SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
Data security
in the age of
GDPR:

Most common data
security problems
Kalle Varisvirta

CTO
Exove
● Data security problems that
have resulted in fines (or are
threatened to)
● Why it happens?
● How to avoid?
● How to detect?
● How to fix?
● How to audit
● How can we help
In this
presentation
Accidental disclosure of data
What is it?
● URLs accessible without any authentication
● Typically binary files, such as PDFs, that are stored on a
authentication protected system, but accessible without
any authentication
● API endpoints that are left open without authentication
● Cloud storage with no access control configured
Why?
● For binary files:
● Web-facing servers have traditionally two ways of serving data out, via
server-side programming or just serving ready-made files out, such as
images on a web page
● When serving files out, there’s no “intelligent software” in between the
client and the file
● APIs:
● APIs usually have some sort of authentication, but a lot of developers
might trust that the URL isn’t guessed and leave it open for simplicity
● APIs that don’t “write” are usually considered “secure anyway” by
developers
● Internal search engines are open by default
How to avoid?
● When serving out e.g. PDF files with personal data, make sure
they are served out through a software other than just the
web server software
● When building an API, require all API consumers have their
personal credentials for using the API, even when just reading
information from the API
● When using a cloud storage platform, make sure to configure
the access settings to limit access to the files
How to detect?
● Go to a binary file, copy the URL from the browser to another
browser in private mode and see if you can access it
● For APIs, you should just point your browser to the API,
manipulate the URL on the browser address line and see if
you can access personal data
How to fix?
● Pass all security needed binary files through software; it’s
fairly simple to do, basically you just check the existing
session, set proper headers and pass the file through
● For APIs, you should always have some authentication for
your API, even if it’s just for reading
● Add a simple shared secret / API key for every consumer,
or go a more sophisticated route and use proper
authentication
Lacking internal access control
What is it?
● An internal user can access too much information in a system
due to no internal access control or lacking internal access
control
Why?
● It’s very typical to focus most resources to actual functionality
of a system, with some focus on external security, too
● Internal security is a topic considered low priority in most
system projects
● By default, even the systems with a highly sophisticated
internal access control settings allow administrator users to
access all information
● Some systems require you to allow access to too much
information, due to the access control setting being too
coarse
How to avoid?
● Always start with taking internal security seriously in a system
project
● Always take internal access control settings into use at the
initial adoption of a system
● Always increase rights as they are needed, starting from the
most limited set of rights you can find will get the job done
● It’s a pain, but it might save a lot in GDPR fines
How to detect?
● Try to access information you shouldn’t be able to access
● Ask others to access information they shouldn’t be able to
access
How to fix?
● If there’s no internal access control in a system, in most cases
one can be built
● If you haven’t taken proper access level into use, do it
● If you haven’t limited the access properly, limit it now
● For giving out access rights, you should have a documented
process that gets followed every time
Targeted attacks
What is it?
● A targeted attack to steal personal information from a system
● Typically targeting credit card information
● CC information isn’t safe on the form they are filled into, even
when they are only stored on a external PCI DSS certified
card-on-file service provider
● If it’s written into a box, everything surrounding that box
have to be hardened
● CC information should never be stored to a system not
specifically designed (and certified) to do that
Why?
● Some systems are just too darn good to be true;
● Travel websites handle huge amounts of credit card data
● Online commerce also has variety of ways to handle
payment information
● A targeted attack is done by professional criminals
● They may try to find ways to get in for months or years
How to avoid?
● Avoiding targeted attacks is very hard
● Typical routes to attack are people and their personal
computers of mobile equipment
● Limited access to data and production environments should
be considered in a high risk environment
● Automated checks can also be employed to protect against
malicious files
● Only allow version controlled files to be ran
● Only allow files to version control via a peer review
process
How to detect?
● Targeted attacks are made to be hard to detect
● You can use DLP (data leak protection) technology, that will
try to detect credit card information being sent out, but they
have their own problems (encryption, MITM)
● You can check for all changes on a digital service, and just
verify that all files changed were changed purposefully
● You can keep your eyes open for data being sold on Tor
network or some other darknet
How to fix?
● If you have been attacked, implement the best practices to handle an
attack
● Incident response is a four step process
● Communication
● Seizure
● Analysis
● Reporting
● Recovery for business continuity
● Root cause analysis and changes to policies and processes
● You might want to get help to deal with a targeted attack
How to audit
Auditing for GDPR compliant data protection
● Audits for GDPR compliant personal data security and regular
security audits overlap partially, but one doesn’t cover the
other
● Regular security audits are focused on system security and
are based on security principles such as OWASP top 10
● Data security audit can be significantly lighter and more
focused on personal data protection
Auditing for GDPR compliant data protection
● Security architecture
● Code inspection for risk structures
● Internal access control
● Maintenance and development practices
● Isolation
How can we help?
Security audit focusing on
data protection related risks
for your most vulnerable
internet-facing systems
The aim is to find problems
that, if found by the general
public or attackers, may result
in sanctions
Data
security
audit 

for an internet
facing service
● Security architecture review
● Accidental data leak
inspection
● Automated audit
● Expert review
● Internal access control /
isolation inspection
● Security of maintenance
and deployment practices
review
Data
security
audit 

for an internet
facing service
What’s included?
● Complements data protection
audit done by Bird & Bird by
discovering the unknown
● What’s happening under
the hood?
● Is the architecture
secure?
● Are there vulnerabilities
that may cause a data
leak?
● Are the maintenance
practices secure?
Benefits
Thanks!
Data security in the age of GDPR – most common data security problems

Contenu connexe

Tendances

Secure Storage Encryption Implications_Fornetix
Secure Storage Encryption Implications_FornetixSecure Storage Encryption Implications_Fornetix
Secure Storage Encryption Implications_Fornetix
Bob Guimarin
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrong
bryns
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
NCC Group
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
NCC Group
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
hoanv
 

Tendances (20)

Secure Storage Encryption Implications_Fornetix
Secure Storage Encryption Implications_FornetixSecure Storage Encryption Implications_Fornetix
Secure Storage Encryption Implications_Fornetix
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrong
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Access Control Systems
Access Control SystemsAccess Control Systems
Access Control Systems
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
Unlock Security Insight from Machine Data
Unlock Security Insight from Machine DataUnlock Security Insight from Machine Data
Unlock Security Insight from Machine Data
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
 
National Digital ID Platform Technical Forum
National Digital ID Platform Technical ForumNational Digital ID Platform Technical Forum
National Digital ID Platform Technical Forum
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset Security
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Intruders and Intrusion detection in Cryptosystems
Intruders and Intrusion detection in CryptosystemsIntruders and Intrusion detection in Cryptosystems
Intruders and Intrusion detection in Cryptosystems
 
Contract Security Officer Services
Contract Security Officer ServicesContract Security Officer Services
Contract Security Officer Services
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and Auditing
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Application Security Verification Standard Project
Application Security Verification Standard ProjectApplication Security Verification Standard Project
Application Security Verification Standard Project
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 

Similaire à Data security in the age of GDPR – most common data security problems

Blockade.io : One Click Browser Defense
Blockade.io : One Click Browser DefenseBlockade.io : One Click Browser Defense
Blockade.io : One Click Browser Defense
RiskIQ, Inc.
 
CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12
jemtallon
 

Similaire à Data security in the age of GDPR – most common data security problems (20)

Security .NET.pdf
Security .NET.pdfSecurity .NET.pdf
Security .NET.pdf
 
Incident Response Fails
Incident Response FailsIncident Response Fails
Incident Response Fails
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
 
Barbed Wire Network Security Policy 27 June 2005 7
Barbed Wire Network Security Policy 27 June 2005 7Barbed Wire Network Security Policy 27 June 2005 7
Barbed Wire Network Security Policy 27 June 2005 7
 
DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019
 
Blockade.io : One Click Browser Defense
Blockade.io : One Click Browser DefenseBlockade.io : One Click Browser Defense
Blockade.io : One Click Browser Defense
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12
 
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptxEncrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC Access
 
Securing Sensitive IBM i Data At-Rest and In-Motion
Securing Sensitive IBM i Data At-Rest and In-MotionSecuring Sensitive IBM i Data At-Rest and In-Motion
Securing Sensitive IBM i Data At-Rest and In-Motion
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Security Design Principles.ppt
 Security Design Principles.ppt Security Design Principles.ppt
Security Design Principles.ppt
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 

Plus de Exove

Plus de Exove (20)

Provisioning infrastructure to AWS using Terraform – Exove
Provisioning infrastructure to AWS using Terraform – ExoveProvisioning infrastructure to AWS using Terraform – Exove
Provisioning infrastructure to AWS using Terraform – Exove
 
Advanced custom fields in Wordpress
Advanced custom fields in WordpressAdvanced custom fields in Wordpress
Advanced custom fields in Wordpress
 
Introduction to Robot Framework – Exove
Introduction to Robot Framework – ExoveIntroduction to Robot Framework – Exove
Introduction to Robot Framework – Exove
 
Jenkins and visual regression – Exove
Jenkins and visual regression – ExoveJenkins and visual regression – Exove
Jenkins and visual regression – Exove
 
Server-side React with Headless CMS – Exove
Server-side React with Headless CMS – ExoveServer-side React with Headless CMS – Exove
Server-side React with Headless CMS – Exove
 
WebSockets in Bravo Dashboard – Exove
WebSockets in Bravo Dashboard – ExoveWebSockets in Bravo Dashboard – Exove
WebSockets in Bravo Dashboard – Exove
 
Diversity in recruitment
Diversity in recruitmentDiversity in recruitment
Diversity in recruitment
 
Saavutettavuus liiketoimintana
Saavutettavuus liiketoimintanaSaavutettavuus liiketoimintana
Saavutettavuus liiketoimintana
 
Saavutettavuus osana Eläkeliiton verkkosivu-uudistusta
Saavutettavuus osana Eläkeliiton verkkosivu-uudistustaSaavutettavuus osana Eläkeliiton verkkosivu-uudistusta
Saavutettavuus osana Eläkeliiton verkkosivu-uudistusta
 
Mitä saavutettavuusdirektiivi pitää sisällään
Mitä saavutettavuusdirektiivi pitää sisälläänMitä saavutettavuusdirektiivi pitää sisällään
Mitä saavutettavuusdirektiivi pitää sisällään
 
Creating Landing Pages for Drupal 8
Creating Landing Pages for Drupal 8Creating Landing Pages for Drupal 8
Creating Landing Pages for Drupal 8
 
GDPR for developers
GDPR for developersGDPR for developers
GDPR for developers
 
Managing Complexity and Privacy Debt with Drupal
Managing Complexity and Privacy Debt with DrupalManaging Complexity and Privacy Debt with Drupal
Managing Complexity and Privacy Debt with Drupal
 
Life with digital services after GDPR
Life with digital services after GDPRLife with digital services after GDPR
Life with digital services after GDPR
 
GDPR - no beginning no end
GDPR - no beginning no endGDPR - no beginning no end
GDPR - no beginning no end
 
Developing truly personalised experiences
Developing truly personalised experiencesDeveloping truly personalised experiences
Developing truly personalised experiences
 
Customer Experience and Personalisation
Customer Experience and PersonalisationCustomer Experience and Personalisation
Customer Experience and Personalisation
 
Adventures In Programmatic Branding – How To Design With Algorithms And How T...
Adventures In Programmatic Branding – How To Design With Algorithms And How T...Adventures In Programmatic Branding – How To Design With Algorithms And How T...
Adventures In Programmatic Branding – How To Design With Algorithms And How T...
 
Dataohjattu asiakaskokemus
Dataohjattu asiakaskokemusDataohjattu asiakaskokemus
Dataohjattu asiakaskokemus
 
DrupalCamp Baltics: You Need to Grow to Stay Alive
DrupalCamp Baltics: You Need to Grow to Stay AliveDrupalCamp Baltics: You Need to Grow to Stay Alive
DrupalCamp Baltics: You Need to Grow to Stay Alive
 

Dernier

Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
vexqp
 
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit RiyadhCytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Abortion pills in Riyadh +966572737505 get cytotec
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Klinik kandungan
 
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling ManjurJual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
ptikerjasaptiker
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
wsppdmt
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
gajnagarg
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
gajnagarg
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
Health
 

Dernier (20)

Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptxThe-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
 
Digital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareDigital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham Ware
 
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
 
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit RiyadhCytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for Research
 
SR-101-01012024-EN.docx Federal Constitution of the Swiss Confederation
SR-101-01012024-EN.docx  Federal Constitution  of the Swiss ConfederationSR-101-01012024-EN.docx  Federal Constitution  of the Swiss Confederation
SR-101-01012024-EN.docx Federal Constitution of the Swiss Confederation
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling ManjurJual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
 
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
 
Harnessing the Power of GenAI for BI and Reporting.pptx
Harnessing the Power of GenAI for BI and Reporting.pptxHarnessing the Power of GenAI for BI and Reporting.pptx
Harnessing the Power of GenAI for BI and Reporting.pptx
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
 
Data Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdfData Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdf
 
Sequential and reinforcement learning for demand side management by Margaux B...
Sequential and reinforcement learning for demand side management by Margaux B...Sequential and reinforcement learning for demand side management by Margaux B...
Sequential and reinforcement learning for demand side management by Margaux B...
 

Data security in the age of GDPR – most common data security problems

  • 1. Data security in the age of GDPR:
 Most common data security problems Kalle Varisvirta
 CTO Exove
  • 2. ● Data security problems that have resulted in fines (or are threatened to) ● Why it happens? ● How to avoid? ● How to detect? ● How to fix? ● How to audit ● How can we help In this presentation
  • 4.
  • 5. What is it? ● URLs accessible without any authentication ● Typically binary files, such as PDFs, that are stored on a authentication protected system, but accessible without any authentication ● API endpoints that are left open without authentication ● Cloud storage with no access control configured
  • 6. Why? ● For binary files: ● Web-facing servers have traditionally two ways of serving data out, via server-side programming or just serving ready-made files out, such as images on a web page ● When serving files out, there’s no “intelligent software” in between the client and the file ● APIs: ● APIs usually have some sort of authentication, but a lot of developers might trust that the URL isn’t guessed and leave it open for simplicity ● APIs that don’t “write” are usually considered “secure anyway” by developers ● Internal search engines are open by default
  • 7. How to avoid? ● When serving out e.g. PDF files with personal data, make sure they are served out through a software other than just the web server software ● When building an API, require all API consumers have their personal credentials for using the API, even when just reading information from the API ● When using a cloud storage platform, make sure to configure the access settings to limit access to the files
  • 8. How to detect? ● Go to a binary file, copy the URL from the browser to another browser in private mode and see if you can access it ● For APIs, you should just point your browser to the API, manipulate the URL on the browser address line and see if you can access personal data
  • 9. How to fix? ● Pass all security needed binary files through software; it’s fairly simple to do, basically you just check the existing session, set proper headers and pass the file through ● For APIs, you should always have some authentication for your API, even if it’s just for reading ● Add a simple shared secret / API key for every consumer, or go a more sophisticated route and use proper authentication
  • 11.
  • 12. What is it? ● An internal user can access too much information in a system due to no internal access control or lacking internal access control
  • 13.
  • 14. Why? ● It’s very typical to focus most resources to actual functionality of a system, with some focus on external security, too ● Internal security is a topic considered low priority in most system projects ● By default, even the systems with a highly sophisticated internal access control settings allow administrator users to access all information ● Some systems require you to allow access to too much information, due to the access control setting being too coarse
  • 15. How to avoid? ● Always start with taking internal security seriously in a system project ● Always take internal access control settings into use at the initial adoption of a system ● Always increase rights as they are needed, starting from the most limited set of rights you can find will get the job done ● It’s a pain, but it might save a lot in GDPR fines
  • 16. How to detect? ● Try to access information you shouldn’t be able to access ● Ask others to access information they shouldn’t be able to access
  • 17. How to fix? ● If there’s no internal access control in a system, in most cases one can be built ● If you haven’t taken proper access level into use, do it ● If you haven’t limited the access properly, limit it now ● For giving out access rights, you should have a documented process that gets followed every time
  • 19.
  • 20. What is it? ● A targeted attack to steal personal information from a system ● Typically targeting credit card information ● CC information isn’t safe on the form they are filled into, even when they are only stored on a external PCI DSS certified card-on-file service provider ● If it’s written into a box, everything surrounding that box have to be hardened ● CC information should never be stored to a system not specifically designed (and certified) to do that
  • 21. Why? ● Some systems are just too darn good to be true; ● Travel websites handle huge amounts of credit card data ● Online commerce also has variety of ways to handle payment information ● A targeted attack is done by professional criminals ● They may try to find ways to get in for months or years
  • 22. How to avoid? ● Avoiding targeted attacks is very hard ● Typical routes to attack are people and their personal computers of mobile equipment ● Limited access to data and production environments should be considered in a high risk environment ● Automated checks can also be employed to protect against malicious files ● Only allow version controlled files to be ran ● Only allow files to version control via a peer review process
  • 23. How to detect? ● Targeted attacks are made to be hard to detect ● You can use DLP (data leak protection) technology, that will try to detect credit card information being sent out, but they have their own problems (encryption, MITM) ● You can check for all changes on a digital service, and just verify that all files changed were changed purposefully ● You can keep your eyes open for data being sold on Tor network or some other darknet
  • 24. How to fix? ● If you have been attacked, implement the best practices to handle an attack ● Incident response is a four step process ● Communication ● Seizure ● Analysis ● Reporting ● Recovery for business continuity ● Root cause analysis and changes to policies and processes ● You might want to get help to deal with a targeted attack
  • 26. Auditing for GDPR compliant data protection ● Audits for GDPR compliant personal data security and regular security audits overlap partially, but one doesn’t cover the other ● Regular security audits are focused on system security and are based on security principles such as OWASP top 10 ● Data security audit can be significantly lighter and more focused on personal data protection
  • 27. Auditing for GDPR compliant data protection ● Security architecture ● Code inspection for risk structures ● Internal access control ● Maintenance and development practices ● Isolation
  • 28. How can we help?
  • 29. Security audit focusing on data protection related risks for your most vulnerable internet-facing systems The aim is to find problems that, if found by the general public or attackers, may result in sanctions Data security audit 
 for an internet facing service
  • 30. ● Security architecture review ● Accidental data leak inspection ● Automated audit ● Expert review ● Internal access control / isolation inspection ● Security of maintenance and deployment practices review Data security audit 
 for an internet facing service What’s included?
  • 31. ● Complements data protection audit done by Bird & Bird by discovering the unknown ● What’s happening under the hood? ● Is the architecture secure? ● Are there vulnerabilities that may cause a data leak? ● Are the maintenance practices secure? Benefits