IT MANAGEMENT AND THE GDPR: THE VMWARE PERSPECTIVE

Similar documents
CONFIDENTLY INTEGRATE VMWARE CLOUD ON AWS WITH INTELLIGENT OPERATIONS

EU General Data Protection Regulation (GDPR) Achieving compliance

GDPR: A QUICK OVERVIEW

WHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

General Data Protection Regulation (GDPR)

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

VMware Cloud Operations Management Technology Consulting Services

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

The GDPR Are you ready?

10 QUESTIONS, 10 ANSWERS. Get to know VMware Cloud on AWS The Best-in-Class Hybrid Cloud Service

Accelerate GDPR compliance with the Microsoft Cloud

BUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE. These Common Misconceptions Could Be Holding You Back

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

EU GDPR and . The complete text of the EU GDPR can be found at What is GDPR?

Google Cloud & the General Data Protection Regulation (GDPR)

Data Management and Security in the GDPR Era

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know

VMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017

Recommendations on How to Tackle the D in GDPR. White Paper

Cybersecurity Considerations for GDPR

The Role of the Data Protection Officer

DATA PROTECTION BY DESIGN

GDPR COMPLIANCE REPORT

The GDPR data just got personal

Cisco Spark and GDPR. Thomas Flambeaux. Collaboration Consulting Solution Engineer, Security and Compliance. Cisco Connect 2018 Copenhagen April 12th

VMWARE CLOUD FOUNDATION: THE SIMPLEST PATH TO THE HYBRID CLOUD WHITE PAPER AUGUST 2018

The GDPR and NIS Directive: Risk-based security measures and incident notification requirements

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions

Accelerate Your Enterprise Private Cloud Initiative

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

Getting ready for GDPR

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

European Global Data Regulation Regulation

SOC for cybersecurity

Cyber Security Beyond 2020

Technology's role in General Data Protection Regulation Dr. Prokopios Drogkaris Officer in NIS SECPRE 2017 Oslo

falanx Cyber ISO 27001: How and why your organisation should get certified

VMWARE MICRO-SEGMENTATION AND SECURITY DEPLOY SERVICE

Magento GDPR Frequently Asked Questions

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe

General Data Protection Regulation (GDPR) The impact of doing business in Asia

Perfect Balance of Public and Private Cloud

MODERNIZE INFRASTRUCTURE

VMware vcloud Air Accelerator Service

GDPR Update and ENISA guidelines

Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

Protecting your data. EY s approach to data privacy and information security

THE NEW EU DATA PROTECTION REGULATION: WHAT IS IT AND WHAT DO WE NEED TO DO? KALLIOPI SPYRIDAKI CHIEF PRIVACY STRATEGIST, EUROPE

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Privacy by Design and the GDPR

VMware BCDR Accelerator Service

General Data Protection Regulation (GDPR) Key Facts & FAQ s

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?

Turning Strategic Insight Into Business Impact

Forms. GDPR for Zoho Forms

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

Agenda GDPR Overview & Requirements IBM Secure Virtualization Solution Overview Summary / Call to Action Q & A 2

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679

REDUCE TCO AND IMPROVE BUSINESS AND OPERATIONAL EFFICIENCY

TRULY INDEPENDENT CYBER SECURITY SPECIALISTS. Cyber Major

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

HARNESSING THE HYBRID CLOUD TO DRIVE GREATER BUSINESS AGILITY

IBM Security Guardium Analyzer

GDPR: A technical perspective from Arkivum

WHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY. Integrating Resiliency into Our Culture and DNA

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant

Cyber Risks in the Boardroom Conference

Professional Services for Cloud Management Solutions

EU General Data Protection Regulation (GDPR) A Point of View for Technology Sector Organisations. For private circulation only.

GDPR How to Comply in an HPE NonStop Environment. Steve Tcherchian GTUG Mai 2018

Data Leak Protection legal framework and managing the challenges of a security breach

Data Privacy in Your Own Backyard

The Apple Store, Coombe Lodge, Blagdon BS40 7RG,

General Data Protection Regulation (GDPR) and the Implications for IT Service Management

General Data Protection Regulation (GDPR) NEW RULES

PROTECT YOUR DATA AND PREPARE FOR THE EUROPEAN GENERAL DATA PROTECTION REGULATION

A Practical Look into GDPR for IT

VMWARE TAP PROGRAM NOT FOR RESALE (NFR) SOFTWARE GUIDE

Introduction. When it comes to GDPR compliance, is OK for now enough? Minds made for protecting financial services

Conducting a data flow mapping exercise under the GDPR. Presented by: Alan Calder, founder and executive chairman, IT Governance 4 October 2017

Securing Your Most Sensitive Data

PRIVACY AND ONLINE DATA: CAN WE HAVE BOTH?

General Data Protection Regulation Frequently Asked Questions (FAQ) General Questions

EY s Data Privacy Services. January 2019

This guide is for informational purposes only. Please do not treat it as a substitute of a professional legal

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain

VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment

BHConsulting. Your trusted cybersecurity partner

reach Cross-Border Data: Managing the Risks People. Partnership. Performance.

VMWARE PIVOTAL CONTAINER SERVICE

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).

Transcription:

TRANSFORM SECURITY DATA PROTECTION SOLUTION OVERVIEW IT MANAGEMENT AND THE GDPR: THE VMWARE PERSPECTIVE Introduction This Solution Overview is intended for IT personnel interested in the VMware perspective on the implications for IT of the forthcoming General Data Protection Regulation (GDPR) which is due to become enforceable in the European Union from 25th May 2018. Further, we aim to show where the VMware portfolio can help customers to implement solutions for data protection use cases, which in turn, may form part of an organization s efforts to comply with the GDPR. The GDPR What Is It? The General Data Protection Regulation (Regulation [EU] 2016/679) is a regulation which will strengthen and unify data privacy rights for persons within the European Union (EU). The GDPR also addresses the export of personal data outside EU borders. Its primary objectives are to give control over personal data any identifiable information such as name, address, and national identifier numbers back to the individual as a basic right and to simplify the regulatory environment for international business by harmonising data protection legislation within all EU countries. The GDPR extends the scope of current EU data protection law to non-eu organizations who are processing EU personal data The harmonisation of data protection legislation should make it easier for non-eu organizations to comply, but this comes at the potential cost of a strict data protection compliance regime, with severe penalties for non-compliance. Definitions The GDPR approach to data protection has a wide scope, encompassing legal definitions and public policy about an individual s rights regarding the privacy and protection of personal data. VMware does not provide legal advice on GDPR compliance to its customers and strongly recommends that they consult appropriate process consultants and legal advisors on this subject. The detailed definition of many of the terms used can differ widely between IT management professionals (who are broadly engineers), and privacy experts (who often have legal, compliance or public policy backgrounds), which can cause significant confusion between key stakeholders in the teams working towards GDPR compliance in an organization 1. Except for page 6, ( The GDPR Overview ), the intention of this document is to give a VMware perspective on data protection for IT practitioners. For the sake of clarity to an IT audience, the definition of data protection used in this document will follow the familiar ISO/IEC IT definition of data protection 2 (ISO/IEC 2121404), which many IT practitioners use in practice and for compliance initiatives 3. SOLUTION OVERVIEW 1

The concept of GDPR readiness assumes that the entire organization must comply with the law. From an IT compliance perspective, the GDPR is more nebulous; there are currently no familiar controls and configuration requirements mandated under the GDPR that are similar to ISO, SOC 1, or PCI certifications. Conversely, the scope of the GDPR doesn t encapsulate all the scope of IT data protection. It is therefore critical that the ongoing communication taking place between the teams of privacy experts and IT professionals. Constant monitoring and clarification will help to ensure that each party understands exactly the other s meaning and intent. The Intersection of IT and the GDPR The GDPR is comprised of 99 Articles governing the public policies designed to protect personal data. Only a handful actually relate to IT data protection and cyber-security. The GDPR 99 Articles of Law Related to IT Security 4% Related to privacy rights 96% CHART 1: GDPR 99 Articles of Law Specific IT data protection solutions have generated a lot of interest in the IT security community because, despite being addressed by only a small number of the 99 Articles, the IT security market overall is exploding. Gartner forecasts 70B in annual global expenditure in 2018 4 and both cyber-security breaches and applicable legislation continue to trend upwards (including a big increase in fines and penalties under national laws). Additionally, protecting personal data is just one part of a comprehensive IT data protection strategy. Financial information unrelated to personal data, intellectual property and many other data, while equally important to an organization, are out of scope for GDPR data flow mapping. 1. For additional clarity, IT will refer to any function within IT from IT Operations, CISO, InfoSec, etc. whereas Organization refers to the whole of the legal, public or private organizations. 2. ISO/IEC Information Technology Vocabulary. ISO/IEC 2121404 Data Protection Implementation of appropriate administrative, technical or physical means to guard against unauthorized intentional or accidental disclosure, modification, or destruction of data https://www.iso.org/obp/ui/#iso:std:iso-iec:2382:ed-1:v1:en. Whereas the GDPR roughly identifies this definition as Security. 3. The definition for IT Storage differs in that it specifies business continuity and disaster recovery (BC/DR). 4. Forecast: Information Security, Worldwide, 2015-2021, 1Q17 Update 18 May, 2017, Gartner, Inc. Calculation to Euro based on ESD amount of 100, 258. SOLUTION OVERVIEW 2

How Are Organizations Preparing for the GDPR? Data Risk Assessment Consultants, outside advisors and existing internal privacy experts can all play a role in helping organizations to prepare for a personal data flow mapping. The outcome of such a mapping activity helps to clarify the data lifecycle of personal data as it flows through the organization. This kind of lifecycle-based approach helps organizations to document how they process personal data from when and how the data enters the organization throughout the data life to when it is deleted or destroyed. For example, when a customer fills out a web form to learn more about a service that the organization offers, they will enter their name and contact information. The path of that record can be followed and documented throughout the organization to understand who has access to it and how it is protected. The four key questions organizations need to answer, before being able to assess risk and GDPR readiness are as follows: 1 What data do we have? 2 Where does the data go? 3 How is the data protected? 4 Who is accountable? CHART 2: GDPR Readiness Assessment Process Step One: A data inventory involves both a business processes analyst and a trusted advisor, who together can determine what personal data exists in an organization. Step Two: Personal data is mapped throughout the data lifecycle, from how and where data is collected to when it is deleted or destroyed. This effort typically involves all the functional groups interacting with that data throughout its lifecycle. Step Three: Identifies the technologies, processes and people that an organization currently uses to protect personal data. Step Four: Involves the assignment of accountability to the groups responsible across the business or IT service such as payroll processing or HR. The business then documents gaps and shortfalls, analyzes risk and creates a remediation plan where necessary. This process can then help to provide a clear-status on organizational readiness for the GDPR and will inform IT. While the data mapping audit process will be similar for all organizations, the path to readiness for the GDPR varies as each organization s processes are unique to them. Consequently, each journey to GDPR readiness differs. For a deeper look at a business-wide readiness plan, please view the documentation coming from the national agencies within the EU responsible for GDPR governance (example: this guide from the UK Information Commissioner s Office). SOLUTION OVERVIEW 3

How Can GDPR Preparation Be Made Proactive IT can begin preparation by mapping data security use-cases to the data lifecycle. Using a basic data lifecycle as illustrated data below, IT can map any personal data from the first stage, collection, through the final stage, deletion, then identify existing security measures and potential improvements. Using data access as an example, IT can explore access control, identity management, application access and network access. Examples of questions to explore around personal data as follows: Which users have access to what data? How is data accessed on mobile devices? What types of data can cross which networks? Can IT protect the access and usage of personal data from the data center to the end user? Identity Management Data Access Data Protection Application Access Collection User Access Deletion/ Destruction Access Policy Enforcement Network Micro- Segmentation Data Lifecycle Data Logs and Auditing Transfer Usage Identity Federation Storage Encryption In-transit at Rest Data Sovereignty Mobile Security CHART 3: Data Lifecycle and Data Protection SOLUTION OVERVIEW 4

The data lifecycle approach helps create data protection security checkpoints across many of the use cases IT is preparing for in relation to the GDPR. Examples of how the VMware portfolio can help to address data protection gaps: Date Category Data Transfer Data Transfer Data Transfer Data Usage VMware Security Portfolio VMware NSX VMware Horizon VMware Workspace ONE VMware Airwatch VMware Workspace ONE VMware vrealize VMware vrealize Capability Allows for the creation of security policies restricting data transfer across unauthorized networks Provides policy creation and enforcement of role-based access to data Provides Identity verification and management Enforces mobile access policies to applications and data Allows verification and validation of people, applications, and devices Policy creation and enforcement of VM provisioning and transfer Provides policy creation, automation and enforcement Data Storage VMware vsphere Enables data encryption at rest Data Storage VMware vsan Enables data encryption at rest Data Storage Data Storage Data Storage VMware Airwatch VMware vsan VMware Airwatch Allows for data encryption or at the end-point Provides for data storage and policy automation Provides governance and enforcement of data storage on mobile devices Data Transfer VMware NSX Enables Data Encryption in-transit Data Usage VMware NSX Provides for data privledges policy automation Data Usage VMware vrealize Provides logging and auditing Data Deletion VMware vsphere Provides for data virtual machine deletion Data Deletion VMware Airwatch Provides for end user device deletion CHART 4: Subset of VMware Security Portfolio Capabilities SOLUTION OVERVIEW 5

GDPR Overview GDPR At-a-glance Expands the scope of EU data protection Better harmonizes the laws across the EU Applies to certain organizations who processes EU personal data outside of the EU Enhances obligations of transparency and introduces an accountability obligation for organizations with the potential for fines for non-compliance The law will be implemented on May 25, 2018 What Changes Will the GDPR Bring? For organizations that use or process EU personal data the GDPR introduces a number of significant changes as follows: 1. Expansion of scope: For the first time certain requirements and obligations will be placed directly on data processors, in addition to those obligations on data controllers. Additionally, the GDPR expands the territorial scope of application of EU data protection law to capture any processing of personal data of data subjects residing in the EU, where the processing relates to the offering of goods or services to them, or the monitoring of their behaviour. 2. Transparency: A need for organizations to be more transparent to data subjects about the way in which they handle data and the ability to respond to queries from data subjects who wish to exercise their rights under the GDPR. These rights include, the right not to be subject to automatic decision making (including profiling) in certain circumstances, the right to be forgotten, the right to restriction of processing, and in certain situations the right to data portability. 3. Penalties for non-compliance: Potential fines for non-compliance have increased, with the potential for fines of up to 20 million or 4% of the total global annual turnover (revenue) of the preceding financial year, whichever sum is the greatest. 4. Accountability: Organizations who handle EU personal data are to be held accountable for that data. This obligation comes in many forms and complying with this principle of accountability needs consideration across an organization. The impact of these changes has the potential to affect enterprises and public bodies both inside and outside of Europe. Companies caught by the changes should be fortifying their data protection policies and process, identifying compliance and technology gaps and planning to handle data privacy regulations on a global basis. While compliance has several meanings, compliance within the context of the GDPR extends governance across the entire organization as it relates to personal data and data privacy. Appropriate data protection security processes, controls and technologies to support data privacy objectives, systems compliance and technical compliance will all contribute. Source: Fieldfisher (Silicon Valley), LLP SOLUTION OVERVIEW 6

GDPR From 2018-On Three functional areas key to ongoing GDPR compliance are broadly illustrated below. Data Privacy DPO Data Privacy CIO Compliance Legal GDPR Program Management Advisors Consultants Attorneys Auditors Data Privacy Advisors Data Protection Data/CyberSecurity Infosec/CISO IT Security IT Ops Risk Mgmt. CHART 5: Ongoing Data Privacy Compliance GDPR Program Management Data privacy and compliance will work to maintain the GDPR program and keep the organization in alignment with the GDPR. Data Privacy Advisors Experts in legal, business process, and audit partners guide organizations on myriad changes now and in the future. IT Data Protection The CISO works with IT groups to ensure IT policies and security align with the organization s compliance goals. Clearly, while IT has a large role in data protection the, the whole organization is responsible for maintaining compliance with the GDPR. SOLUTION OVERVIEW 7

A Transformative IT Approach to Security The old approach to security was to bolt on a point solution for each security gap. Today, we are at the point of diminishing returns. More spend no longer equates to more security and too much complexity eventually leads to rigidity in IT at a time when agility is required. VMware can help to provide ubiquitous security from the hybrid cloud to the end user, and across the data lifecycle. We do this by embedding security into the hypervisor and extending that through to the end-user, reducing the complexity of managing IT security. This approach gives you a powerful platform on which to build, run or manage any application, anywhere and for creating a more secure environment on which you can create competitive dissonance while staying in compliance. Conclusion Preparing for the GDPR can appear daunting at first. Business process analysis, data mapping, and gap analysis are just the start. Legal guidance will become part of the new normal in IT as data privacy laws become both more stringent and more standardized across the world. Taking an approach across the data lifecycle gives IT the opportunity to do three things; align with the way the business looks at data protection, identify security gaps along the data lifecycle, and help to protect people s personal information from their devices to the data center. For more information phone your VMware representative or VMware Accredited Partner. VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com Copyright 2017 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item No: VMW-GDPR-Solutions-Brief_072417_v6 7/17