Gdpr encryption and tokenization

Ulf Mattsson
Ulf MattssonChief Security Strategist at Protegrity
Encryption and
Tokenization
1Source: The IBM GDRP framework
Discover
Data Assets
Security
by Design
A GDPR FRAMEWORK - 5 KEY ACTIVITIES TO ADDRESS GDPR
2 2Source: Forrester 2017
BEST PRACTICE - FIND AND PROTECT YOUR SENSITIVE DATA
Field Real Data Tokenized / Pseudonymized
Name Joe Smith csu wusoj
Address 100 Main Street, Pleasantville, CA 476 srta coetse, cysieondusbak, CA
Date of Birth 12/25/1966 01/02/1966
Telephone 760-278-3389 760-389-2289
E-Mail Address joe.smith@surferdude.org eoe.nwuer@beusorpdqo.org
SSN 076-39-2778 076-28-3390
CC Number 3678 2289 3907 3378 3846 2290 3371 3378
Business URL www.surferdude.com www.sheyinctao.com
Fingerprint Encrypted
Photo Encrypted
X-Ray Encrypted
Healthcare / Financial
Services
Dr. visits, prescriptions, hospital stays and discharges, clinical,
billing, etc. Financial Services Consumer Products and activities
Protection methods can be equally applied to the actual data,
but not needed with de-identification
3Source: Customer Case Study
DATA DE-IDENTIFICATION / ANONYMIZATION
4 4Source: Gartner
ENCRYPTION & TOKENIZATION LEVELS
5 5Source: Gartner
Less Secure
More Secure
ENCRYPTION AND TOKENIZATION BEST PRACTICES
Tokens Tokens
PII
Tokens Tokens
• Protecting Personally Identifiable Information (PII), including
names, addresses, phone, email, policy and account numbers
• Compliance with EU Cross Border Data Protection Laws
• Utilizing Data Tokenization, and centralized policy, key
management, auditing, and reporting
6 6Source: International Customer Case Study
PROTECT PII DATA CROSS BORDER - BEST PRACTICES
*: Underlying sensitive value (USV)
Source: ANSI X9 7
ANSI X9 - CURRENT TOKENIZATION STANDARD
• Format-preserving encryption (FPE) is useful in situations where fixed-format data, such as
Primary account numbers Social Security numbers, must be protected.
• FPE will limit changes to existing communication protocols, database schemata or application
code.
8Source: Accredited Standards Committee ANSI X9
2018 ANSI X9 STANDARD FOR FORMAT PRESERVING ENCRYPTION
Quantum computers will be able to instantly break the encryption of sensitive
data protected by today's strongest security, warns the head of IBM Research.
This could happen in a little more than five years because of advances in quantum
computer technologies.
Encryption and Tokenization today are effective means to protect a data subject's PII per the GDPR
regulation, and that they will not be soon due to the enhancements in Quantum computing.
9Source: IBM and ZDNet
STANDARD ENCRYPTION AND TOKENIZATION ARE EFFECTIVE TO MEET GDPR
10Source: THALES at RSA Conference 2018
Quantum Cryptanalysis is effectively “breaking cryptology with quantum computers”
THIS IS A BIG THREAT!
If our cryptography is broken, then everything breaks!
Glover’s algorithm
Given a functioning Universal Quantum Computer,
Glover’s algorithm weakens the currently assumed
strength of symmetric algorithms like AES
Shor’s algorithm
Given a functioning Universal Quantum Computer,
Shor’s algorithm weakens the currently assumed
strength of symmetric algorithms like RSA, ECC
QUANTUM CRYPTANALYSIS
Quantum cryptography
allows communication
that is guaranteed to be
secure, thanks to the
laws of physics.
And it is becoming
increasingly important.
Physicists have long known
that quantum computers will be
able to break almost all other
types of cryptography. Since
these devices are becoming
more capable, the writing is on
the wall for conventional
encryption.
11Source: MIT University
CHINESE SATELLITES USING QUANTUM ENCRYPTION
12Source: Thales
Quantum Cryptography is effectively “doing cryptography with quantum computers”
There are several potential techniques
One thing that is well established is Quantum Key Distribution
• This has almost nothing to do with Quantum Computing
• Transmit keys from one place to another as quantum state in photons
• Relies on the quantum mechanical phenomenon that you cannot observe a
photon without disturbing its state
• Theoretically extremely secure, but suffers practical issues
Famously recently used by China in satellites
QUANTUM CRYPTOGRAPHY
13Source: scmp.com/news/china/economy
The mission can provide
unbreakable secret
communications
channels, in principle,
using the laws of
quantum science.
Is China winning the race
with the US to develop
quantum computers?
Chinese funding to research the next generation in
computing may be dwarfing American efforts,
according to US experts.
IS CHINA WINNING THE RACE?
Quantum key distribution (QKD), which is the process of using quantum communication to establish a shared key
between two parties (Alice and Bob, for example) without a third party (Eve) learning anything about that key,
even if Eve can eavesdrop on all communication between Alice and Bob.
If Eve tries to learn information about the key being established, key establishment will fail causing Alice and Bob
to notice.
Once the key is established, it is then typically used for encrypted communication using classical techniques.
1414Source: C. H. Bennett and G. Brassard: Quantum cryptography: Public key distribution
What is Quantum Key Distribution?
HOW IS QUANTUM KEY CRYPTOGRAPHY DIFFERENT?
15
15Source: The RSAC 2018 Conference
Zulfikar Ramzan, Ph.D.
Chief Technology Officer, RSA
Moderator
Whitfield Diffie
Cryptographer and Security Expert,
Cryptomathic
Paul Kocher
Security Researcher,
Independent
Moxie Marlinspike
Founder,
Signal
Ronald Rivest
MIT Institute Professor,
MIT
Adi Shamir
Borman Professor of Computer Science,
The Weizmann Institute, Israel
The three inventors, which the RSA patent is named after, are Ronald Rivest, Adi Shamir, and Leonard Adleman.
*: Matthew Rosenfield, known as Moxie Marlinspike, is an American computer security researcher,
*
THE RSAC 2018 CRYPTOGRAPHERS PANEL
Lattice-based cryptography is the
generic term for constructions of
cryptographic primitives that involve
lattices, either in the construction itself
or in the security proof.
Lattice-based constructions are
currently important candidates for post-
quantum cryptography.
Unlike more widely used and known
public-key schemes such as the RSA,
Diffie-Hellman or Elliptic-Curve
cryptosystems.
16Source: RSAC 2018
Will Lattice-based cryptography to replace RSA, ECC and D-H?
LATTICE-BASED CRYPTOLOGY
17
ISO/IEC 27002 Security Controls
ISO/IEC 27001
ISO/IEC 27005 Risk Management
ISO/IEC 29134 Privacy Impact
ISO/IEC 27018 PII in Cloud
ISO/IEC 29101 Privacy by Design
ISO/IEC 29100 Privacy for Cloud
ISO/IEC 17788 Definitions
ISO/IEC 27000 series –
ITSEC Management
A company that has implemented ISO 27001
has already done at least half the job of
achieving GDPR compliance
Source: itgovernance.co.uk
Information technology - Security techniques
- Code of practice for protection of
personally identifiable information (PII) in
public clouds acting as PII processors
International Organization for Standardization
ISO 27001 HALF THE JOB OF ACHIEVING GDPR COMPLIANCE
• Methods a quantum computer could use to break
encryption and how these attacks will specifically affect the
different cryptographic methods used today
• Updates on the work being done by NIST to identify
quantum safe algorithms
• Guidance for financial services organizations to mitigate
quantum computing risk
• Next steps that X9, as a standards body, needs to take over
the next few years to prepare for the post-quantum world
18Source: MIT University and ANXI X9
NIST and ANSI X9 Defining Quantum Safe Encryption Algorithms
PREPARE FOR THE POST QUANTUM WORLD
19
GDPR and TokenEx
If you are a data controller who has a valid reason--other than consent from the data subject--for the processing of his or her
personal data “for a purpose other than that for which the personal data have been collected”, Article 6(4)(e) obligates you to
use “appropriate safeguards, which may include encryption or pseudonymization.
The TokenEx platform enables you to pseudonymize personal data within your environment, by replacing it with tokens, and
storing the personal data in an encrypted TokenEx cloud token vault.
The GDPR requires “data protection by design and by default.” Article 25(1) specifically obligates controllers to
“…implement appropriate technical and organizational measures, such as pseudonymization.”
The TokenEx platform enables you to pseudonymize personal data within your environment, replacing it with tokens, and
storing the data in an encrypted TokenEx cloud token vault. The pseudonymized data will likely present a lower risk, thus
possibly reducing the number of additional security measures required to meet this obligation. Using a cloud-based tokenization
provider like TokenEx to pseudonymize direct identifiers in the personal data your controls is a clear indication that you are
considering data protection by design and striving to implement technical measures appropriate to the risk.
Article 32(1) obligates controllers as well as processors to “implement appropriate technical and organizational
measures to ensure a level of security appropriate to the risk,” including pseudonymization of personal data.
The TokenEx platform enables you to pseudonymize personal data within your environment, replacing it with tokens, and
storing the data in an encrypted TokenEx cloud token vault. The pseudonymized data will likely present a lower risk, thus
possibly reducing the number of additional security measures required to meet this obligation.
TokenEx:
“Tokenization”
GDPR Article 6(4)e):
“Encryption”
TokenEx:
“Tokenization and
Encryption”
GDPR Article 25(1):
“Data Protection by
Design” Article 25(1):
“Encryption”
GDPR Article 32(1)
“Pseudonymization of
Personal Data”
TokenEx:
“Pseudonymize
Personal Data”
KEY ACTIVITIES TO ADDRESS GDPR
Source: https://tokenex.com/gdpr
20 20
REQUIREMENTS SUPPORTED
Tokenization
Encryption
Pseudonymization
De-identification
1 of 20

Recommended

US Patriot Act OSCON2012 David Mertz by
US Patriot Act OSCON2012 David MertzUS Patriot Act OSCON2012 David Mertz
US Patriot Act OSCON2012 David MertzOSCON Byrum
1K views10 slides
Cryptoandnetworksecuritylitreview by
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewFaith Nweke
532 views27 slides
What I learned from RSAC 2019 by
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019Ulf Mattsson
182 views68 slides
Securing data today and in the future - Oracle NYC by
Securing data today and in the future - Oracle NYCSecuring data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCUlf Mattsson
715 views52 slides
Data centric security key to digital business success - ulf mattsson - bright... by
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
1.1K views49 slides
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey by
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
49 views3 slides

More Related Content

What's hot

BlockchainLAB Hackathon by
BlockchainLAB HackathonBlockchainLAB Hackathon
BlockchainLAB HackathonAleksandr Kopnin
413 views21 slides
Encrytpion information security last stand by
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last standGeorge Delikouras
82 views46 slides
BigData and Privacy webinar at Brighttalk by
BigData and Privacy webinar at BrighttalkBigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkUlf Mattsson
577 views48 slides
New technologies for data protection by
New technologies for data protectionNew technologies for data protection
New technologies for data protectionUlf Mattsson
184 views60 slides
An extensive research survey on data integrity and deduplication towards priv... by
An extensive research survey on data integrity and deduplication towards priv...An extensive research survey on data integrity and deduplication towards priv...
An extensive research survey on data integrity and deduplication towards priv...IJECEIAES
27 views12 slides
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY by
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
501 views8 slides

What's hot(20)

BigData and Privacy webinar at Brighttalk by Ulf Mattsson
BigData and Privacy webinar at BrighttalkBigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at Brighttalk
Ulf Mattsson577 views
New technologies for data protection by Ulf Mattsson
New technologies for data protectionNew technologies for data protection
New technologies for data protection
Ulf Mattsson184 views
An extensive research survey on data integrity and deduplication towards priv... by IJECEIAES
An extensive research survey on data integrity and deduplication towards priv...An extensive research survey on data integrity and deduplication towards priv...
An extensive research survey on data integrity and deduplication towards priv...
IJECEIAES27 views
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY by Shakas Technologies
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Cost effective authentic and anonymous data sharing with forward security by Pvrtechnologies Nellore
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
Next generation data protection and security for oracle users - gdpr blockc... by Ulf Mattsson
Next generation data protection and security for oracle users   - gdpr blockc...Next generation data protection and security for oracle users   - gdpr blockc...
Next generation data protection and security for oracle users - gdpr blockc...
Ulf Mattsson244 views
Cost effective authentic and anonymous data sharing with forward security by LeMeniz Infotech
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
LeMeniz Infotech452 views
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY by Nexgen Technology
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Tokenization vs encryption vs masking by Ulf Mattsson
Tokenization vs encryption vs maskingTokenization vs encryption vs masking
Tokenization vs encryption vs masking
Ulf Mattsson2.9K views
Infragard atlanta ulf mattsson - cloud security - regulations and data prot... by Ulf Mattsson
Infragard atlanta   ulf mattsson - cloud security - regulations and data prot...Infragard atlanta   ulf mattsson - cloud security - regulations and data prot...
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
Ulf Mattsson162 views
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud by IRJET Journal
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
IRJET Journal28 views
Issa chicago next generation tokenization ulf mattsson apr 2011 by Ulf Mattsson
Issa chicago next generation tokenization ulf mattsson   apr 2011Issa chicago next generation tokenization ulf mattsson   apr 2011
Issa chicago next generation tokenization ulf mattsson apr 2011
Ulf Mattsson627 views
BSides Lisbon - Data science, machine learning and cybersecurity by Tiago Henriques
BSides Lisbon - Data science, machine learning and cybersecurity BSides Lisbon - Data science, machine learning and cybersecurity
BSides Lisbon - Data science, machine learning and cybersecurity
Tiago Henriques1.7K views
Secure Medical Data Computation using Virtual_ID Authentication and File Swap... by IJASRD Journal
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
IJASRD Journal41 views
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM by AM Publications
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
AM Publications88 views
International Refereed Journal of Engineering and Science (IRJES) by irjes
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes395 views
Crypto Mechanism to Provide Secure to the IOT Data by IRJET Journal
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal28 views
Emerging Data Privacy and Security for Cloud by Ulf Mattsson
Emerging Data Privacy and Security for CloudEmerging Data Privacy and Security for Cloud
Emerging Data Privacy and Security for Cloud
Ulf Mattsson297 views

Similar to Gdpr encryption and tokenization

Protecting Data Through Encryption Essay by
Protecting Data Through Encryption EssayProtecting Data Through Encryption Essay
Protecting Data Through Encryption EssayDawn Mora
6 views81 slides
Isaca atlanta - practical data security and privacy by
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyUlf Mattsson
260 views59 slides
ISACA Houston - Practical data privacy and de-identification techniques by
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
213 views57 slides
Application For Scalable Data Sharing Essay by
Application For Scalable Data Sharing EssayApplication For Scalable Data Sharing Essay
Application For Scalable Data Sharing EssayCarmen Sanborn
3 views157 slides
Cryptography, The Science Of Study And Practice by
Cryptography, The Science Of Study And PracticeCryptography, The Science Of Study And Practice
Cryptography, The Science Of Study And PracticeClaudia Brown
3 views77 slides
Where Data Security and Value of Data Meet in the Cloud by
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudUlf Mattsson
932 views49 slides

Similar to Gdpr encryption and tokenization(20)

Protecting Data Through Encryption Essay by Dawn Mora
Protecting Data Through Encryption EssayProtecting Data Through Encryption Essay
Protecting Data Through Encryption Essay
Dawn Mora6 views
Isaca atlanta - practical data security and privacy by Ulf Mattsson
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
Ulf Mattsson260 views
ISACA Houston - Practical data privacy and de-identification techniques by Ulf Mattsson
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
Ulf Mattsson213 views
Application For Scalable Data Sharing Essay by Carmen Sanborn
Application For Scalable Data Sharing EssayApplication For Scalable Data Sharing Essay
Application For Scalable Data Sharing Essay
Carmen Sanborn3 views
Cryptography, The Science Of Study And Practice by Claudia Brown
Cryptography, The Science Of Study And PracticeCryptography, The Science Of Study And Practice
Cryptography, The Science Of Study And Practice
Claudia Brown3 views
Where Data Security and Value of Data Meet in the Cloud by Ulf Mattsson
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
Ulf Mattsson932 views
Introduction And Mechanics Of Encryption by Samantha Reed
Introduction And Mechanics Of EncryptionIntroduction And Mechanics Of Encryption
Introduction And Mechanics Of Encryption
Samantha Reed2 views
Annotated Bibliography On Rsa Cryptography by Renee Delgado
Annotated Bibliography On Rsa CryptographyAnnotated Bibliography On Rsa Cryptography
Annotated Bibliography On Rsa Cryptography
Renee Delgado2 views
What Role Does The Government Play In Encryption by Tonya Strongheart
What Role Does The Government Play In EncryptionWhat Role Does The Government Play In Encryption
What Role Does The Government Play In Encryption
Technological Saga In The World Of Online ARPANET by Lisa Martinez
Technological Saga In The World Of Online ARPANETTechnological Saga In The World Of Online ARPANET
Technological Saga In The World Of Online ARPANET
Lisa Martinez2 views
Practical risk management for the multi cloud by Ulf Mattsson
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
Ulf Mattsson151 views
Cryptography and Network Security Principles and PracticeSeve.docx by Jack632244
Cryptography and Network Security Principles and PracticeSeve.docxCryptography and Network Security Principles and PracticeSeve.docx
Cryptography and Network Security Principles and PracticeSeve.docx
Jack6322443 views
Advantages Of Secure Socket Layer by Sandra Gubner
Advantages Of Secure Socket LayerAdvantages Of Secure Socket Layer
Advantages Of Secure Socket Layer
Sandra Gubner2 views
Information About A New Pradigm, Cloud Computing by Asia Grover
Information About A New Pradigm, Cloud ComputingInformation About A New Pradigm, Cloud Computing
Information About A New Pradigm, Cloud Computing
Asia Grover3 views
Jul 16 isaca london data protection, security and privacy risks - on premis... by Ulf Mattsson
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
Ulf Mattsson220 views
Jun 15 privacy in the cloud at financial institutions at the object managemen... by Ulf Mattsson
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Ulf Mattsson155 views
Analyzing The Three Types Of Cryptography by Leslie Lee
Analyzing The Three Types Of CryptographyAnalyzing The Three Types Of Cryptography
Analyzing The Three Types Of Cryptography
Leslie Lee2 views

More from Ulf Mattsson

Jun 29 new privacy technologies for unicode and international data standards ... by
Jun 29 new privacy technologies for unicode and international data standards ...Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Ulf Mattsson
184 views45 slides
Book by
BookBook
BookUlf Mattsson
67 views1 slide
May 6 evolving international privacy regulations and cross border data tran... by
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...Ulf Mattsson
91 views59 slides
Qubit conference-new-york-2021 by
Qubit conference-new-york-2021Qubit conference-new-york-2021
Qubit conference-new-york-2021Ulf Mattsson
64 views1 slide
Secure analytics and machine learning in cloud use cases by
Secure analytics and machine learning in cloud use casesSecure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesUlf Mattsson
80 views12 slides
Evolving international privacy regulations and cross border data transfer - g... by
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
121 views58 slides

More from Ulf Mattsson(20)

Jun 29 new privacy technologies for unicode and international data standards ... by Ulf Mattsson
Jun 29 new privacy technologies for unicode and international data standards ...Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...
Ulf Mattsson184 views
May 6 evolving international privacy regulations and cross border data tran... by Ulf Mattsson
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
Ulf Mattsson91 views
Qubit conference-new-york-2021 by Ulf Mattsson
Qubit conference-new-york-2021Qubit conference-new-york-2021
Qubit conference-new-york-2021
Ulf Mattsson64 views
Secure analytics and machine learning in cloud use cases by Ulf Mattsson
Secure analytics and machine learning in cloud use casesSecure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use cases
Ulf Mattsson80 views
Evolving international privacy regulations and cross border data transfer - g... by Ulf Mattsson
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...
Ulf Mattsson121 views
Data encryption and tokenization for international unicode by Ulf Mattsson
Data encryption and tokenization for international unicodeData encryption and tokenization for international unicode
Data encryption and tokenization for international unicode
Ulf Mattsson502 views
The future of data security and blockchain by Ulf Mattsson
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
Ulf Mattsson161 views
GDPR and evolving international privacy regulations by Ulf Mattsson
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
Ulf Mattsson116 views
Privacy preserving computing and secure multi-party computation ISACA Atlanta by Ulf Mattsson
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Ulf Mattsson391 views
Safeguarding customer and financial data in analytics and machine learning by Ulf Mattsson
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
Ulf Mattsson95 views
Protecting data privacy in analytics and machine learning ISACA London UK by Ulf Mattsson
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
Ulf Mattsson130 views
New opportunities and business risks with evolving privacy regulations by Ulf Mattsson
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
Ulf Mattsson149 views
What is tokenization in blockchain - BCS London by Ulf Mattsson
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
Ulf Mattsson144 views
Protecting data privacy in analytics and machine learning - ISACA by Ulf Mattsson
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
Ulf Mattsson306 views
What is tokenization in blockchain? by Ulf Mattsson
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
Ulf Mattsson81 views
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b by Ulf Mattsson
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Ulf Mattsson71 views
Unlock the potential of data security 2020 by Ulf Mattsson
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
Ulf Mattsson121 views
What is tokenization in blockchain? by Ulf Mattsson
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
Ulf Mattsson290 views
Protecting Data Privacy in Analytics and Machine Learning by Ulf Mattsson
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
Ulf Mattsson221 views

Recently uploaded

Five Things You SHOULD Know About Postman by
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About PostmanPostman
40 views43 slides
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... by
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...ShapeBlue
54 views15 slides
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...Jasper Oosterveld
28 views49 slides
"Surviving highload with Node.js", Andrii Shumada by
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada Fwdays
40 views29 slides
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITShapeBlue
91 views8 slides
Uni Systems for Power Platform.pptx by
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
58 views21 slides

Recently uploaded(20)

Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman40 views
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... by ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue54 views
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays40 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue91 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue102 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue by ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue46 views
State of the Union - Rohit Yadav - Apache CloudStack by ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue145 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc77 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue88 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10369 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software344 views
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely56 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue119 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue46 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... by ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue77 views
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue85 views

Gdpr encryption and tokenization

  • 1. Encryption and Tokenization 1Source: The IBM GDRP framework Discover Data Assets Security by Design A GDPR FRAMEWORK - 5 KEY ACTIVITIES TO ADDRESS GDPR
  • 2. 2 2Source: Forrester 2017 BEST PRACTICE - FIND AND PROTECT YOUR SENSITIVE DATA
  • 3. Field Real Data Tokenized / Pseudonymized Name Joe Smith csu wusoj Address 100 Main Street, Pleasantville, CA 476 srta coetse, cysieondusbak, CA Date of Birth 12/25/1966 01/02/1966 Telephone 760-278-3389 760-389-2289 E-Mail Address joe.smith@surferdude.org eoe.nwuer@beusorpdqo.org SSN 076-39-2778 076-28-3390 CC Number 3678 2289 3907 3378 3846 2290 3371 3378 Business URL www.surferdude.com www.sheyinctao.com Fingerprint Encrypted Photo Encrypted X-Ray Encrypted Healthcare / Financial Services Dr. visits, prescriptions, hospital stays and discharges, clinical, billing, etc. Financial Services Consumer Products and activities Protection methods can be equally applied to the actual data, but not needed with de-identification 3Source: Customer Case Study DATA DE-IDENTIFICATION / ANONYMIZATION
  • 4. 4 4Source: Gartner ENCRYPTION & TOKENIZATION LEVELS
  • 5. 5 5Source: Gartner Less Secure More Secure ENCRYPTION AND TOKENIZATION BEST PRACTICES
  • 6. Tokens Tokens PII Tokens Tokens • Protecting Personally Identifiable Information (PII), including names, addresses, phone, email, policy and account numbers • Compliance with EU Cross Border Data Protection Laws • Utilizing Data Tokenization, and centralized policy, key management, auditing, and reporting 6 6Source: International Customer Case Study PROTECT PII DATA CROSS BORDER - BEST PRACTICES
  • 7. *: Underlying sensitive value (USV) Source: ANSI X9 7 ANSI X9 - CURRENT TOKENIZATION STANDARD
  • 8. • Format-preserving encryption (FPE) is useful in situations where fixed-format data, such as Primary account numbers Social Security numbers, must be protected. • FPE will limit changes to existing communication protocols, database schemata or application code. 8Source: Accredited Standards Committee ANSI X9 2018 ANSI X9 STANDARD FOR FORMAT PRESERVING ENCRYPTION
  • 9. Quantum computers will be able to instantly break the encryption of sensitive data protected by today's strongest security, warns the head of IBM Research. This could happen in a little more than five years because of advances in quantum computer technologies. Encryption and Tokenization today are effective means to protect a data subject's PII per the GDPR regulation, and that they will not be soon due to the enhancements in Quantum computing. 9Source: IBM and ZDNet STANDARD ENCRYPTION AND TOKENIZATION ARE EFFECTIVE TO MEET GDPR
  • 10. 10Source: THALES at RSA Conference 2018 Quantum Cryptanalysis is effectively “breaking cryptology with quantum computers” THIS IS A BIG THREAT! If our cryptography is broken, then everything breaks! Glover’s algorithm Given a functioning Universal Quantum Computer, Glover’s algorithm weakens the currently assumed strength of symmetric algorithms like AES Shor’s algorithm Given a functioning Universal Quantum Computer, Shor’s algorithm weakens the currently assumed strength of symmetric algorithms like RSA, ECC QUANTUM CRYPTANALYSIS
  • 11. Quantum cryptography allows communication that is guaranteed to be secure, thanks to the laws of physics. And it is becoming increasingly important. Physicists have long known that quantum computers will be able to break almost all other types of cryptography. Since these devices are becoming more capable, the writing is on the wall for conventional encryption. 11Source: MIT University CHINESE SATELLITES USING QUANTUM ENCRYPTION
  • 12. 12Source: Thales Quantum Cryptography is effectively “doing cryptography with quantum computers” There are several potential techniques One thing that is well established is Quantum Key Distribution • This has almost nothing to do with Quantum Computing • Transmit keys from one place to another as quantum state in photons • Relies on the quantum mechanical phenomenon that you cannot observe a photon without disturbing its state • Theoretically extremely secure, but suffers practical issues Famously recently used by China in satellites QUANTUM CRYPTOGRAPHY
  • 13. 13Source: scmp.com/news/china/economy The mission can provide unbreakable secret communications channels, in principle, using the laws of quantum science. Is China winning the race with the US to develop quantum computers? Chinese funding to research the next generation in computing may be dwarfing American efforts, according to US experts. IS CHINA WINNING THE RACE?
  • 14. Quantum key distribution (QKD), which is the process of using quantum communication to establish a shared key between two parties (Alice and Bob, for example) without a third party (Eve) learning anything about that key, even if Eve can eavesdrop on all communication between Alice and Bob. If Eve tries to learn information about the key being established, key establishment will fail causing Alice and Bob to notice. Once the key is established, it is then typically used for encrypted communication using classical techniques. 1414Source: C. H. Bennett and G. Brassard: Quantum cryptography: Public key distribution What is Quantum Key Distribution? HOW IS QUANTUM KEY CRYPTOGRAPHY DIFFERENT?
  • 15. 15 15Source: The RSAC 2018 Conference Zulfikar Ramzan, Ph.D. Chief Technology Officer, RSA Moderator Whitfield Diffie Cryptographer and Security Expert, Cryptomathic Paul Kocher Security Researcher, Independent Moxie Marlinspike Founder, Signal Ronald Rivest MIT Institute Professor, MIT Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel The three inventors, which the RSA patent is named after, are Ronald Rivest, Adi Shamir, and Leonard Adleman. *: Matthew Rosenfield, known as Moxie Marlinspike, is an American computer security researcher, * THE RSAC 2018 CRYPTOGRAPHERS PANEL
  • 16. Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself or in the security proof. Lattice-based constructions are currently important candidates for post- quantum cryptography. Unlike more widely used and known public-key schemes such as the RSA, Diffie-Hellman or Elliptic-Curve cryptosystems. 16Source: RSAC 2018 Will Lattice-based cryptography to replace RSA, ECC and D-H? LATTICE-BASED CRYPTOLOGY
  • 17. 17 ISO/IEC 27002 Security Controls ISO/IEC 27001 ISO/IEC 27005 Risk Management ISO/IEC 29134 Privacy Impact ISO/IEC 27018 PII in Cloud ISO/IEC 29101 Privacy by Design ISO/IEC 29100 Privacy for Cloud ISO/IEC 17788 Definitions ISO/IEC 27000 series – ITSEC Management A company that has implemented ISO 27001 has already done at least half the job of achieving GDPR compliance Source: itgovernance.co.uk Information technology - Security techniques - Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors International Organization for Standardization ISO 27001 HALF THE JOB OF ACHIEVING GDPR COMPLIANCE
  • 18. • Methods a quantum computer could use to break encryption and how these attacks will specifically affect the different cryptographic methods used today • Updates on the work being done by NIST to identify quantum safe algorithms • Guidance for financial services organizations to mitigate quantum computing risk • Next steps that X9, as a standards body, needs to take over the next few years to prepare for the post-quantum world 18Source: MIT University and ANXI X9 NIST and ANSI X9 Defining Quantum Safe Encryption Algorithms PREPARE FOR THE POST QUANTUM WORLD
  • 19. 19 GDPR and TokenEx If you are a data controller who has a valid reason--other than consent from the data subject--for the processing of his or her personal data “for a purpose other than that for which the personal data have been collected”, Article 6(4)(e) obligates you to use “appropriate safeguards, which may include encryption or pseudonymization. The TokenEx platform enables you to pseudonymize personal data within your environment, by replacing it with tokens, and storing the personal data in an encrypted TokenEx cloud token vault. The GDPR requires “data protection by design and by default.” Article 25(1) specifically obligates controllers to “…implement appropriate technical and organizational measures, such as pseudonymization.” The TokenEx platform enables you to pseudonymize personal data within your environment, replacing it with tokens, and storing the data in an encrypted TokenEx cloud token vault. The pseudonymized data will likely present a lower risk, thus possibly reducing the number of additional security measures required to meet this obligation. Using a cloud-based tokenization provider like TokenEx to pseudonymize direct identifiers in the personal data your controls is a clear indication that you are considering data protection by design and striving to implement technical measures appropriate to the risk. Article 32(1) obligates controllers as well as processors to “implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk,” including pseudonymization of personal data. The TokenEx platform enables you to pseudonymize personal data within your environment, replacing it with tokens, and storing the data in an encrypted TokenEx cloud token vault. The pseudonymized data will likely present a lower risk, thus possibly reducing the number of additional security measures required to meet this obligation. TokenEx: “Tokenization” GDPR Article 6(4)e): “Encryption” TokenEx: “Tokenization and Encryption” GDPR Article 25(1): “Data Protection by Design” Article 25(1): “Encryption” GDPR Article 32(1) “Pseudonymization of Personal Data” TokenEx: “Pseudonymize Personal Data” KEY ACTIVITIES TO ADDRESS GDPR Source: https://tokenex.com/gdpr

Editor's Notes

  1. A framework for GDPR readiness GDPR compliance is complex, because the regulation itself is complex. It outlines obligations for data holders that can affect all parts of a business, from data collection to customer communication practices. However, GDPR is also open-ended: it doesn’t tell you in detail how to meet those obligations, or that any given technological approach will suffice. That’s why IBM has developed a straightforward approach to help simplify the ways you think about conformance. The IBM GDPR framework offers an actionable five-phase approach to GDPR readiness, which recognizes that readiness is a continuum: every organization will have a unique place on the journey to readiness. In Phase 1, you assess your situation. You figure out which of the data you collect and store is covered by GDPR regulations, and then you plot a course to discover it. Phase 2 is where you design your approach. You need to come up with a solid plan for data collection, use and storage. And you need to develop an architecture and strategy that will balance risks and business objectives. Your goal in Phase 3 is to transform your practices, understanding that the data you deem valuable to your organization is equally valuable to the people it represents. This is where you need to develop a sustainable privacy compliance program, implement security and governance controls (TOMs — Technical and Organizational Measures) and potentially appoint a Data Protection Officer. By the time you get to Phase 4, you’re ready to operate your program. Now you’re continually inspecting your data, monitoring personal data access, testing your security, using privacy and security by design principles and purging unneeded data. And Phase 5 — the final phase — is where you’re ready to conform with the necessary GDPR requirements. Now you’re fulfilling data subject requests for access, correction, erasure and transfer. You’re also prepared for audits with documentation of your activities and ready to inform regulators and data subjects in the event of a data breach.
  2. De-identification or Anonymization can be a cost effective approach to protect data
  3. Tokenization not just for PCI. Use Case: Protect PII Data Cross Border. Achieve Compliance while moving, outsourcing, data, EVEN between countries. Data residency issue solved. Example: A major bank performed a consolidation of all European operational data sources. This meant protecting Personally Identifiable Information (PII) in compliance with the EU Cross Border Data Protection Laws. In addition, they required access to Austrian and German customer data to be restricted to only people in each respective country. CHALLENGES The primary challenge was to protect PII – names and addresses, phone and email, policy and account numbers, birth dates, etc. – to the satisfaction of EU Cross Border Data Security requirements. This included incoming source data from various European banking entities, and existing data within those systems, which would be consolidated at the Italian HQ. RESULT Complete policy-enforced de-identification of sensitive data across all bank entities End-to-end data protection from geographically distributed bank entities to HQ All existing data secured at a granular level Achieved targeted compliance with EU Cross Border Data Security laws, Datenschutzgesetz 2000 - DSG 2000 in Austria, and Bundesdatenschutzgesetz in Germany Implemented country-specific data access restrictions Extremely high throughput of data Source
  4. X9 defines new standard for encryption of financial services data 09 May 2018  |  2189 views  |  0Source: X9Today the Accredited Standards Committee X9 Inc. (X9) announced the publication of a new standard that defines requirements for using a particular method of preserving formatting in the encryption of financial services data. The standard, X9.124-2 Symmetric Key Cryptography For the Financial Services Industry -- Format Preserving Encryption - Part 2: Key Stream with Counter Mode, is now available for purchase from the ANSI Store.  The X9.124 standard defines a collection of format-preserving encryption methods for financial services. Format-preserving encryption (FPE) is useful in situations where fixed-format data, such as primary account numbers or Social Security numbers, must be encrypted, but there is a requirement to limit changes to existing communication protocols, database schemata or application code.  Encryption has historically been an expensive technique to deploy in real-world systems because of the need to alter the operation of existing systems and applications. The benefit of FPE techniques is that encryption can be added to existing systems in such a way that system modifications are kept to a minimum. Often, substantial savings can be realized because database schemas and financial applications can run with encrypted data without needing modification or replacement. X9.124-2 defines requirements for using a particular approach - Key Stream with Counter Mode -- to specify a set of algorithms that securely encrypts formatted data and retains that format in the resulting ciphertext. Format-preserving encryption Counter Mode is a particularly simple and efficient mechanism for maintaining data format while also safeguarding its security. IT equipment vendors, banks, and retailers are some of the sectors that will benefit from X9.124-2. "This new standard describes a straightforward method of preserving the format of important data while ensuring its security, leading to cost efficiencies in systems and processing throughout the industry," said ASC X9 Executive Director Steve Stevens. "The new format-preserving encryption standard offers an additional encryption method to security professionals in search of a solution to efficiently protect data and privacy in a digital world," said Eric Le Saint, distinguished engineer, Visa, and chairman, X9F1 Working Group. "The development of the new standard is the result of hard work by many dedicated contributors from the X9F1 working group, to whom we are grateful."
  5. ISO 27001 and the GDPR - IT Governance Source: itgovernance.co.uk/gdpr-and-iso-27001
  6. A framework for GDPR readiness GDPR compliance is complex, because the regulation itself is complex. It outlines obligations for data holders that can affect all parts of a business, from data collection to customer communication practices. However, GDPR is also open-ended: it doesn’t tell you in detail how to meet those obligations, or that any given technological approach will suffice. That’s why IBM has developed a straightforward approach to help simplify the ways you think about conformance. The IBM GDPR framework offers an actionable five-phase approach to GDPR readiness, which recognizes that readiness is a continuum: every organization will have a unique place on the journey to readiness. In Phase 1, you assess your situation. You figure out which of the data you collect and store is covered by GDPR regulations, and then you plot a course to discover it. Phase 2 is where you design your approach. You need to come up with a solid plan for data collection, use and storage. And you need to develop an architecture and strategy that will balance risks and business objectives. Your goal in Phase 3 is to transform your practices, understanding that the data you deem valuable to your organization is equally valuable to the people it represents. This is where you need to develop a sustainable privacy compliance program, implement security and governance controls (TOMs — Technical and Organizational Measures) and potentially appoint a Data Protection Officer. By the time you get to Phase 4, you’re ready to operate your program. Now you’re continually inspecting your data, monitoring personal data access, testing your security, using privacy and security by design principles and purging unneeded data. And Phase 5 — the final phase — is where you’re ready to conform with the necessary GDPR requirements. Now you’re fulfilling data subject requests for access, correction, erasure and transfer. You’re also prepared for audits with documentation of your activities and ready to inform regulators and data subjects in the event of a data breach.