Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Compliance

// // //
3/22/2018
09:35 AM
Paige Bartley
Paige Bartley
News Analysis-Security Now

GDPR Compliance: Enterprises Have Two Options to Consider

When it comes to preparing for GDPR, enterprises, as well as vendors, are relying on two different approaches. The first focuses on technology, while the second relies on internal processes and workflows.

Process and technology: utilizing their respective strengths
Technology-based approaches are often preferable when direct, infallible control over data assets is required, or where human processes to exert control over data are likely to be error-prone or difficult to scale.

Examples of this would be the automated detection of personal data in heterogeneous IT environments -- typically through machine learning -- detection of suspicious activity and data breaches, the masking or pseudonymization of personal data or automatically purging all data associated with an individual that has invoked the right to erasure.

These tasks, if left to humans to conduct manually, would be unfeasible: The scale of data involved is simply too great, and the risk of human error too real. Solutions that directly exert technical control over the data are required in these cases, and simply documenting the process involved is not sufficient to meet GDPR's requirements.

A commonality of technology-based solutions is that they directly "touch" the data, and do not depend on human intermediary action to manually make changes to individual files or pieces of data. Whenever direct changes are required to files, such as changes in policy, deletion or relocation, having a solution that can directly exert those controls in an automated manner -- with the click of a button -- is an asset. (See GDPR, Cloud Changing Security Pros' Priorities Report.)

(Source: iStock)
(Source: iStock)

Process-based approaches, on the other hand, are preferable when the compliance requirement being met is, itself, process-oriented in nature.

The majority of GDPR's articles are process-based rather than technical, and focus on building repeatable workflows that take advantage of dedicated roles and responsibilities within the organization. Keeping records of processing activities (Article 30), notifying supervisory authorities of a personal data breach (Article 33) and conducting data protection impact assessments (Article 35) are all examples of strongly process-oriented requirements that cannot be fulfilled exclusively via direct technical control over data.

An organization that is striving to meet these requirements must first build an internal process for meeting these requirements, and have a method in place for documenting and monitoring that living process.

That's where process-based solutions come in.

They provide a software system to manage existing human roles and delegate tasks, giving users a place to conduct necessary steps associated with the process -- such as completing risk assessments -- and keeping an auditable trail of all the steps and actions taken in that process.

Most process-oriented solutions provide customizable workflows that can be adapted to the individual organization's existing roles and requirements. Process-based solutions excel at process management, helping create repeatable templates for internal processes, and automatically documenting the steps and parties involved so that they may be presented to regulatory authorities.

With that in mind, the requirements of some articles will be best met with a technology-based approach, while others will benefit from a process-based approach. But the typical enterprise does not have the budget or time to evaluate a different solution for every article of GDPR that needs to be met.

In seeking compliance solutions, most organizations are looking for a product that can meet the largest number of GDPR requirements in a single platform.

This is why hybrid solutions -- with aspects of both technology-based and process-based approaches -- will ultimately provide the broadest compliance coverage.

They also have the potential to become more deeply rooted in enterprise culture by addressing both sides of the equation: direct control of data ties them to data assets and meets technical requirements, while process management tools make them sticky for users.

Two camps may be forming in the GDPR compliance vendor landscape, but the ultimate winners will likely be solutions that successfully adopt aspects of both approaches, applying each for their respective strengths.

Related posts:

Paige Bartley is a Senior Analyst covering data and enterprise intelligence for Ovum.

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Promise and Reality of Cloud Security
Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises. The shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the associated security risks. This report - a compilation of cutting-edge Black Hat research, in-depth Omdia analysis, and comprehensive Dark Reading reporting - explores how cloud security is rapidly evolving.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-25136
PUBLISHED: 2023-02-03
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be triggered by an unauthenticated attacker in the default configuration; however, the vulnerability discoverer reports that "exploiting thi...
CVE-2023-25139
PUBLISHED: 2023-02-03
sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of ...
CVE-2022-48074
PUBLISHED: 2023-02-03
An issue in NoMachine before v8.2.3 allows attackers to execute arbitrary commands via a crafted .nxs file.
CVE-2023-25135
PUBLISHED: 2023-02-03
vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are...
CVE-2022-4634
PUBLISHED: 2023-02-03
All versions prior to Delta Electronic’s CNCSoft version 1.01.34 (running ScreenEditor versions 1.01.5 and prior) are vulnerable to a stack-based buffer overflow, which could allow an attacker to remotely execute arbitrary code.