SlideShare a Scribd company logo
1 of 29
Download to read offline
Adding Privacy by Design
in Secure Application Development
Sebastien Deleersnyder
Agenda
• GDPR for developers
• Privacy by Design
• SDLC Introduction
• Embedding GDPR into the SDLC
• Q&A
GDPR
• General Data Protection Regulation
• Directly applicable within EU
• 25th of may 2018
• Goals
• Unification of Privacy Legislation
• Improve protection of personal data and data subject rights
GDPR – 7 Principles
• Justification
• Transparency
• Finality
• Proportionality
• Accuracy
• Confidentiality
• Accountability
Legal
Privacy by Design
Information Security
DevOps
GDPR Obligations
GDPR Article GDPR Content
25. Privacy by Design & Default
Implement appropriate technical and organizational measures, such as pseudonymisation, which are
designed to implement data-protection principles, such as data minimization, in an effective manner and
to integrate the necessary safeguards into the processing in order to meet the requirements of this
Regulation and protect the rights of data subjects.
The controller shall implement appropriate technical and organizational measures for ensuring that, by
default, only personal data which are necessary for each specific purpose of the processing are
processed. That obligation applies to the amount of personal data collected, the extent of their
processing, the period of their storage and their accessibility.
32. Security of Processing
Taking into account the state of the art, the costs of implementation and the nature, scope, context and
purposes of processing as well as the risk of varying likelihood and severity for the rights and
freedoms of natural persons the controller and the processor shall implement appropriate technical
and organizational measures to ensure a level of security appropriate to the risk
35. DPIA’s
Where a type of processing in particular using new technologies, and taking into account the nature,
scope, context and purposes of the processing, is likely to result in a high risk to the rights and
freedoms of natural persons, the controller shall, prior to the processing, carry out an assessment of
the impact on the protection of personal data.
For which applications?
• Does the application collect, store or use personal data?
• Does the application collect, store or use sensitive personal data?
(Like racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union
membership, health data, genetic data, biometric data, sex life or sexual orientation, past or spent
criminal convictions)
Design requirements
• Privacy impact assessments
• Review the security of your systems
• Review 3rd party data processors you interface with
Lifecycle requirements
• Minimize the amount of collected data.
• Minimize the amount of data shared with third parties.
• Where possible, pseudonymize personal data.
• Revisit contact forms, sign-up pages and customer-service entry points.
• Enable the regular deletion of data created through these processes.
User management
• Provide clear privacy- and data-sharing notices.
• Embed granular opt-ins throughout those notices..
• Separate consent for essential third-party data sharing from consent for analytics
and advertising.
End of life
• Periodically remind users to review and refresh their privacy settings.
• Allow users to download and delete old data.
• Delete the data of users who have closed their accounts.
• Delete all user data when the app’s life comes to an end.
Privacy by Design
• Adopt a privacy-first best-practice framework: Privacy by Design (PbD)
• Anticipate, manage and prevent privacy issues during design.
• Mitigate privacy risks, by not creating them in the first place.
PbD
“Privacy by Design (PbD) refers to the philosophy and approach of embedding privacy
into the design specifications of various technologies”
Ann Cavoukian, Information and Privacy Commissioner, Ontario
https://www.ipc.on.ca/resource/privacy-by-design/
7 foundational principles
• Proactive, not reactive
• Privacy as default setting
• Embedded into design
• Full functionality
• End-to-end security
• Visibility and transparency
• Respect for user privacy
PbD
• GDPR makes PbD and privacy by default legal requirements within the EU.
• Not only will you have to develop to PbD,
• But you will have to document your PbD development processes.
• That documentation must be made available to your DPA in the event of a data
breach or a consumer complaint.
PRODUCTIONTESTBUILDDESIGN
Web / Mobile Application Project (acquisition / development)
Threat Modeling
Source Code
Review (Static)
Security Testing
(Dynamic)
WAF Tuning
Coding
Guidelines
Configuration
Guidelines
Training
SAMM Assistance
Mapping GDPR / SAMM (teaser)
SM 5, 24, 32, 33
PC 7, 24, 32, (12-21)
EG 37, 39
TA 25, 35
SR 24, 28, 32
SA 25
DR 24, 25, 30, 32
IR 24, 25, 32
ST 24, 25, 32
IM 33, 34, 39
EH 25, 33
OE 32, 33
SAMM Domains GDPR Articles
Security Testing
Issue Management
Environment Hardening
Operational Enablement
Strategy & Metrics
Policy & Compliance
Education & Guidance
Threat Assessment
Security Requirements
Secure Architecture
Implementation Review
Design Review
https://www.toreon.com/application-security/embedding-gdpr-in-the-secure-
development-lifecycle-sdlc/
Integrate GDPR!
• Do not “bold on” extra compliance activities
• Integrate compliance in appsec / infosec activities
• Add “GDPR epics and stories” to product backlog & include in sprints.
Application risk classification decision tree
The unauthorized disclosure, modification or disruption of access to of the processed information on
operations, assets, or individuals:
has a major or critical adverse
impact
has a moderate adverse impact has a minor adverse impact
Important potential for fraud and
with direct impact on important
payment flows?
Important potential for fraud and
with direct impact on important
payment flows?
Limited potential for fraud that
can only lead to small amounts of
money being transferred?
Classified High
extensive access to large volumes
of confidential information
limited access to confidential
information and small amounts of
data
Classified Medium Classified Low
Threshold Data Privacy Impact Assessment
Full DPIA Light DPIA No GDPR impact
Internet facing Intranet facing Internet facing Intranet facing Internet facing Intranet facing
Yes No Yes No Yes No
Write Read-Only Write Read-Only
Developer awareness training
• Raise overall awareness and understanding
• Learn defensive code techniques to developers
• Split over several brown bag sessions
• Extend with GDPR and privacy topics
Secure coding guidelines /
Security requirements
• Add following topics:
• GDPR security compliance requirements (opt-in, consent details, information
portability… )
• Consider extra security controls to protect privacy sensitive information
• Apply least privilege, need to know and segregation of duties principles
• Create audit trail of data access
• Apply data retention requirements
• Consider encryption of data (stored or in transit)
AppSec + Privacy Champions
• Security Champions are active members of a team that may help to make decisions
about when to engage the Security Team
• Act as the "voice" of security for the given product or team
• Assist in the triage of security bugs for their team or area
• Consider combination with privacy champion role?
• Understands the privacy basics and organisation privacy context
• Identify potential privacy issues and involves the organisation DPO (if any)
Threat modeling
• Extend with privacy threats
• Apply privacy mitigations (e.g.
minimization /
pseudonymization)
• Apply encryption (risk based)
GDPR Risk Patterns
Example pattern:
Next step is to convert the Control to a SCRUM User Story
Threat (from data subject
perspective)
Impossible to exercise right to information - "Data subject cannot exercise his rights which
makes it possible for data subjects to file a complaint at local Data Protection Authority which
might lead to administrative fines. Data subject = person of whom personal data is processed"
Weakness No export functionality – “No exportability functionality (for users or admins) which would allow
the user to (directly or indirectly via an admin) export his personal data in a clear, readable
format and transport it towards another data controller.”
GDPR Transparency - Right to Data Portability - Art. 12/13/14/20
Control "All data gathered from a user should be exportable. This does not include derivate fields that
were created by the organization, such as customer segmentation fields. Provide or develop the
means that will contribute to answer data portability requests, such as download tools or
Application Programming Interfaces (API). They should guarantee that personal data are
transmitted in a structured, commonly used and machine-readable format, and they should be
encouraged to ensure the interoperability of the data format provided in the exercise of a data
portability request. See also - http://ec.europa.eu/newsroom/document.cfm?doc_id=44099
(Guidelines on the right to "data portability" by WP29)
3rd parties
• Explicitly evaluate risk from third-party components
• Check dependencies
• Extend with GDPR due diligence on processors
• Data processing agreements
• Verify that data is not transferred out of Europe
Security testing
• Include GDPR checks (manual or automated)
• Include GDPR checks in security reviews/reporting
• Assure pseudonymisation and/or anonymization of test data
• Minimize or remove production data from test environments
• Consider/review privacy scanning tools (e.g. scan for cookies, tags, forms and
policies )
Incident management
• Include GDPR impact assessment early in the incident management
process
• Identify/document breach indicators to assure timely follow-up
(for DPA notification)
• Forward / trigger on privacy or security related alerts/logs
(automate with WAF, SIEM)
Advantages
• GDPR and SDLC re-inforce each other
• (ab)use GDPR to start SDLC (business case)
• Improve SDLC by including GDPR activities
• SDLC “deliverables” will help demonstrate GDPR compliance
Key Success Factors
• Extend your appsec “community” with DPO & legal allies.
• Turn your DPO into an SDLC advocate
OWASP: seba@owasp.org
Toreon: seba@toreon.com
Twitter: @SebaDele
@Toreon_BE
http://www.linkedin.com/company/toreon

More Related Content

What's hot

Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityEQS Group
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015William Tanenbaum
 
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QAQA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QAQAFest
 
Data protection within development
Data protection within developmentData protection within development
Data protection within developmentowaspsuffolk
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection RegulationGrittyCC
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Kimberly Simon MBA
 
GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...Ardoq
 
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...Codemotion
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementEryk Budi Pratama
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)Kimberly Simon MBA
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
GDPR project board deck (example)
GDPR project board deck (example)GDPR project board deck (example)
GDPR project board deck (example)Tommy Vandepitte
 
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...ZoneFox
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Eryk Budi Pratama
 
Isaca csx2018-continuous assurance
Isaca csx2018-continuous assuranceIsaca csx2018-continuous assurance
Isaca csx2018-continuous assuranceFrançois Samarcq
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
 
Public sector breakfast club, October 2016, Exeter
Public sector breakfast club, October 2016, ExeterPublic sector breakfast club, October 2016, Exeter
Public sector breakfast club, October 2016, ExeterBrowne Jacobson LLP
 
Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS) Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS) The Canton Group
 

What's hot (20)

Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015
 
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QAQA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
 
Data protection within development
Data protection within developmentData protection within development
Data protection within development
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...
 
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
GDPR project board deck (example)
GDPR project board deck (example)GDPR project board deck (example)
GDPR project board deck (example)
 
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
 
Isaca csx2018-continuous assurance
Isaca csx2018-continuous assuranceIsaca csx2018-continuous assurance
Isaca csx2018-continuous assurance
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
Public sector breakfast club, October 2016, Exeter
Public sector breakfast club, October 2016, ExeterPublic sector breakfast club, October 2016, Exeter
Public sector breakfast club, October 2016, Exeter
 
Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS) Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS)
 

Similar to Toreon adding privacy by design in secure application development oss18 v20180608

GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security TwistSecurity Innovation
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?Jatin Kochhar
 
Creating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout PlanCreating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout PlanMediacurrent
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesDimitri Sirota
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsCillian Kieran
 
DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
ClicQA Security Testing Services GDPR
ClicQA Security Testing Services GDPRClicQA Security Testing Services GDPR
ClicQA Security Testing Services GDPRMike Peter
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowPECB
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 

Similar to Toreon adding privacy by design in secure application development oss18 v20180608 (20)

GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security Twist
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?
 
Creating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout PlanCreating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout Plan
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
 
DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
ClicQA Security Testing Services GDPR
ClicQA Security Testing Services GDPRClicQA Security Testing Services GDPR
ClicQA Security Testing Services GDPR
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 

More from Sebastien Deleersnyder

Use our Threat Modeling Playbook to Improve your Product Security
Use our Threat Modeling Playbookto Improve your Product Security Use our Threat Modeling Playbookto Improve your Product Security
Use our Threat Modeling Playbook to Improve your Product Security Sebastien Deleersnyder
 
Cyber Security Challenge Belgium - welcome to our belgian IT security community
Cyber Security Challenge Belgium - welcome to our belgian IT security communityCyber Security Challenge Belgium - welcome to our belgian IT security community
Cyber Security Challenge Belgium - welcome to our belgian IT security communitySebastien Deleersnyder
 
Toreon - pentesting - why every company should do this!
Toreon - pentesting - why every company should do this!Toreon - pentesting - why every company should do this!
Toreon - pentesting - why every company should do this!Sebastien Deleersnyder
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 sebaSebastien Deleersnyder
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSebastien Deleersnyder
 

More from Sebastien Deleersnyder (7)

Use our Threat Modeling Playbook to Improve your Product Security
Use our Threat Modeling Playbookto Improve your Product Security Use our Threat Modeling Playbookto Improve your Product Security
Use our Threat Modeling Playbook to Improve your Product Security
 
Support OWASP SAMM
Support OWASP SAMMSupport OWASP SAMM
Support OWASP SAMM
 
Support OWASP SAMM
Support OWASP SAMMSupport OWASP SAMM
Support OWASP SAMM
 
Cyber Security Challenge Belgium - welcome to our belgian IT security community
Cyber Security Challenge Belgium - welcome to our belgian IT security communityCyber Security Challenge Belgium - welcome to our belgian IT security community
Cyber Security Challenge Belgium - welcome to our belgian IT security community
 
Toreon - pentesting - why every company should do this!
Toreon - pentesting - why every company should do this!Toreon - pentesting - why every company should do this!
Toreon - pentesting - why every company should do this!
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
 

Recently uploaded

Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 

Recently uploaded (20)

Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 

Toreon adding privacy by design in secure application development oss18 v20180608

  • 1. Adding Privacy by Design in Secure Application Development Sebastien Deleersnyder
  • 2. Agenda • GDPR for developers • Privacy by Design • SDLC Introduction • Embedding GDPR into the SDLC • Q&A
  • 3. GDPR • General Data Protection Regulation • Directly applicable within EU • 25th of may 2018 • Goals • Unification of Privacy Legislation • Improve protection of personal data and data subject rights
  • 4. GDPR – 7 Principles • Justification • Transparency • Finality • Proportionality • Accuracy • Confidentiality • Accountability Legal Privacy by Design Information Security DevOps
  • 5. GDPR Obligations GDPR Article GDPR Content 25. Privacy by Design & Default Implement appropriate technical and organizational measures, such as pseudonymisation, which are designed to implement data-protection principles, such as data minimization, in an effective manner and to integrate the necessary safeguards into the processing in order to meet the requirements of this Regulation and protect the rights of data subjects. The controller shall implement appropriate technical and organizational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed. That obligation applies to the amount of personal data collected, the extent of their processing, the period of their storage and their accessibility. 32. Security of Processing Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons the controller and the processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk 35. DPIA’s Where a type of processing in particular using new technologies, and taking into account the nature, scope, context and purposes of the processing, is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall, prior to the processing, carry out an assessment of the impact on the protection of personal data.
  • 6. For which applications? • Does the application collect, store or use personal data? • Does the application collect, store or use sensitive personal data? (Like racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health data, genetic data, biometric data, sex life or sexual orientation, past or spent criminal convictions)
  • 7. Design requirements • Privacy impact assessments • Review the security of your systems • Review 3rd party data processors you interface with
  • 8. Lifecycle requirements • Minimize the amount of collected data. • Minimize the amount of data shared with third parties. • Where possible, pseudonymize personal data. • Revisit contact forms, sign-up pages and customer-service entry points. • Enable the regular deletion of data created through these processes.
  • 9. User management • Provide clear privacy- and data-sharing notices. • Embed granular opt-ins throughout those notices.. • Separate consent for essential third-party data sharing from consent for analytics and advertising.
  • 10. End of life • Periodically remind users to review and refresh their privacy settings. • Allow users to download and delete old data. • Delete the data of users who have closed their accounts. • Delete all user data when the app’s life comes to an end.
  • 11. Privacy by Design • Adopt a privacy-first best-practice framework: Privacy by Design (PbD) • Anticipate, manage and prevent privacy issues during design. • Mitigate privacy risks, by not creating them in the first place.
  • 12. PbD “Privacy by Design (PbD) refers to the philosophy and approach of embedding privacy into the design specifications of various technologies” Ann Cavoukian, Information and Privacy Commissioner, Ontario https://www.ipc.on.ca/resource/privacy-by-design/ 7 foundational principles • Proactive, not reactive • Privacy as default setting • Embedded into design • Full functionality • End-to-end security • Visibility and transparency • Respect for user privacy
  • 13. PbD • GDPR makes PbD and privacy by default legal requirements within the EU. • Not only will you have to develop to PbD, • But you will have to document your PbD development processes. • That documentation must be made available to your DPA in the event of a data breach or a consumer complaint.
  • 14. PRODUCTIONTESTBUILDDESIGN Web / Mobile Application Project (acquisition / development) Threat Modeling Source Code Review (Static) Security Testing (Dynamic) WAF Tuning Coding Guidelines Configuration Guidelines Training SAMM Assistance
  • 15. Mapping GDPR / SAMM (teaser) SM 5, 24, 32, 33 PC 7, 24, 32, (12-21) EG 37, 39 TA 25, 35 SR 24, 28, 32 SA 25 DR 24, 25, 30, 32 IR 24, 25, 32 ST 24, 25, 32 IM 33, 34, 39 EH 25, 33 OE 32, 33 SAMM Domains GDPR Articles Security Testing Issue Management Environment Hardening Operational Enablement Strategy & Metrics Policy & Compliance Education & Guidance Threat Assessment Security Requirements Secure Architecture Implementation Review Design Review https://www.toreon.com/application-security/embedding-gdpr-in-the-secure- development-lifecycle-sdlc/
  • 16. Integrate GDPR! • Do not “bold on” extra compliance activities • Integrate compliance in appsec / infosec activities • Add “GDPR epics and stories” to product backlog & include in sprints.
  • 17. Application risk classification decision tree The unauthorized disclosure, modification or disruption of access to of the processed information on operations, assets, or individuals: has a major or critical adverse impact has a moderate adverse impact has a minor adverse impact Important potential for fraud and with direct impact on important payment flows? Important potential for fraud and with direct impact on important payment flows? Limited potential for fraud that can only lead to small amounts of money being transferred? Classified High extensive access to large volumes of confidential information limited access to confidential information and small amounts of data Classified Medium Classified Low Threshold Data Privacy Impact Assessment Full DPIA Light DPIA No GDPR impact Internet facing Intranet facing Internet facing Intranet facing Internet facing Intranet facing Yes No Yes No Yes No Write Read-Only Write Read-Only
  • 18. Developer awareness training • Raise overall awareness and understanding • Learn defensive code techniques to developers • Split over several brown bag sessions • Extend with GDPR and privacy topics
  • 19. Secure coding guidelines / Security requirements • Add following topics: • GDPR security compliance requirements (opt-in, consent details, information portability… ) • Consider extra security controls to protect privacy sensitive information • Apply least privilege, need to know and segregation of duties principles • Create audit trail of data access • Apply data retention requirements • Consider encryption of data (stored or in transit)
  • 20. AppSec + Privacy Champions • Security Champions are active members of a team that may help to make decisions about when to engage the Security Team • Act as the "voice" of security for the given product or team • Assist in the triage of security bugs for their team or area • Consider combination with privacy champion role? • Understands the privacy basics and organisation privacy context • Identify potential privacy issues and involves the organisation DPO (if any)
  • 21. Threat modeling • Extend with privacy threats • Apply privacy mitigations (e.g. minimization / pseudonymization) • Apply encryption (risk based)
  • 22. GDPR Risk Patterns Example pattern: Next step is to convert the Control to a SCRUM User Story Threat (from data subject perspective) Impossible to exercise right to information - "Data subject cannot exercise his rights which makes it possible for data subjects to file a complaint at local Data Protection Authority which might lead to administrative fines. Data subject = person of whom personal data is processed" Weakness No export functionality – “No exportability functionality (for users or admins) which would allow the user to (directly or indirectly via an admin) export his personal data in a clear, readable format and transport it towards another data controller.” GDPR Transparency - Right to Data Portability - Art. 12/13/14/20 Control "All data gathered from a user should be exportable. This does not include derivate fields that were created by the organization, such as customer segmentation fields. Provide or develop the means that will contribute to answer data portability requests, such as download tools or Application Programming Interfaces (API). They should guarantee that personal data are transmitted in a structured, commonly used and machine-readable format, and they should be encouraged to ensure the interoperability of the data format provided in the exercise of a data portability request. See also - http://ec.europa.eu/newsroom/document.cfm?doc_id=44099 (Guidelines on the right to "data portability" by WP29)
  • 23. 3rd parties • Explicitly evaluate risk from third-party components • Check dependencies • Extend with GDPR due diligence on processors • Data processing agreements • Verify that data is not transferred out of Europe
  • 24. Security testing • Include GDPR checks (manual or automated) • Include GDPR checks in security reviews/reporting • Assure pseudonymisation and/or anonymization of test data • Minimize or remove production data from test environments • Consider/review privacy scanning tools (e.g. scan for cookies, tags, forms and policies )
  • 25. Incident management • Include GDPR impact assessment early in the incident management process • Identify/document breach indicators to assure timely follow-up (for DPA notification) • Forward / trigger on privacy or security related alerts/logs (automate with WAF, SIEM)
  • 26. Advantages • GDPR and SDLC re-inforce each other • (ab)use GDPR to start SDLC (business case) • Improve SDLC by including GDPR activities • SDLC “deliverables” will help demonstrate GDPR compliance
  • 27. Key Success Factors • Extend your appsec “community” with DPO & legal allies. • Turn your DPO into an SDLC advocate
  • 28.
  • 29. OWASP: seba@owasp.org Toreon: seba@toreon.com Twitter: @SebaDele @Toreon_BE http://www.linkedin.com/company/toreon