for its purpose
• Or other reason
• Can ‘erasure’ time frame coincide with the data retention period?
7
ARTICLE 17:
RIGHT TO BE FORGOTTEN
“The data subject shall have the right to obtain
from the controller the erasure of personal data
concerning him or her without undue delay and
the controller shall have the obligation to erase
personal data without undue delay.”
•This invalidates the backups, WALs and PITR capabilities
•Potentially conflicts with Article 32 (Security of Processing) as it
invalidates backups
DO WE ERASE THE DATA FROM BACKUPS?
•Collect all data subjects that want to be erased in a script that is run
after a database restore
DO WE ERASE DATA AFTER RESTORATION?
•Log only non-PII data (if possible)
•Encrypt all logs with PII
•Expire and securely erase logs as soon as possible
HOW DO WE DEAL WITH LOGS?
GDPR is not explicit about technical implementation and best practices are still emerging…
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
8
ARTICLE 20:
RIGHT TO DATA
PORTABILITY
GDPR is not explicit about technical implementation and best practices are still emerging…
Data subject can request their
data in a commonly used
machine readable format
Consider using JSONB, XML,
or CSV to export query results
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
9
ARTICLE 25 - DATA PROTECTION
BY DESIGN AND BY DEFAULT
DATA MINIMIZATION
• Keep as little PII as possible
• Keep it for as short a time as
possible
DATA
PSEUDONYMISATION
• Separate the PII (e.g., name,
etc.) from the facts (e.g., what
was bought when from which
merchant) to minimize risk of
breach of PII during data
processing or statistical
evaluation
• Tightly manage access to
and encrypt PII
Beware of possible re-identification
(87% of the US population can be identified using zip code, sex and age)
(a.k.a. Privacy by Design)
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
ARTICLE 32 – SECURITY
OF PROCESSING
10
Access control, password
profiles
ACID Transactional
Redaction and data masking
Very explicit technical instructions Disk level or column level encryption
High Availability
Disaster Recovery
Process
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.10
• Pseudonymisation and encryption of personal data
• Ability to ensure the ongoing confidentiality, integrity,
availability and resilience of processing systems and
services
• Ability to restore the availability and access to personal
data in a timely manner in the event of a physical or
technical incident
• Process for regularly testing, assessing and evaluating the
effectiveness of technical and organizational measures for
ensuring the security of the processing
SECURITY CONSIDERATIONS:
A MULTI-LAYER APPROACH
11
DB Host
Database files
Data
base
Data
base
Data
baseData access control:
• Tables
• Columns
• Rows
• Views
• Security barriers
DB Server
Authentication:
• Users
• Roles
• Password profiles
Data Center Physical access
Host access
DB Server network
access
File system encryption
Data file encryption
Data encryption
• Column based
encryption
DML/DDL Auditing
SQL Injection Attack
Prevention
Encryption in transit
Data
redaction/masking
Key
Management
System
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
12
Using views, functions, roles and
search paths definitions
Username [enterprisedb]: privilegeduser
mycompany=> select * from employees;
id | name | ssn | phone | birthday
----+--------------+-------------+------------+--------------------
1 | Sally Sample | 020-78-9345 | 5081234567 | 02-FEB-61 00:00:00
1 | Jane Doe | 123-33-9345 | 6171234567 | 14-FEB-63 00:00:00
1 | Bill Foo | 123-89-9345 | 9781234567 | 14-FEB-63 00:00:00
(3 rows)
Username [enterprisedb]: redacteduser
mycompany=> select * from employees;
id | name | ssn | phone | birthday
----+--------------+-------------+------------+--------------------
1 | Sally Sample | xxx-xx-9345 | 5081234567 | 02-FEB-02 00:00:00
1 | Jane Doe | xxx-xx-9345 | 6171234567 | 14-FEB-02 00:00:00
1 | Bill Foo | xxx-xx-9345 | 9781234567 | 14-FEB-02 00:00:00
(3 rows)
DATA REDACTION USING
POSTGRES TECHNIQUES
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
INTEGRITY AND RESILIENCE:
HA AND DR AT WORK
13
GDPR requires integrity, availability
and resilience
Combine HA, DR and Monitoring
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
14
ARTICLES 33 AND 34:
NOTIFICATION OF BREACH
DETECTION OF BREACH
• Auditing
• SQL Injection Attack detection
NOTIFICATION IS NOT REQUIRED
• Article 33: “… if the personal data breach is unlikely to result in a risk for the rights and freedoms
of natural persons”
• Article 34: “… the controller has “implemented appropriate technical and organizational protection
measures” that “render the data unintelligible to any person who is not authorized to access it,
such as encryption”
ENCRYPTION OF THE DATA IS KEY – BUT ITS NOT A PANACEA
• Data encryption must be combined with physical security, authentication, encryption at rest,
auditing and access control
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
15
Self-Supported
PostgreSQL
Password Management Not available
Authorization PostgreSQL RLS
Auditing Limited audit
capabilities
SQL Injection Attacks Not available
Encryption at Rest
DIY
24/7 Support DIY
HA/DR
Multiple open
source tools
Data Redaction
DIY
Secure Configuration
Best Practices
DIY
EDB POSTGRES OR SELF-SUPPORTED PostgreSQL?
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
16
Self-Supported
PostgreSQL
EDB Postgres
Password Management Not available EDB Password Profiles
Authorization PostgreSQL RLS EDB Virtual Private Database
Auditing Limited audit
capabilities
EPAS Audit with DML auditing for INSERT, UPDATE, DELETE, TRUNCATE by user and
database, syslog integration, etc. Manage audit logs separately from server logs
SQL Injection Attacks Not available EDB SQL/Protect
Encryption at Rest
DIY
Proven full-disk encryption procedure
Extension of pgCrypto to support secure key management
24/7 Support DIY Enterprise level SLA support with direct access to Postgres community leaders
HA/DR
Multiple open
source tools
EDB Management Tool Suite:
EDB Failover Manager
EDB Backup and Recovery
EDB Postgres Enterprise Manager
Data Redaction
DIY
Custom Data Views
EPAS 11: Built-in data redaction
Secure Configuration
Best Practices
DIY
EDB Postgres Advanced Server Secure Technology
Implementation Guideline (http://iase.disa.mil)
EDB POSTGRES OR SELF-SUPPORTED PostgreSQL?
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
17
5 WAYS FOR THE DBA TO BE
POSTGRES GDPR-READY
1. Read the GDPR, consult with peers and
get advice
2. Are you a Processor or a Controller?
3. Create an inventory of the information
subject to GDPR
•What do you have? Where is it? Who has access?
VALIDATE, VALIDATE, VALIDATE, VALIDATE…..
GDPR is not explicit about
technical implementation and
best practices are still
emerging…
4. Key Decisions
• Is the data needed? Anything you can get rid of?
• Are the servers protected (physical access, network access, host
access, authentication)
• Is the data protected (ACLs, encryption in transit and at rest)?
• Are the servers backed up, highly available and covered by enterprise-
level support?
• Is the right auditing in place?
• Can you leverage data redaction, data masking, and
pseudonymisation to further limit access to sensitive data?
5. Process to identify breaches (unauthorized access) and notification;
Process to implement ‘right to erasure’
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
18
NEXT STEPS
Discuss your
Postgres
infrastructure
with EDB
• Reliable,
robust and
secure
• Well supported
Leverage EDB’s
free training to
make sure your
team is up to
speed
Get your team
Postgres
Certified
Move from self-
supported
Postgres to
EDB Postgres
Get best practice
advice and
leverage best-of
breed
infrastructure to
create a secure,
safe, audited,
and robust data
management
capability
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
Contact us at info@EnterpriseDB.com
info@enterprisedb.com
Questions?
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
THANK YOU
© Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.

More Related Content

What's hot

YugaByte DB Internals - Storage Engine and Transactions
YugaByte DB Internals - Storage Engine and Transactions YugaByte DB Internals - Storage Engine and Transactions
YugaByte DB Internals - Storage Engine and Transactions
Yugabyte
 
Operating and Supporting Delta Lake in Production
Operating and Supporting Delta Lake in ProductionOperating and Supporting Delta Lake in Production
Operating and Supporting Delta Lake in Production
Databricks
 
Presto Summit 2018 - 09 - Netflix Iceberg
Presto Summit 2018  - 09 - Netflix IcebergPresto Summit 2018  - 09 - Netflix Iceberg
Presto Summit 2018 - 09 - Netflix Iceberg
kbajda
 
Free Training: How to Build a Lakehouse
Free Training: How to Build a LakehouseFree Training: How to Build a Lakehouse
Free Training: How to Build a Lakehouse
Databricks
 
Lakehouse in Azure
Lakehouse in AzureLakehouse in Azure
Lakehouse in Azure
Sergio Zenatti Filho
 
Designing and developing vocabularies in RDF
Designing and developing vocabularies in RDFDesigning and developing vocabularies in RDF
Designing and developing vocabularies in RDFOpen Data Support
 
Neptune, the Graph Database | AWS Floor28
Neptune, the Graph Database | AWS Floor28Neptune, the Graph Database | AWS Floor28
Neptune, the Graph Database | AWS Floor28
Amazon Web Services
 
Apache Spark Data Source V2 with Wenchen Fan and Gengliang Wang
Apache Spark Data Source V2 with Wenchen Fan and Gengliang WangApache Spark Data Source V2 with Wenchen Fan and Gengliang Wang
Apache Spark Data Source V2 with Wenchen Fan and Gengliang Wang
Databricks
 
Distributed SQL Databases Deconstructed
Distributed SQL Databases DeconstructedDistributed SQL Databases Deconstructed
Distributed SQL Databases Deconstructed
Yugabyte
 
Databricks Fundamentals
Databricks FundamentalsDatabricks Fundamentals
Databricks Fundamentals
Dalibor Wijas
 
PySpark Best Practices
PySpark Best PracticesPySpark Best Practices
PySpark Best Practices
Cloudera, Inc.
 
Linked Open Data Principles, Technologies and Examples
Linked Open Data Principles, Technologies and ExamplesLinked Open Data Principles, Technologies and Examples
Linked Open Data Principles, Technologies and Examples
Open Data Support
 
Analyzing Flight Delays with Apache Spark, DataFrames, GraphFrames, and MapR-DB
Analyzing Flight Delays with Apache Spark, DataFrames, GraphFrames, and MapR-DBAnalyzing Flight Delays with Apache Spark, DataFrames, GraphFrames, and MapR-DB
Analyzing Flight Delays with Apache Spark, DataFrames, GraphFrames, and MapR-DB
Carol McDonald
 
Introduction to RDF & SPARQL
Introduction to RDF & SPARQLIntroduction to RDF & SPARQL
Introduction to RDF & SPARQLOpen Data Support
 
Programming in Spark using PySpark
Programming in Spark using PySpark      Programming in Spark using PySpark
Programming in Spark using PySpark
Mostafa
 
Building an open data platform with apache iceberg
Building an open data platform with apache icebergBuilding an open data platform with apache iceberg
Building an open data platform with apache iceberg
Alluxio, Inc.
 
Learn D3.js in 90 minutes
Learn D3.js in 90 minutesLearn D3.js in 90 minutes
Learn D3.js in 90 minutes
Jos Dirksen
 
Lakehouse Analytics with Dremio
Lakehouse Analytics with DremioLakehouse Analytics with Dremio
Lakehouse Analytics with Dremio
DimitarMitov4
 
Compact Representation of Large RDF Data Sets for Publishing and Exchange
Compact Representation of Large RDF Data Sets for Publishing and ExchangeCompact Representation of Large RDF Data Sets for Publishing and Exchange
Compact Representation of Large RDF Data Sets for Publishing and Exchange
WU (Vienna University of Economics and Business)
 

What's hot (20)

YugaByte DB Internals - Storage Engine and Transactions
YugaByte DB Internals - Storage Engine and Transactions YugaByte DB Internals - Storage Engine and Transactions
YugaByte DB Internals - Storage Engine and Transactions
 
Operating and Supporting Delta Lake in Production
Operating and Supporting Delta Lake in ProductionOperating and Supporting Delta Lake in Production
Operating and Supporting Delta Lake in Production
 
Presto Summit 2018 - 09 - Netflix Iceberg
Presto Summit 2018  - 09 - Netflix IcebergPresto Summit 2018  - 09 - Netflix Iceberg
Presto Summit 2018 - 09 - Netflix Iceberg
 
Free Training: How to Build a Lakehouse
Free Training: How to Build a LakehouseFree Training: How to Build a Lakehouse
Free Training: How to Build a Lakehouse
 
Lakehouse in Azure
Lakehouse in AzureLakehouse in Azure
Lakehouse in Azure
 
Designing and developing vocabularies in RDF
Designing and developing vocabularies in RDFDesigning and developing vocabularies in RDF
Designing and developing vocabularies in RDF
 
Neptune, the Graph Database | AWS Floor28
Neptune, the Graph Database | AWS Floor28Neptune, the Graph Database | AWS Floor28
Neptune, the Graph Database | AWS Floor28
 
Apache Spark Data Source V2 with Wenchen Fan and Gengliang Wang
Apache Spark Data Source V2 with Wenchen Fan and Gengliang WangApache Spark Data Source V2 with Wenchen Fan and Gengliang Wang
Apache Spark Data Source V2 with Wenchen Fan and Gengliang Wang
 
Distributed SQL Databases Deconstructed
Distributed SQL Databases DeconstructedDistributed SQL Databases Deconstructed
Distributed SQL Databases Deconstructed
 
Databricks Fundamentals
Databricks FundamentalsDatabricks Fundamentals
Databricks Fundamentals
 
PySpark Best Practices
PySpark Best PracticesPySpark Best Practices
PySpark Best Practices
 
Linked Open Data Principles, Technologies and Examples
Linked Open Data Principles, Technologies and ExamplesLinked Open Data Principles, Technologies and Examples
Linked Open Data Principles, Technologies and Examples
 
Analyzing Flight Delays with Apache Spark, DataFrames, GraphFrames, and MapR-DB
Analyzing Flight Delays with Apache Spark, DataFrames, GraphFrames, and MapR-DBAnalyzing Flight Delays with Apache Spark, DataFrames, GraphFrames, and MapR-DB
Analyzing Flight Delays with Apache Spark, DataFrames, GraphFrames, and MapR-DB
 
Introduction to RDF & SPARQL
Introduction to RDF & SPARQLIntroduction to RDF & SPARQL
Introduction to RDF & SPARQL
 
Programming in Spark using PySpark
Programming in Spark using PySpark      Programming in Spark using PySpark
Programming in Spark using PySpark
 
Hadoop and OpenStack
Hadoop and OpenStackHadoop and OpenStack
Hadoop and OpenStack
 
Building an open data platform with apache iceberg
Building an open data platform with apache icebergBuilding an open data platform with apache iceberg
Building an open data platform with apache iceberg
 
Learn D3.js in 90 minutes
Learn D3.js in 90 minutesLearn D3.js in 90 minutes
Learn D3.js in 90 minutes
 
Lakehouse Analytics with Dremio
Lakehouse Analytics with DremioLakehouse Analytics with Dremio
Lakehouse Analytics with Dremio
 
Compact Representation of Large RDF Data Sets for Publishing and Exchange
Compact Representation of Large RDF Data Sets for Publishing and ExchangeCompact Representation of Large RDF Data Sets for Publishing and Exchange
Compact Representation of Large RDF Data Sets for Publishing and Exchange
 

Similar to 5 Ways to Make Your Postgres GDPR-Ready

Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
EDB
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
EDB
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Cillian Kieran
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
EDB
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseCreating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres Database
EDB
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Mousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Mousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Tapan Biswas
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
VMUG IT
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
Precisely
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
Craig Mullins
 
How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18
Cloudera, Inc.
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
Denodo
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
Adrian Dumitrescu
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Edgar Alejandro Villegas
 
Webinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPRWebinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPR
Storage Switzerland
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
Garet Keller
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)
Peter GEELEN ✔
 

Similar to 5 Ways to Make Your Postgres GDPR-Ready (20)

Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
 
Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseCreating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres Database
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
 
How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
Webinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPRWebinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPR
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)
 

More from EDB

Cloud Migration Paths: Kubernetes, IaaS, or DBaaS
Cloud Migration Paths: Kubernetes, IaaS, or DBaaSCloud Migration Paths: Kubernetes, IaaS, or DBaaS
Cloud Migration Paths: Kubernetes, IaaS, or DBaaS
EDB
 
Die 10 besten PostgreSQL-Replikationsstrategien für Ihr Unternehmen
Die 10 besten PostgreSQL-Replikationsstrategien für Ihr UnternehmenDie 10 besten PostgreSQL-Replikationsstrategien für Ihr Unternehmen
Die 10 besten PostgreSQL-Replikationsstrategien für Ihr Unternehmen
EDB
 
Migre sus bases de datos Oracle a la nube
Migre sus bases de datos Oracle a la nube Migre sus bases de datos Oracle a la nube
Migre sus bases de datos Oracle a la nube
EDB
 
EFM Office Hours - APJ - July 29, 2021
EFM Office Hours - APJ - July 29, 2021EFM Office Hours - APJ - July 29, 2021
EFM Office Hours - APJ - July 29, 2021
EDB
 
Benchmarking Cloud Native PostgreSQL
Benchmarking Cloud Native PostgreSQLBenchmarking Cloud Native PostgreSQL
Benchmarking Cloud Native PostgreSQL
EDB
 
Las Variaciones de la Replicación de PostgreSQL
Las Variaciones de la Replicación de PostgreSQLLas Variaciones de la Replicación de PostgreSQL
Las Variaciones de la Replicación de PostgreSQL
EDB
 
NoSQL and Spatial Database Capabilities using PostgreSQL
NoSQL and Spatial Database Capabilities using PostgreSQLNoSQL and Spatial Database Capabilities using PostgreSQL
NoSQL and Spatial Database Capabilities using PostgreSQL
EDB
 
Is There Anything PgBouncer Can’t Do?
Is There Anything PgBouncer Can’t Do?Is There Anything PgBouncer Can’t Do?
Is There Anything PgBouncer Can’t Do?
EDB
 
Data Analysis with TensorFlow in PostgreSQL
Data Analysis with TensorFlow in PostgreSQLData Analysis with TensorFlow in PostgreSQL
Data Analysis with TensorFlow in PostgreSQL
EDB
 
Practical Partitioning in Production with Postgres
Practical Partitioning in Production with PostgresPractical Partitioning in Production with Postgres
Practical Partitioning in Production with Postgres
EDB
 
A Deeper Dive into EXPLAIN
A Deeper Dive into EXPLAINA Deeper Dive into EXPLAIN
A Deeper Dive into EXPLAIN
EDB
 
IOT with PostgreSQL
IOT with PostgreSQLIOT with PostgreSQL
IOT with PostgreSQL
EDB
 
A Journey from Oracle to PostgreSQL
A Journey from Oracle to PostgreSQLA Journey from Oracle to PostgreSQL
A Journey from Oracle to PostgreSQL
EDB
 
Psql is awesome!
Psql is awesome!Psql is awesome!
Psql is awesome!
EDB
 
EDB 13 - New Enhancements for Security and Usability - APJ
EDB 13 - New Enhancements for Security and Usability - APJEDB 13 - New Enhancements for Security and Usability - APJ
EDB 13 - New Enhancements for Security and Usability - APJ
EDB
 
Comment sauvegarder correctement vos données
Comment sauvegarder correctement vos donnéesComment sauvegarder correctement vos données
Comment sauvegarder correctement vos données
EDB
 
Cloud Native PostgreSQL - Italiano
Cloud Native PostgreSQL - ItalianoCloud Native PostgreSQL - Italiano
Cloud Native PostgreSQL - Italiano
EDB
 
New enhancements for security and usability in EDB 13
New enhancements for security and usability in EDB 13New enhancements for security and usability in EDB 13
New enhancements for security and usability in EDB 13
EDB
 
Cloud Native PostgreSQL - APJ
Cloud Native PostgreSQL - APJCloud Native PostgreSQL - APJ
Cloud Native PostgreSQL - APJ
EDB
 
EDB Postgres & Tools in a Smart City Project
EDB Postgres & Tools in a Smart City ProjectEDB Postgres & Tools in a Smart City Project
EDB Postgres & Tools in a Smart City Project
EDB
 

More from EDB (20)

Cloud Migration Paths: Kubernetes, IaaS, or DBaaS
Cloud Migration Paths: Kubernetes, IaaS, or DBaaSCloud Migration Paths: Kubernetes, IaaS, or DBaaS
Cloud Migration Paths: Kubernetes, IaaS, or DBaaS
 
Die 10 besten PostgreSQL-Replikationsstrategien für Ihr Unternehmen
Die 10 besten PostgreSQL-Replikationsstrategien für Ihr UnternehmenDie 10 besten PostgreSQL-Replikationsstrategien für Ihr Unternehmen
Die 10 besten PostgreSQL-Replikationsstrategien für Ihr Unternehmen
 
Migre sus bases de datos Oracle a la nube
Migre sus bases de datos Oracle a la nube Migre sus bases de datos Oracle a la nube
Migre sus bases de datos Oracle a la nube
 
EFM Office Hours - APJ - July 29, 2021
EFM Office Hours - APJ - July 29, 2021EFM Office Hours - APJ - July 29, 2021
EFM Office Hours - APJ - July 29, 2021
 
Benchmarking Cloud Native PostgreSQL
Benchmarking Cloud Native PostgreSQLBenchmarking Cloud Native PostgreSQL
Benchmarking Cloud Native PostgreSQL
 
Las Variaciones de la Replicación de PostgreSQL
Las Variaciones de la Replicación de PostgreSQLLas Variaciones de la Replicación de PostgreSQL
Las Variaciones de la Replicación de PostgreSQL
 
NoSQL and Spatial Database Capabilities using PostgreSQL
NoSQL and Spatial Database Capabilities using PostgreSQLNoSQL and Spatial Database Capabilities using PostgreSQL
NoSQL and Spatial Database Capabilities using PostgreSQL
 
Is There Anything PgBouncer Can’t Do?
Is There Anything PgBouncer Can’t Do?Is There Anything PgBouncer Can’t Do?
Is There Anything PgBouncer Can’t Do?
 
Data Analysis with TensorFlow in PostgreSQL
Data Analysis with TensorFlow in PostgreSQLData Analysis with TensorFlow in PostgreSQL
Data Analysis with TensorFlow in PostgreSQL
 
Practical Partitioning in Production with Postgres
Practical Partitioning in Production with PostgresPractical Partitioning in Production with Postgres
Practical Partitioning in Production with Postgres
 
A Deeper Dive into EXPLAIN
A Deeper Dive into EXPLAINA Deeper Dive into EXPLAIN
A Deeper Dive into EXPLAIN
 
IOT with PostgreSQL
IOT with PostgreSQLIOT with PostgreSQL
IOT with PostgreSQL
 
A Journey from Oracle to PostgreSQL
A Journey from Oracle to PostgreSQLA Journey from Oracle to PostgreSQL
A Journey from Oracle to PostgreSQL
 
Psql is awesome!
Psql is awesome!Psql is awesome!
Psql is awesome!
 
EDB 13 - New Enhancements for Security and Usability - APJ
EDB 13 - New Enhancements for Security and Usability - APJEDB 13 - New Enhancements for Security and Usability - APJ
EDB 13 - New Enhancements for Security and Usability - APJ
 
Comment sauvegarder correctement vos données
Comment sauvegarder correctement vos donnéesComment sauvegarder correctement vos données
Comment sauvegarder correctement vos données
 
Cloud Native PostgreSQL - Italiano
Cloud Native PostgreSQL - ItalianoCloud Native PostgreSQL - Italiano
Cloud Native PostgreSQL - Italiano
 
New enhancements for security and usability in EDB 13
New enhancements for security and usability in EDB 13New enhancements for security and usability in EDB 13
New enhancements for security and usability in EDB 13
 
Cloud Native PostgreSQL - APJ
Cloud Native PostgreSQL - APJCloud Native PostgreSQL - APJ
Cloud Native PostgreSQL - APJ
 
EDB Postgres & Tools in a Smart City Project
EDB Postgres & Tools in a Smart City ProjectEDB Postgres & Tools in a Smart City Project
EDB Postgres & Tools in a Smart City Project
 

Recently uploaded

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

5 Ways to Make Your Postgres GDPR-Ready

  • 1. 1 Marc Linster, Ph.D. SENIOR VICE PRESIDENT, PRODUCT DEVELOPMENT EnterpriseDB © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 2. 2 AGENDA What is GDPR? Database software requirements Key GDPR articles EDB Postgres or PostgreSQL Working with EDB © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 3. 3 GENERALIZED DATA PROTECTION REGULATION EUROPEAN REGULATION • Replacing Data Protection Directive (95/46/EC) • Applicable to organizations that offer goods and services in the EU • Or collect/analyze data about EU residents • Not limited to EU companies or organizations TAKE NOTE • Effective May 25, 2018, 114 days and counting • Focuses on Personally Identifiable Information (PII): Names, pictures, email, phone number, birth dates • Differentiates between Controllers and Processors • Regulation has teeth: Significant fines • More details: https://www.eugdpr.org GDPR is not explicit about technical implementation and best practices are still emerging… © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 4. 4 GDPR AND THE DATABASE VENDOR AUDITED AND ROBUST CAPABILITIES TO MANAGE DATA SECURELY AND SAFELY MOSTLY BUSINESS AS USUAL • High Availability/Disaster Recovery • Robust authentication and password management • Role based access control to the data • Encryption at rest and in transit • Auditing • SQL Injection Attack Protection • Data redaction COMMON SENSE FOR THE ENTERPRISE DBA © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 5. 5 GDPR ARTICLES THAT DESERVE YOUR ATTENTION ARTICLE 17 Right to be forgotten, i.e., the right to erasure http://www.privacy-regulation.eu/en/article-17-right-to-erasure-'right-to-be-forgotten'-GDPR.htm ARTICLE 20 Right to data portability http://www.privacy-regulation.eu/en/article-20-right-to-data-portability-GDPR.htm ARTICLE 25 Data protection by design and by default http://www.privacy-regulation.eu/en/article-25-data-protection-by-design-and-by-default-GDPR.htm ARTICLE 32 Security of processing http://www.privacy-regulation.eu/en/article-32-security-of-processing-GDPR.htm ARTICLE 33 Notification of breach to the supervisory authority http://www.privacy-regulation.eu/en/article-33-notification-of-a-personal-data-breach-to-the-supervisory-authority-GDPR.htm ARTICLE 34 Notification of breach to the data subjecthttp://www.privacy-regulation.eu/en/article-34-communication-of-a-personal-data-breach-to-the-data-subject-GDPR.htm © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 6. 6 ARTICLE 17: RIGHT TO BE FORGOTTEN “The data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay.” GDPR is not explicit about technical implementation and best practices are still emerging… © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved. REALLY ‘RIGHT TO ERASURE’ • DATA SUBJECT ASKED TO BE FORGOTTEN • Withdrew consent • The data is no longer necessary for its purpose • Or other reason • Can ‘erasure’ time frame coincide with the data retention period?
  • 7. 7 ARTICLE 17: RIGHT TO BE FORGOTTEN “The data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay.” •This invalidates the backups, WALs and PITR capabilities •Potentially conflicts with Article 32 (Security of Processing) as it invalidates backups DO WE ERASE THE DATA FROM BACKUPS? •Collect all data subjects that want to be erased in a script that is run after a database restore DO WE ERASE DATA AFTER RESTORATION? •Log only non-PII data (if possible) •Encrypt all logs with PII •Expire and securely erase logs as soon as possible HOW DO WE DEAL WITH LOGS? GDPR is not explicit about technical implementation and best practices are still emerging… © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 8. 8 ARTICLE 20: RIGHT TO DATA PORTABILITY GDPR is not explicit about technical implementation and best practices are still emerging… Data subject can request their data in a commonly used machine readable format Consider using JSONB, XML, or CSV to export query results © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 9. 9 ARTICLE 25 - DATA PROTECTION BY DESIGN AND BY DEFAULT DATA MINIMIZATION • Keep as little PII as possible • Keep it for as short a time as possible DATA PSEUDONYMISATION • Separate the PII (e.g., name, etc.) from the facts (e.g., what was bought when from which merchant) to minimize risk of breach of PII during data processing or statistical evaluation • Tightly manage access to and encrypt PII Beware of possible re-identification (87% of the US population can be identified using zip code, sex and age) (a.k.a. Privacy by Design) © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 10. ARTICLE 32 – SECURITY OF PROCESSING 10 Access control, password profiles ACID Transactional Redaction and data masking Very explicit technical instructions Disk level or column level encryption High Availability Disaster Recovery Process © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.10 • Pseudonymisation and encryption of personal data • Ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services • Ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident • Process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing
  • 11. SECURITY CONSIDERATIONS: A MULTI-LAYER APPROACH 11 DB Host Database files Data base Data base Data baseData access control: • Tables • Columns • Rows • Views • Security barriers DB Server Authentication: • Users • Roles • Password profiles Data Center Physical access Host access DB Server network access File system encryption Data file encryption Data encryption • Column based encryption DML/DDL Auditing SQL Injection Attack Prevention Encryption in transit Data redaction/masking Key Management System © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 12. 12 Using views, functions, roles and search paths definitions Username [enterprisedb]: privilegeduser mycompany=> select * from employees; id | name | ssn | phone | birthday ----+--------------+-------------+------------+-------------------- 1 | Sally Sample | 020-78-9345 | 5081234567 | 02-FEB-61 00:00:00 1 | Jane Doe | 123-33-9345 | 6171234567 | 14-FEB-63 00:00:00 1 | Bill Foo | 123-89-9345 | 9781234567 | 14-FEB-63 00:00:00 (3 rows) Username [enterprisedb]: redacteduser mycompany=> select * from employees; id | name | ssn | phone | birthday ----+--------------+-------------+------------+-------------------- 1 | Sally Sample | xxx-xx-9345 | 5081234567 | 02-FEB-02 00:00:00 1 | Jane Doe | xxx-xx-9345 | 6171234567 | 14-FEB-02 00:00:00 1 | Bill Foo | xxx-xx-9345 | 9781234567 | 14-FEB-02 00:00:00 (3 rows) DATA REDACTION USING POSTGRES TECHNIQUES © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 13. INTEGRITY AND RESILIENCE: HA AND DR AT WORK 13 GDPR requires integrity, availability and resilience Combine HA, DR and Monitoring © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 14. 14 ARTICLES 33 AND 34: NOTIFICATION OF BREACH DETECTION OF BREACH • Auditing • SQL Injection Attack detection NOTIFICATION IS NOT REQUIRED • Article 33: “… if the personal data breach is unlikely to result in a risk for the rights and freedoms of natural persons” • Article 34: “… the controller has “implemented appropriate technical and organizational protection measures” that “render the data unintelligible to any person who is not authorized to access it, such as encryption” ENCRYPTION OF THE DATA IS KEY – BUT ITS NOT A PANACEA • Data encryption must be combined with physical security, authentication, encryption at rest, auditing and access control © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 15. 15 Self-Supported PostgreSQL Password Management Not available Authorization PostgreSQL RLS Auditing Limited audit capabilities SQL Injection Attacks Not available Encryption at Rest DIY 24/7 Support DIY HA/DR Multiple open source tools Data Redaction DIY Secure Configuration Best Practices DIY EDB POSTGRES OR SELF-SUPPORTED PostgreSQL? © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 16. 16 Self-Supported PostgreSQL EDB Postgres Password Management Not available EDB Password Profiles Authorization PostgreSQL RLS EDB Virtual Private Database Auditing Limited audit capabilities EPAS Audit with DML auditing for INSERT, UPDATE, DELETE, TRUNCATE by user and database, syslog integration, etc. Manage audit logs separately from server logs SQL Injection Attacks Not available EDB SQL/Protect Encryption at Rest DIY Proven full-disk encryption procedure Extension of pgCrypto to support secure key management 24/7 Support DIY Enterprise level SLA support with direct access to Postgres community leaders HA/DR Multiple open source tools EDB Management Tool Suite: EDB Failover Manager EDB Backup and Recovery EDB Postgres Enterprise Manager Data Redaction DIY Custom Data Views EPAS 11: Built-in data redaction Secure Configuration Best Practices DIY EDB Postgres Advanced Server Secure Technology Implementation Guideline (http://iase.disa.mil) EDB POSTGRES OR SELF-SUPPORTED PostgreSQL? © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 17. 17 5 WAYS FOR THE DBA TO BE POSTGRES GDPR-READY 1. Read the GDPR, consult with peers and get advice 2. Are you a Processor or a Controller? 3. Create an inventory of the information subject to GDPR •What do you have? Where is it? Who has access? VALIDATE, VALIDATE, VALIDATE, VALIDATE….. GDPR is not explicit about technical implementation and best practices are still emerging… 4. Key Decisions • Is the data needed? Anything you can get rid of? • Are the servers protected (physical access, network access, host access, authentication) • Is the data protected (ACLs, encryption in transit and at rest)? • Are the servers backed up, highly available and covered by enterprise- level support? • Is the right auditing in place? • Can you leverage data redaction, data masking, and pseudonymisation to further limit access to sensitive data? 5. Process to identify breaches (unauthorized access) and notification; Process to implement ‘right to erasure’ © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 18. 18 NEXT STEPS Discuss your Postgres infrastructure with EDB • Reliable, robust and secure • Well supported Leverage EDB’s free training to make sure your team is up to speed Get your team Postgres Certified Move from self- supported Postgres to EDB Postgres Get best practice advice and leverage best-of breed infrastructure to create a secure, safe, audited, and robust data management capability © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved. Contact us at info@EnterpriseDB.com
  • 19. info@enterprisedb.com Questions? © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.
  • 20. THANK YOU © Copyright EnterpriseDB Corporation, 2018. All Rights Reserved.

Editor's Notes

  1. Where are we headed. What are issues. Should talk to team.