Top 5 Security Control You Need For GDPR

John Miller
3 min readApr 29, 2022

--

The impending General Data Protection Regulation (GDPR), which will be in effect on May 25 th, is no secret. Data protection and security are hot topics.

Non-compliance with GDPR can result in a fine of up to a EURO 20million or 4% on worldwide yearly revenues, whichever is greater. Organizations are changing how they approach data protection and security. What must data protection controls be in place to ensure compliance with GDPR cybersecurity?

Let’s get started.

What’s the General Data Protection Regulation?

The GDPR, a regulation on data privacy, applies to all data subjects in the European Union (EU). GDPR allows EU data subjects to control how their data is stored, processed, and transmitted. GDPR’s ripple effect reaches all corners of the world, making it applicable to organizations outside the EU. Many of these are located in the U.S.

Now, look at some important GDPR technical controls you need to have to prepare your organization for GDPR.

Identity and Access Management (IDAM). The proper IDAM controls will limit personal data access to authorized employees. Separation of duties and least privilege are two key principles in IDAM, and they ensure that only employees have access to the information or systems relevant to their job function.

What does this all mean for GDPR? Only employees who are required to have access to personal data to do their jobs can have it. To ensure the intended purpose of collecting personal information is not compromised, it is important that privacy training be made available to these individuals.

Data Loss Prevention (DLP)

DLP, which is relevant to GDPR, helps prevent personal data from being lost.

DLP tools and other technical safeguards are crucial in preventing breaches from becoming the next big news. GDPR states that organizations are liable for any loss of personal data collected, regardless of whether they are the processor or controller. DLP controls provide additional protection by limiting the transmission of personal information outside of the network.

Encryption & Pseudonymization

Pseudonymization can be challenging to spell and even harder to pronounce. It is the “processing of personal data so that the data cannot be attributed to a particular data subject without additional information” ( GDPREU.org. This obscure, difficult-to-spell word can include encryption at the field level in databases, encryption of whole data stores at rest, and encryption for data in use or transit.

The GDPR advises pseudonymization but does not requires it. Investigators will look into whether the responsible organization has put these types of GDPR technical controls in place.

Third-Party Risk Management

Who is responsible if an organization entrusts personal data processing to a processor/sub-processor?

The quick answer is Liability for everyone!

The instructions of their controllers are binding on processors. The GDPR data compliance obligation also requires processors to take an active role in protecting personal data. The GDPR requires that personal data processors follow all instructions given by the controller, and they can be held responsible for any loss or unauthorized access to personal data. The GDPR will also apply to sub-processors based on the contract between processors and sub-processors.

As you can see, GDPR cybersecurity compliance is equally important for third-party relationships than for an organization internally, as long as the third parties store, transmit, or process personal data from EU subjects.

Policy Management

This is my favorite concept, even though it’s the last one I will cover in this post.

The policy is the teeth, the hammer, and an “accountability companion” for previously discussed data security controls.

The effective policy requires enterprise buy-in to be implemented for data security controls to be managed and updated in a constantly changing cybersecurity environment. Best practices include training and acknowledgment of organizational policies.

All of this is possible if policy management is managed well and implemented to allow GDPR compliance.

Take Away

You can see that GDPR requirements go beyond just checking a box. You are only days away from GDPR implementation if you handle the personal data of EU subjects.

To ensure that personal data is processed correctly, accounted for, and protected, take the time to review the security measures for data protection you have in place to comply with GDPR.

Do not worry; GDPR compliance is fun! Protect personal data with pride!

--

--

No responses yet