Evidence-based protection of web resources a must under the GDPR. How the Akamai Intelligent Platform helps customers to mitigate risks

Similar documents
AKAMAI CLOUD SECURITY SOLUTIONS

Securing Your Most Sensitive Data

Best Practices in Securing a Multicloud World

Overview of Akamai s Personal Data Processing Activities and Role

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM

General Data Protection Regulation (GDPR) and the Implications for IT Service Management

AKAMAI THREAT ADVISORY. Satori Mirai Variant Alert

akamai s [state of the internet] / security

AKAMAI WHITE PAPER. Security and Mutual SSL Identity Authentication for IoT. Author: Sonia Burney Solutions Architect, Akamai Technologies

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

AN IPSWITCH WHITEPAPER. 7 Steps to Compliance with GDPR. How the General Data Protection Regulation Applies to External File Transfers

Putting security first for critical online brand assets. cscdigitalbrand.services

The Top 6 WAF Essentials to Achieve Application Security Efficacy

and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered

Q&A TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL. An interview with John Summers, Enterprise VP and GM, Akamai

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

TechValidate Survey Report: SaaS Application Trends and Challenges

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

Teradata and Protegrity High-Value Protection for High-Value Data

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

FOR FINANCIAL SERVICES ORGANIZATIONS

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness

Title: Planning AWS Platform Security Assessment?

CloudSOC and Security.cloud for Microsoft Office 365

General Data Protection Regulation. May 25, 2018 DON T PANIC! PLAN!

DIGITAL TRUST Making digital work by making digital secure

Privileged Account Security: A Balanced Approach to Securing Unix Environments

DDoS MITIGATION BEST PRACTICES

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Intelligent and Secure Network

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems

Accelerate Your Enterprise Private Cloud Initiative

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Cybersecurity Considerations for GDPR

THALES DATA THREAT REPORT

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

The Interactive Guide to Protecting Your Election Website

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

External Supplier Control Obligations. Cyber Security

Understand & Prepare for EU GDPR Requirements

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet

MULTIPLAYER GAMING SOLUTION BRIEF

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview

Run the business. Not the risks.

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

Data Privacy and Protection GDPR Compliance for Databases

Security by Default: Enabling Transformation Through Cyber Resilience

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

HIPAA Regulatory Compliance

Security Enhancements

First aid toolkit for the management of data breaches. Mary Deligianni Senior Associate 15 February 2018

Cybersecurity The Evolving Landscape

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

Survey: Global Efficiency Held Back by Infrastructure Spend in Pharmaceutical Industry

CA Security Management

Incident Response Services

The Role of the Data Protection Officer

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Data Privacy in Your Own Backyard

CyberArk Privileged Threat Analytics

Combating Cyber Risk in the Supply Chain

Cybersecurity for Service Providers

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

A Security Admin's Survival Guide to the GDPR.

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

Bomgar Discovery Report

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

Q&A TALKING CYBER SECURITY WITH THE BOARD OF DIRECTORS. An interview with Josh Shaul, VP, Web Security Products

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

GDPR Update and ENISA guidelines

WHITEPAPER. How to secure your Post-perimeter world

How the GDPR will impact your software delivery processes

Internet of Things Toolkit for Small and Medium Businesses

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

General Data Protection Regulation (GDPR)

MITIGATE CYBER ATTACK RISK

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

The Honest Advantage

locuz.com SOC Services

CYBERARK GDPR ADVISORY. SECURE CREDENTIALS. SECURE ACCESS. A PRIVILEGED ACCOUNT SECURITY APPROACH TO GDPR READINESS

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Transcription:

AKAMAI WHITE PAPER Evidence-based protection of web resources a must under the GDPR How the Akamai Intelligent Platform helps customers to mitigate risks

Table of Contents GDPR: What is it? 1 How can Akamai help with GDPR compliance? 2 Work Risk-based 2 Build Evidence 3 Use state-of-the-art Technology 3 Implement a Zero Trust Enterprise Security Strategy 5 Conclusion 6

Evidence-based protection of web resources a must under the GDPR 1 GDPR is a game changer. State-of-the-art solutions are necessary. Akamai s security services will help minimize the risks associated with your personal data processing activities. Dr. Anna Schmits, EU Data Protection Officer, Akamai GDPR: What is it? The EU General Data Protection Regulation (GDPR) is a new EU regulation that replaces the existing Data Protection Directive 95/46/EC, as well as many local laws implementing the Directive. The GDPR harmonizes data privacy laws across Europe to protect all EU citizens data privacy rights. Under the new rules of the GDPR, the impact of non-compliance (e.g., failing to prove that the personal data processed has been adequately protected in case of breach) can have a material impact on the financial status of an organization, as well as severe consequences for its business leaders. Ultimately, the reputation of the organization is at stake. The GDPR will be equally enforced by all European member states and will go into effect beginning 25 May 2018. Among its many requirements, the GDPR requires that companies, in order to minimize risks to the rights and freedoms of individuals, implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk. These security measures must be in place before the May 2018 deadline. Given the significant volume of personal and sensitive data that is accessible via Internet-facing websites and web-facing applications, this is no small task. In addition, the GDPR requires that organizations processing personal data be able to demonstrate that appropriate security measures are effectively and efficiently protecting the personal data processed. Meeting this obligation is complicated by the fact that organizations often utilize many third parties to provide specific data processing activities. While there may be a chain of data processing activities spread among a number of separate parties, the original organization the so-called Data Controller remains responsible for the protection of the personal data processed. Given the accountability established under the GDPR, it is an absolute must that Data Controllers have appropriate security measures in place and be able to provide evidence, especially in the unfortunate event of a data loss or breach, that these measures are effective. What exactly is an appropriate security measure and what required evidence is expected to be delivered in a timely manner? According to the GDPR, appropriate security measures will be those that take into account the state of the art, the cost of implementation, and the scope, context, and purposes of processing, and balance these against the risks and impacts to the rights and freedoms of individuals. Of course, the perception of what is appropriate or in balance will be determined by the Data Protection Authority (DPA), who will no doubt look to industry best practice as a guide. One tool for arriving at the required balance discussed above is the data protection impact assessment (DPIA), a process required in some cases under the GDPR to determine the potential impact of data processing activities. When conducting a DPIA, an organization must document in detail a number of factors, including: Envisaged data processing operations; The necessity and proportionality of these operations; An assessment of the risks of data breach associated with the operations; The measures envisaged to address these risks, including safeguards and security measures, and mechanisms to ensure protection of personal data. 1

Evidence-based protection of web resources a must under the GDPR 2 The GDPR mandates a risk-based approach to data protection. Security obligations are not stated in a vacuum, but rather are to be developed based upon a thorough analysis and understanding of the risks that each processing activity may have for the individuals whose data is being processed. While this approach offers the necessary flexibility to allow organizations to apply reasonable measures in light of costs, system architecture, and related factors, it nevertheless requires a rigorous cost-benefit/risk review of everything that the organization does with personal data. In many cases, this is a significant task. How successfully an organization can provide sufficient evidence of effective risk mitigation will depend upon its understanding of the relevant privacy risks as well as the strengths of the state-of-the-art security measures it chooses to implement in response to perceived risks. Of course, an organization s success also will depend upon the selection of partners that understand security and data protection obligations and take the necessary steps to protect their own systems. Akamai is committed to protecting the security of all data transmitted over its platform, and has adopted an enterprise-wide information security program in accordance with the International Standard ISO/IEC ISO 2700x standard for information security management. Akamai is assessed annually against the ISO 27002 and the U.S. federal government s FedRAMP standard. In addition, Akamai s Secure CDN platform is assessed annually for compliance with the Payment Card Industry s Data Security Standards and the Health Insurance Portability and Accountability Act. Akamai also undergoes annual Service Organization Control 2 Type 2 auditing and reporting. How can Akamai Help with GDPR Compliance? Under the GDPR, evidence must be documented to show that that personal data processed by an organization is appropriately and sufficiently protected. In an interconnected world, where many web applications and websites contain or access personal data, this can be a big challenge. This challenge encompasses people, process, and technology. Akamai s Intelligent Platform can be leveraged to help meet this challenge and offers a strong security strategy based on the best security professionals in the market, flexible and high-quality processes, and recognized state-of-the-art technology. Akamai provides four principles for approaching the security requirements under the GDPR. We will describe below how Akamai Security Solutions can help organizations address major data processing risks. Work Risk-based Significant volumes of personal data are processed through Internet-facing applications. Companies and organizations are required under the GDPR to implement appropriate technical and organizational measures 2 to secure the personal data under their control. Such measures should include security technologies designed to protect Internet-facing applications and websites from attacks intended to access personal data. The Akamai Web Application Firewall () combines industry best practices such as those set out by the Open Web Application Security Project (OWASP) with intelligent scoring mechanisms to identify attack traffic. In addition, first-class security experts continuously monitor the web for new attacks. The Akamai is by design a risk-based threat protection service. It is built upon risk groups that can be used to immediately, effectively, and efficiently mitigate risks associated with the most sophisticated application layer attacks. By implementing the Akamai, customers can demonstrate that they have taken reasonable steps to prepare themselves against many known and unknown threats.

Evidence-based protection of web resources a must under the GDPR 3 An increasing amount of traffic traveling through the Akamai Intelligent Platform is API-based. The risk caused by APIs being under-protected is explicitly called out in the OWASP Top 10 of 2017 as an increasing risk that needs special attention. Akamai Kona Site Defender is focused on protecting API traffic. Kona Site Defender: protects RESTful APIs and traditional XML-based web services; mitigates DDoS attacks and data theft caused by excessive rate, slow post, parameter, and MITM attacks; is offered as a cloud solution and scales to the needs of the largest business asset owners and API publishers; provides analytics and value confirmation reports; provides SIEM integration. Hard evidence that high-reputation best practices are effectively and efficiently implemented as part of an Information Security Management System forms an essential part of an organization s risk mitigation, and will help to satisfy a Data Protection Authority by showing that appropriate security measures have been taken. Build Evidence In the event of a security breach requiring the reporting of the loss of personal data to a DPA, it is extremely important that evidence is supplied to the DPA of the mitigation steps taken historically and the mitigation steps that will be taken in the future to ensure the impact is minimized. For security measures to be effective, they must constantly be reviewed against new and changing threats. Akamai Security Optimization Assistance helps organizations to respond to the ever-changing threat landscape and provides evidence that they have actively anticipated and mitigated risks by creating and maintaining effective and efficient rules. Extensive reporting and evaluation is delivered containing the type, quantity, and probability of attacks in a given time period. As part of the Akamai Managed Kona Site Defender service, an Akamai security expert will proactively review security policies and make suggestions for ongoing adjustments of the rules. Use State-of-the-Art Technology According to the GDPR, appropriate security measures will be those that consider the state of the art 3, the cost of implementation, and the scope, context and purposes of processing and balance these against the risks and impacts to the rights and freedoms of individuals. Of course, the perception of what is appropriate or in balance will be determined by the appropriate Data Protection Authority (DPA) who will no doubt look to industry best-practice as a guide. Distributed Denial of Service (DDoS) attacks combined with application layer attack vectors like SQL injection (SQLi), Local File Inclusion (LFI), Remote File Inclusion (RFI), and Cross-Site-Scripting (XSS) are an extremely dangerous combination when it comes to the theft and leakage of personal data. Often, separate and siloed solutions from different vendors that are unaware of each other s existence are installed in your (cloud) datacenter. This approach is suboptimal and leads to delays and ineffective responses. While applications and personnel are kept busy and many incidents are created, a very targeted attack can be launched at the same time, stealing specific sensitive information. Personal data can only be effectively protected by a solution that protects against both DDoS and application layer attacks in a harmonized and coordinated way. Gerhard Giese, Manager Enterprise Security Architects EMEA, Akamai

Evidence-based protection of web resources a must under the GDPR 4 Where Scale Matters! Delivering Performance and Security from the Edge Node. FastDNS Application Origin Client Reputation As the Akamai Web Application Firewall is part of the Akamai Intelligent Platform, it is designed to deliver customer content via the best available Edge Node for the user requesting certain web content (the is part of Akamai s core Content Delivery Network infrastructure). The best available Akamai Edge Node is, in many cases, the Edge Node that is physically closest to the user requesting your web content. The Akamai Intelligent Platform consists of a worldwide fine-grained network of more than 230,000 Edge Nodes that run in more than 1,600 networks in more than 130 countries. The result is that attackers are stopped as soon as they try to reach corporate websites or web applications via the Akamai Edge Node not just before the attack hits your corporate website or application server in your datacenter, where it becomes cumbersome to absorb all the load and to detect and mitigate the attack. Expensive oversized equipment needs to be bought and managed, or hybrid solutions need to be implemented with uncertain costs associated. The Akamai is installed on thousands of Edge Nodes and absorbs the entire load smoothly while mitigating the attack at no extra capital cost to the organization. Application layer DDoS attacks, and attacks using ports other than ports 80 or 443, are immediately stopped at the Akamai Edge Node. Specific customers rules are quickly rolled out across thousands of relevant Edge Nodes protecting all the organizations web-facing resources all over the globe. This unique and innovative approach means that Akamai is better positioned than any other security vendor to protect the whole data processing and data distribution chain of personal data of any organization with any kind of Internet presence. The effectiveness of the Akamai can be increased further by adding the reputation of the IP addresses accessing your web resources. Akamai s Client Reputation database sees 1 billion IP addresses each quarter. A small percentage of these are deemed to be malicious and rated on a scale of 1 to 10, and can be blocked by the customer using rules. Every day, hundreds of millions of IP addresses are analyzed for malicious activity. This innovative approach results in a measurable effectiveness,in most cases, with an accuracy of more than 95%. Evaluation of the effectiveness 4 of the implemented security control is an important part of the GDPR compliance process. Credential (username/password) theft can very easily lead to the loss of sensitive personal data. Following a recent large leakage of passwords on the Internet, researchers found that 8.8% of these credentials use one of seven very simple passwords (e.g., 123456, password, etc.). People tend to choose simple passwords that they can easily remember, and people reuse passwords often. Once credentials are hacked, it s possible that multiple data sources are exposed. Attackers use sophisticated botnets to automatically and rapidly access websites worldwide using stolen credentials.

Evidence-based protection of web resources a must under the GDPR 5 Akamai is well positioned to mitigate these risks. Akamai Bot Manager Premier installed on Akamai Edge Nodes can inspect and reject traffic to your web resources based on credential abuse-specific reputation. Implement a Zero Trust Enterprise Security Strategy Implementing a Zero Trust enterprise security strategy will make GDPR compliance easier and avoid associated costs. Zero Trust Enterprise Security Strategy Keep Single User Administration Create Audit Trails Internet Enterprise App A User DMZ in the Cloud Software Defined Perimeter App B App C No Attack Footprint Zero Trust isolates applications containing sensitive personal data Zero Trust is based on the concept that there is no distinction made between internal and external network traffic. In fact, nothing and nobody should be trusted in or outside your corporate environment. The first step is that access needs to be explicitly granted and confirmed by a central management system to all resources and all the traffic needs to be monitored and inspected all the time. Secondly the classical network design based on a DMZ is transformed into an isolated services approach. The access of applications via a cloud perimeter means the applications are isolated from the Internet and users are kept off your network. The application and personal data cannot be accessed other than via the Akamai Intelligent Platform, which obfuscates corporate infrastructure and resources. The result is that personal data, whether in a corporate datacenter or IaaS, can be protected much more effectively. The segmentation and isolation of applications and data combined with full access logging makes audits and/or Data Protection Impact Assessments less time consuming. In times of challenges, it is much clearer where to search. Additionally, part of a Zero Trust strategy is the principle that you don t trust users or their respective devices. Inline inspection is needed, and every action users take must be monitored and logged. Audit trails of employee and contractor activity can be secured in an appropriate way, which eases the documentation for any required Data Protection Impact Assessment or audit. In addition, since the vast majority of malicious attacks use DNS across the entire cyber kill chain, it is important to not only get visibility into Internet-bound DNS requests, but also use DNS as an enterprise control point. Utilizing the Akamai Cloud Perimeter to achieve Zero Trust means all DNS requests are inspected and evaluated. If untrustworthy links are clicked in phishing or ransomware attempts, the cloud perimeter would block the DNS request and protect your users. Leverage the Akamai Cloud Perimeter to: Only deliver apps/data to authn & authz users/devices Proactively prevent malware & DNS-based exfiltration everywhere Never trust and always verify with full visibility

Evidence-based protection of web resources a must under the GDPR 6 Conclusion The GDPR requires a risk-based approach to data protection and asks for hard evidence that risks are continuously mitigated sufficiently. All organizations that process in any way the personal data of individuals in the EU must be prepared to demonstrate that they have taken strong steps to protect the personal data under their control. Akamai has developed and operates the world s largest and most advanced cloud-based Intelligent Platform for securely distributing and accelerating web content. Leveraging the security knowledge and expertise of Akamai helps customers to protect their data assets, including personal data protected under the GDPR, against loss and unlawful access. Akamai can help with concrete steps to further customers efforts at GDPR compliance. By implementing the Akamai Web Application Firewall (), customers can demonstrate that they have taken steps to prepare themselves against many known and unknown threats. The combines industry best practices with intelligent risk-based scoring mechanisms to identify attack traffic. Highly trained Akamai security experts help organizations to respond to the ever-changing threat landscape and provide evidence that organizations have actively anticipated risks by creating and maintaining effective and efficient rules. In addition, the implementation of a harmonized and integrated DDoS and application layer solution mitigates the risk of multi-vector attacks focused on stealing personal data. Last but not least, implementing a Zero Trust security strategy utilizing the Akamai cloud perimeter helps customers to adequately isolate the applications that process personal data. Audit trails are maintained of who accessed which resources when, and proper protection mechanisms protect employees and contractors from infection. Akamai is determined to help business owners manage the risks incurred by the new privacy regulation. Author: Erik van Veen, CISSP, Akamai Technologies Sources 1) See GDPR Article 35 (7) 2) See GDPR Article 24 (1) and Article 32 (1) 3) See GDPR Article 25 (1) and Article 32 (1) 4) See GDPR Article 32 (1d) As the world s largest and most trusted cloud delivery platform, Akamai makes it easier for its customers to provide the best and most secure digital experiences on any device, anytime, anywhere. Akamai s massively distributed platform is unparalleled in scale with over 200,000 servers across 130 countries, giving customers superior performance and threat protection. Akamai s portfolio of web and mobile performance, cloud security, enterprise access, and video delivery solutions are supported by exceptional customer service and 24/7 monitoring. To learn why the top financial institutions, e-commerce leaders, media & entertainment providers, and government organizations trust Akamai please visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter. You can find our global contact information at www.akamai.com/locations. Published 12/17.