Implementing the Least-Cost, Least-Time Solution for GDPR-Compliant Software. Portrait 210mm x 297mm. Implementing the LeastCost, Least-Time Solution

Similar documents
De-Risking Unstructured Data with Data-Centric Security and Control

HIPAA Regulatory Compliance

Best Practices in Securing a Multicloud World

efolder White Paper: HIPAA Compliance

GDPR compliance. GDPR preparedness with OpenText InfoArchive. White paper

EU GDPR and . The complete text of the EU GDPR can be found at What is GDPR?

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V

Xerox FreeFlow Print Server. Security White Paper. Secure solutions. for you and your customers

Data Management and Security in the GDPR Era

5 OAuth EssEntiAls for APi AccEss control layer7.com

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

5 OAuth Essentials for API Access Control

General Data Protection Regulation (GDPR) The impact of doing business in Asia

Canadian Access Federation: Trust Assertion Document (TAD)

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

File Transfer and the GDPR

PCI DSS Compliance. White Paper Parallels Remote Application Server

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter

AN IPSWITCH WHITEPAPER. 7 Steps to Compliance with GDPR. How the General Data Protection Regulation Applies to External File Transfers

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No.

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)

SECURE DATA EXCHANGE

WHITE PAPER. Meeting GDPR Challenges with Delphix. KuppingerCole Report

Securing Institutional Data in a Mobile World

A company built on security

Canadian Access Federation: Trust Assertion Document (TAD)

Cloud FastPath: Highly Secure Data Transfer

Security context. Technology. Solution highlights

SECURITY & PRIVACY DOCUMENTATION

ARBOR DDoS PRODUCTS IN A GDPR COMPLIANT ENVIRONMENT. Guidelines and Frequently Asked Questions

Data Protection Policy

Canadian Access Federation: Trust Assertion Document (TAD)

Security

Information Security in Corporation

Datameer Big Data Governance. Bringing open-architected and forward-compatible governance controls to Hadoop analytics

PSD2 webinar session - Q&A

Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos

Agenda GDPR Overview & Requirements IBM Secure Virtualization Solution Overview Summary / Call to Action Q & A 2

Chapter 9 Section 3. Digital Imaging (Scanned) And Electronic (Born-Digital) Records Process And Formats

GDPR How to Comply in an HPE NonStop Environment. Steve Tcherchian GTUG Mai 2018

GDPR Controls and Netwrix Auditor Mapping

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

Canadian Access Federation: Trust Assertion Document (TAD)

CYBER SECURITY WHITEPAPER

CIP Security Pull Model from the Implementation Standpoint

Pulseway Security White Paper

CAN MICROSOFT HELP MEET THE GDPR

Authentication Technology for a Smart eid Infrastructure.

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD)

Technical Requirements of the GDPR

FDA 21 CFR Part 11 Compliance by Metrohm Raman

Identity Management as a Service

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain

Rev.1 Solution Brief

Information Security. How to be GDPR compliant? 08/06/2017

Eco Web Hosting Security and Data Processing Agreement

EU GDPR and Security Compliance for the DBA. Santa Clara, California April 23th 25th, 2018

THALES DATA THREAT REPORT

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Canadian Access Federation: Trust Assertion Document (TAD)

COMPLIANCE. associates VALIDATOR WHITE PAPER. Addressing 21 cfr Part 11

Data Encryption with ServiceNow

PSD2 Compliance - Q&A

AWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services

WHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help

The Nasuni Security Model

Complete document security

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates

CERTIFICATE POLICY CIGNA PKI Certificates

Sparta Systems TrackWise Solution

Go mobile. Stay in control.

Sparta Systems TrackWise Digital Solution

msis Security Policy and Protocol

Understand & Prepare for EU GDPR Requirements

Who s Protecting Your Keys? August 2018

SSL Certificates Certificate Policy (CP)

Automating VPN Management

PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)

Information Lifecycle Management for Business Data. An Oracle White Paper September 2005

FIDO AS REGTECH ADDRESSING GOVERNMENT REQUIREMENTS. Jeremy Grant. Managing Director, Technology Business Strategy Venable LLP

Canadian Access Federation: Trust Assertion Document (TAD)

Securing Office 365 with MobileIron

Trusted Identities. Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN

Security Policies and Procedures Principles and Practices

Cloud Transformation Program Cloud Change Champions June 20, 2018

The Simple Guide to GDPR Data Protection: Considerations for and File Sharing

OTP Server Authentication System Authentication Schemes V1.0. Feitian Technologies Co., Ltd. Website:

DreamFactory Security Guide

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

Guide: HIPAA. GoToMeeting and HIPAA Compliance. Privacy, productivity and remote support. gotomeeting.com

1. Federation Participant Information DRAFT

Guide to Cyber Security Compliance with GDPR

How Managed File Transfer Addresses HIPAA Requirements for ephi

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

WHITEPAPER. Security overview. podio.com

Transcription:

Implementing the Least-Cost, Least-Time Solution for GDPR-Compliant Software A4 Flyer Portrait 210mm x 297mm Implementing the LeastCost, Least-Time Solution for GDPR-Compliant Software Bleed Area Anything here will be trimmed off, but remember to extend any colouring or images into this 3mm bleed area to avoid white lines appearing during the print finishing stages. Trim Your job will be cut on the solid black line, any images or text placed in the 3mm area may be trimmed off incorrectly. Safe Area Keep all your information inside the white area. Remember to use high resolution images (300dpi) for the best results. 1 +44 (0) 203 876 5221 absio.britecloud.com 2017 Britecloud Solutions Limited 110-DS018-3

A4 Flyer Portrait 210mm x 297mm Bleed Area Anything here will be trimmed off remember to extend any colouring images into this 3mm bleed area t avoid white lines appearing during print finishing stages. Trim Your job will be cut on the solid bl line, any images or text placed in the 3mm area may be trimmed off incorrectly. Safe Area Keep all your information inside th white area. Remember to use high resolution images (300dpi) for the best results.

Implementing the Least-Cost, Least-Time Solution for GDPR-Compliant Software 2 Your Data, Your Rules: Easy Data Security Toolkit for Developers SUMMARY A4 Flyer Using Absio s toolset, with a few simple lines of code, application developers can create GDPR-compliant software that: Portrait Automatically, individually encrypts any type of unstructured data generated or 210mm x 297mm processed by an application everywhere it exists without having to manage keys, add hardware, increase latency, or rely on a third-party service for access to data Extends automatic PKI cryptographic authentication and encrypted data exchange to any user inside or outside your network Automatically assures TLS for every transmission Tracks, updates or deletes a data subject s content everywhere it exists per a schedule or on-demand Cryptographically binds metadata from any source to unstructured data dictating how the data can be accessed and used Integrates with other information systems - providing decrypted content anywhere it s needed for analysis and processing Enables provable GDPR compliance Bleed Area Anything here will be trimmed off, but remember to extend any colouring or images into this 3mm bleed area to avoid white lines appearing during the print finishing stages. Trim Your job will be cut on the solid black line, any images or text placed in the 3mm area may be trimmed off incorrectly. Safe Area Keep all your information inside the white area. Remember to use high resolution images (300dpi) for the best results.

lyer ait mx Implementing the Least-Cost, Least-Time Solution for GDPR-Compliant Software 3 Data controllers and processors and the software providers and developers they must necessarily rely upon to become and remain 297mm compliant are facing a unique challenge. Unlike other cybersecurity and privacy regulations, the GDPR does not define compliance methods. It specifies nothing about tools, processes, or technical standards, nor does it provide templates, guidelines, frameworks, examples, or best practices. Implementing the Least- Cost, Least-Time Solution for GDPR-Compliant Instead, GDPR prescribes specific forms of multi-party (controllers, processors, and data subjects) control over personal data, which must be maintained from the moment the data Software is gathered until the moment it ceases to exist. The GDPR also dictates potentially severe d Area penalties and damages for data processors and controllers who fail to adequately control the personal data with which they ve been entrusted. hing here will be trimmed off, but mber to extend any colouring or personal data that processors and controllers must control is stored in two forms es into this 3mm bleedthe area to and unstructured. Structured data is stored in and processed by certain kinds white lines appearingstructured during the finishing stages. of databases. Unstructured data is stored as files, that is, discrete digital objects such as documents, images, videos, audio, forms data gathered and stored for later inclusion in a database, and data extracted from a database and stored as files for subsequent use. job will be cut on the solid black any images or text placed in Maintaining control of individual files in their native form is all but impossible. Files are mm area may be trimmed off purposely designed for unrestricted reading, copying, distribution, alteration, and deletion, rectly. anywhere, at any time, by anyone or anything that has an instance of software capable of Area opening and operating the file. The abuse of security and privacy that results from failing to control files is a central problem the GDPR seeks to correct. all your information inside the e area. Remember to use high to control files can be either indirect or direct. Indirect control takes multiple forms, Attempts ution images (300dpi) for the but in general it seeks to control files sometime after the files are created using a combination results. of specialized analysis software and a combination of human and software-enforced policies.

Implementing the Least-Cost, Least-Time Solution for GDPR-Compliant Software 4 Your Data, Your Rules: Easy Data A4 Flyer Examples include running file discovery tools to find regulated content, moving the subset of files with regulated content to designated storage locations that are secured, adhering Portrait to internal and external distribution protocols, following administrative constraints on how files are used, and executing data retention policies hopefully all without error. The indirect 210mm x 297mm approach tends to be expensive because it is labor-intensive, and risky because its reliance on humans produces inconsistent results. Furthermore, the indirect approach will be increasingly challenged by the vast and accelerating amount of unstructured data being gathered and processed by each new and more powerful software application, and the rise of NoSQL big data processing against unstructured data. In simple terms, the multiple systems and protocols inherent in the indirect approach cannot keep up with the amount of data being created and the number of locations where it may be located (cloud, on-premise, mobile, BYOD, etc.). Direct control ensures that all data generated or processed by software applications is automatically controlled prior to it being stored or distributed. Direct control requires upfront development work to build new or modify existing applications that generate or process regulated data, but eliminates the need to find and control data once stored in any number of known and unknown locations. Direct control provides a path towards complete data control, whereas indirect does not. New data may not even be indirectly controlled for some time. HOW ABSIO TECHNOLOGY DIRECTLY CONTROLS DATA Area data throughout itsbleed existence. It is a highly-automated data containerization toolset that Anything herefunctions will be trimmed off,incorporated but provides pre-built interconnected that can be by software developers remember to extend any colouring or images into this 3mm bleed area to avoid white lines appearing during the The toolset consists of cross platform-capable software development kits (SDKs), each print finishing stages. into existing or new applications with a few simple lines of code. with a simple application programming interface (API), and a portable server application (Absio Server Application) that can be installed on premise or in the cloud. The Absio Server Trim Application enables an automatic public key infrastructure (PKI), in cases where data needs to Your job will be cut on the solid black be shared among users. line, any images or text placed in the 3mm area may be trimmed off The SDK generatesincorrectly. private and public keys for all users (human or system) of an Absioenabled application (an application that has incorporated the Absio SDK) used for signing and derivation. When thearea SDK receives data from an Absio-enabled application, it creates an Safe encrypted container (called an Absio Secure Container or ASC) and assigns it a global unique Keep all your information inside the white area. Remember to use high resolution images (300dpi) for the throughout its existence. The SDK encrypts the data, and, if applicable, adds any associated best results. metadata (information about the data or controls regarding its use) to form the ASC. Metadata

Implementing the Least-Cost, Least-Time Solution for GDPR-Compliant Software 5 Implementing the Least-Cost, Least-Time Solution for GDPR-Compliant Software 5 can be stored encrypted in the ASC, in cleartext in the Absio Server Application database, or both depending on how and by whom it needs to be accessed. The SDK automatically, individually encrypts each ASC with its own unique key. ASCs can be decrypted when and where needed, but by default, are only decrypted in memory while the content is in use. Data in storage and in transit is always encrypted. For data in use, the SDKs can enable persistent control of how, where, and when decrypted content can be used. In other words, even after the data is decrypted, it can only be accessed cryptographically bound to data content. When the ASC is accessed by an authenticated user, the Absio-enabled application consumes the ASC s metadata and only permits use of the decrypted content in accordance with instructions contained in the metadata. The Absio Server Application, in conjunction with the SDKs, can provide cryptographic user is automatic, so there is no key-related administrative burden and developers need no the internet, or investment in key servers, hardware security modules, or appliances. The Absio Server Application, by default, is blind. Content and keys are encrypted by the SDK prior to transmission to the Absio Server Application. No trust relationship with a public or 1 stored by the Absio Server Application yields no usable information. HOW ABSIO TECHNOLOGY MEETS GDPR REQUIREMENTS 1 Absio-enabled applications automatically encrypt new data as it is created and existing unencrypted data as it is processed. Once encrypted, data is protected in storage and in transit, and is only decrypted in memory while in use by a cryptographically-authenticated user. Each application user is automatically assigned a unique user ID (UUID). Private signing and derivation keys for each user are automatically created by the SDK, encrypted, and stored present. Absio-enabled applications communicate with the Absio Server Application via a TLSencrypted connection. Since data is encrypted prior to transmission, a compromised

Implementing the Least-Cost, Least-Time Solution for GDPR-Compliant Software 6 Replay attacks are prevented by one-time- use, signed, time-sensitive session tokens. Attempts to reuse tokens or to use tampered-with tokens are rejected by the Absio Server Application. Users authenticate with the Absio Server Application by signing with their private key, mitigating the possibility of man-in-the-middle attacks. authentication code (HMAC) prior to decryption, and all keys are signed with the user's private Pseudonymization and Anonymization2 For purposes of pseudonymization, developers can use the Absio SDK to hash data and make the hash map available only to select cryptographically-authenticated users. The hash map is stored in an individually-encrypted ASC, so that only users with the appropriate permissions can access the ASC and decrypt the map. The SDK does not provide means to anonymize data, however, anonymized or pseudonymized data can also be encrypted if desired. Electronic Access The GDPR grants data subjects a wide range of access and personal data control rights, each with a common requirement: electronic access. Absio-enabled applications can extend cryptographic authentication to any user, including data subjects. Additionally, other methods of user authentication are supported. For example, Absio-enabled applications can consume systems, identity access and management (IDAM) providers (e.g., Active Directory and LDAP), or multifactor authentication (MFA) providers. Right to Update and Delete Personal Data3 Due to the inherent uncontrollability of unstructured data, when a data subject, controller, or can be bound to data and processed by Absio-enabled applications, making identifying and updating content and metadata information simpler. Data Lifespan Control4 lifespan, determining how long data content is available. Lifespan metadata can be cryptographically bound to data ensuring that obsolete data is no longer accessible and

Implementing the Least-Cost, Least-Time Solution for GDPR-Compliant Software 7 permanently deleted everywhere at a predetermined time. Access to shared data can also be Sharing Data with Other Controllers 5 Absio-enabled applications allow data to be shared between controllers/processors without losing control of the content. An application provided by the sharing controller/processor and deployed by the receiving controller/processor, receives the encrypted content and then either decrypts that content upon its arrival or stores it in encrypted form and then decrypts it on-demand. This enables the sharing controller/processor to document that shared content was always encrypted while it was in their possession and when it was shared, and with whom and when it was shared. The sharing controller/processor can also apply policy metadata to any information shared dictating how the data content can be used and with whom it can be shared when accessed by the Absio-enabled application. Privacy By Design and By Default6 Use of Absio technology is a clear indicator of compliance with the technical measures of GDPR privacy by design and by default requirements. Absio technology is purposely designed by default to protect all the data it handles and to extend control of access, use, and lifespan of data to the data subjects themselves in addition to controllers and processors. Demonstration of Accountability7 The use of Absio technology itself can demonstrate compliance with data protection and other A4 Por 210 applicable requirements. If demonstrable continuous compliance is desired, applications can create a log of all relevant Absio-enabled functions performed by the application, such as ASC creation, access, sharing, updating and deletion; user creation and deletion, logins and logouts; and time, sources, and destinations of shared data for auditing purposes. Data Residency The Absio Server Application is portable and can be installed where needed to conform to data residency requirements. HOW ABSIO TECHNOLOGY CAN REDUCE THE COST OF GDPR COMPLIANCE Buy or Build sharing data, Absio can save man-years of software development time and reduce investments in additional software, hardware and IT resources.

Implementing the Least-Cost, Least-Time Solution for GDPR-Compliant Software 8 Modularity and Incremental Implementation Absio technology is intentionally modular. Data encryption, cryptographic authentication, encrypted data sharing, and metadata-based data control can all be accomplished separately. Depending on how a given application is architected, only certain Absio capabilities may be needed. In other cases, Absio capabilities can be incrementally implemented over time based on business priorities, budget, and the availability of developer resources. Interoperability Absio technology is designed to integrate with and extend the capabilities of other systems, not replace them. Absio-enabled applications can securely deliver data in its native format to systems designed to consume them. Examples include threat mitigation systems, data loss prevention systems, archiving systems, or any other system that processes or analyzes data. Absio-enabled applications can consume information provided by data governance metadata intended to manage data, then return the information to the application when needed. Risk and Liability Mitigation8 Absio provides provable, continuous encryption of data in motion and at rest, including data shared with other controllers and processors. It is unlikely that Absio-protected data will incur A4 Port 210 penalties or damages due to a data breach, and the use of Absio technology may reduce cyber insurance costs. Reduced Data Protection and Management Cost The use of Absio technology may reduce or eliminate certain data protection and data management costs. For example, an organization may have information assurance personnel, less expensive to simply use Absio tools to automatically encrypt all newly created and existing CONCLUSION Absio technology may well be the least-cost, 0least-time GDPR compliance solution for your organization. For more information on the Absio toolset, pricing, or to arrange a free trial, please contact us at sales@absio.com (Americas) or sales@britecloud.com (EMEA).

Implementing the Least-Cost, Least-Time Solution for GDPR-Compliant Software 9 1. Data is secured, and integrity and confidentiality are maintained, using technical and organizational means under the management of the controller: Recital 49 and Articles 5-1(f), 32-1(b-d). Data encryption shall be used, when possible: Recitals 83 and Articles 6-4(e), 32-1(a). 2. Data pseudonymization shall be used, when possible: Recitals 26, 28, 29, 78 and Articles 6-4(e), 25-1, 32-1(a). Data shall be anonymized, when possible: Recital 26. 3. The data subject shall have the right to have their data updated, free of charge, if there is an error: Recitals 59, 65 and Article 16, and, the data subject shall have the right to request this update electronically, Recital 59.The data subject shall have the right to have their data erased without undue delay: Recitals 59, 65 and Articles 13-2(b), 14-2(b), 17, and, the data subject shall have the right to request this deletion electronically, Recital 59. 4. Data is stored only for the time necessary to meet the objectives of the data subject. Out-of-date personal data shall not be stored. (Part of an Electronic Records Management strategy). And the data subject shall be notified of this time period or its calculation approach at the time of the data capture: Recitals 39, 45 and Articles 13-2(a), 14-2(a), 25-2 5. The data controller must notify other IT organizations that hold the data subject s data that the data subject has requested data erasure: Recital 66 and Article 19 (Therefore, the IT department must know where all the data subjects data is being stored by third parties so that these third parties can be notified of erasure requests. Up-to-date internal and external data inventories are critical.) 6. Implementing data protection in the system and the organization, by design and by default, is a legal requirement: Recital 78 and Article 25 7. Recital: 39-2. The controller shall be responsible for, and be able to demonstrate compliance with, paragraph 1 ('accountability'). A4 F Portr 8. Article 82-3. A controller or processor shall be exempt from liability under paragraph 2 if it proves that it is not in any way responsible for the event giving rise to the damage. Article 34-3 The communication to the data subject referred to in paragraph 1 shall not be required if any of the following conditions are met: (a) the controller has implemented appropriate technical and 210m the personal data breach, in particular those that render the personal data unintelligible to any person who is not authorised to access it, such as encryption. Bl An re im av pr

A4 Flyer Portrait 210mm x 297mm Bleed Area Anything here will be trimmed off, but remember to extend any colouring or +44 (0) 203 5221 britecloud.com images into876 this 3mm bleed area to Corporation 110-WP17-01 avoid white 2017 linesabsio appearing during the print finishing stages.