SlideShare a Scribd company logo
1 of 24
Download to read offline
Line Of Business Application
FROM DREAM TO PRODUCTION
SOFTWARE .NET ARCHITECT
LOB APP INTEGRATOR
HIPAA|GPDR-COMPLIANCE CONSULTANT
DATA RESEARCHER
Yuriy Chudinov
Threats types
Direct
crack
Data loss or
compromise
Crack for
publicity
CEO Categories
Paranoic Listener Scumbag
Agenda
Introduction
Few words about the general
state of things
Physical concept
Review of basic and architecture things
to be done before On compliance
Statistics
Review of data types & its growing
manner
Legal
List of required documents to enable
compliance
Recommendation
List of required documents to enable
compliance
Security Compliance
More than software quality factors
Information Security never depends on Software quality factors
It works to get community better
McCall's quality model
Boehm quality model
Dromey's quality model
Compliance
Product operation factors
Correctness | Reliability | Efficiency | Integrity | Usability
Product revision factors
Maintainability | Flexibility | Testability
Product transition factors
Portability | Reusability | Interoperability.
GDPR HIPAA|HSS NIST CSF
GPDR|HIPAA|HSS|NIST CSF
Successful compliance requires deep understanding of whole system and each data chain
but not a particular modules or components
Key to Save compliance is understanding particular regulator and people that will use it
Software Categories
There is no software that does not belong to any particular category
or a specific domain
Clear definition and domain category relation will
make easy turn on any compliance regulator type for your software
Platform and
management
Product
manufacturing
and service
delivery
Education and
reference
Home and
entertainment
Operations and
professional
Start-ups
Content and
communications
Digital Chains
For the successful application of a regulator,
not enough understanding of the logic of interaction of individual
modules - it is important to understand the whole chain of use
4g/LTEInternet iotBluetooth
AWS
Physical View
SOFTWARE
APP
Database
APP
Basis
Lab
EDR
Storage
Event
Log
Uses
Stores
Data
Electronic Data Record
Encode|decode
request(AppModel)
State|Errorresults
Saves
HIPAA | GDPR
CoDec module
SOFTWARE
APP
Database
Uses
Verifies
Shared
Secure Lib
SSO
Server
ACL Certificate Lists of ID LPDAP, etc
AAI requests
over HTTPS
Optimization - HIPAA | GDPR module integration Organize - SSO module integration
Lob application
Operation distribution and data categories
Each application category has own operational distribution
Representation 26%
(print, PDF, diagrams)
Storage 32%
(archivation)
Extraction 8%
(from archive)
Local operations 34%
(actual DB and functional algs)
DATA
LOGS SECURITY
COMPLIANCE
OPERATIONAL
Lob application
Data distribution
Risk probability is directly related to the volume of data
3 month
after system input
81%
13%
6%
5 year
after system input
16%
48%
6%
30%
3 year
after system input
20%
9%
30%
41%
1 year
after system input
57%
19%
21%
sensitive and insensitive data
archive (both sensitive and insensitive)
operational audit
security layer data
HIPAA & GDPR
Compliance software requires compliance workflows
Test DB
Test DB
Code
modification Run Tests
Code Analysis
Code Commit
Run Tests
Code
Analysis
Installer
Verification
Deploy to UAT
Manual Test
on UAT
HIPAA
Validation
Certified
Version
Build
Release
Report validation
Reportvalidation
ResetUATtodefault
AdminUIinstallationscripts
Lead Pull
request
Build
“Release”
Reset DB to init state
Reset DB
to init state
Notify
Proj. Leader
Bins | installer, ops guidelines,
validation lists
ComplianceVerification
Sign assemblies,
Generate dll lists
Build installer
Local dev env.
Remote CI dev. env. DTO
Customer Env
SVC
SSL
Pull Sources
HIPAA & GDPR
Project Legal Docs
White paper
EULA (End User License
Agreement)
System requirements and
functional specification
Information security
requirements
The document describing hazard / toxicity
level of the device or gadget used
Recommendations
Store system security data separate from
business data. It’s better to use external
secure authorization servers.
Recommendations
Store the audit data in a separate
database, to which no one has direct
access (except for the role of the
application level) and access to
information retrieval is carried out through
double authorization.
Recommendations
Try not to mix sensitive and insensitive
information in one repository.
Equip digital data extraction modules with
automatic authority signing and encrypt
with a separate encryption certificate.
Recommendations
Have a clear and layered hierarchy of data
access and give out no more data to each
application role that is necessary for its
efficient operation with minimal and
sufficient access to sensitive data.
Recommendations
Do not use temporary or public folders for
any places where sensitive data is stored.
Try to save data in the folder which is
authorized only by the specific user who
launched the application.
Recommendations
Don`t store your data in any temporary
folders longer than its needed. While
deleting a data, use specific tools which
provide physical deletion of data, but not
just transfering it to your the trash bin.
Recommendations
If the application works with any sensitive
data, try to ensure that the application is
launched in the context of a user, on behalf of
another system user, who does not have an
operating system profile (the user does not
allow logging into the system) and the user`s
data context is encrypted
Recommendations
If the application transmits data over the
network - use data encryption during the
data transfer, provide the authorization
modules themselves with white lists of
clients and in case of emergency, the app
will be able stop the information leak
immediately.
Summary
Identify RecoverDetect RespondsProtect
Thanks!
Yuriy Chudinov
chudinovuv.aws@gmail.com
chudinovuv.sw

More Related Content

What's hot

Find Out What's New With WhiteSource September 2018- A WhiteSource Webinar
Find Out What's New With WhiteSource September 2018- A WhiteSource WebinarFind Out What's New With WhiteSource September 2018- A WhiteSource Webinar
Find Out What's New With WhiteSource September 2018- A WhiteSource WebinarWhiteSource
 
Varhol oracle database_firewall_oct2011
Varhol oracle database_firewall_oct2011Varhol oracle database_firewall_oct2011
Varhol oracle database_firewall_oct2011Peter Varhol
 
Redox Overview deck
Redox Overview deckRedox Overview deck
Redox Overview deckRedox Engine
 
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...ObserveIT
 
Get to know primero v1.0 may2015
Get to know primero v1.0 may2015Get to know primero v1.0 may2015
Get to know primero v1.0 may2015RobertMacT
 
42396_HP Risk Report App Highlights infographic_042715_D1
42396_HP Risk Report App Highlights infographic_042715_D142396_HP Risk Report App Highlights infographic_042715_D1
42396_HP Risk Report App Highlights infographic_042715_D1D Larson
 
Evento - Fintech Districht - Pierguido Iezzi - SWASCAN
Evento - Fintech Districht - Pierguido Iezzi - SWASCANEvento - Fintech Districht - Pierguido Iezzi - SWASCAN
Evento - Fintech Districht - Pierguido Iezzi - SWASCANSWASCAN
 
20080208 Dia Edm Maximizing Metadata Oberhofer
20080208 Dia Edm Maximizing Metadata Oberhofer20080208 Dia Edm Maximizing Metadata Oberhofer
20080208 Dia Edm Maximizing Metadata Oberhoferoberhofer
 
Webinar on how to implement hipaa requirements in gx p regulated establishments
Webinar on how to implement hipaa requirements in gx p regulated establishmentsWebinar on how to implement hipaa requirements in gx p regulated establishments
Webinar on how to implement hipaa requirements in gx p regulated establishmentsCompliance Trainings
 
Solving Interoperability: The Redox API
Solving Interoperability: The Redox APISolving Interoperability: The Redox API
Solving Interoperability: The Redox APIRedox Engine
 
Factsheet - LifeSphere MultiVigilance - Adverse Event Processing Platform
Factsheet - LifeSphere MultiVigilance -  Adverse Event Processing PlatformFactsheet - LifeSphere MultiVigilance -  Adverse Event Processing Platform
Factsheet - LifeSphere MultiVigilance - Adverse Event Processing PlatformArisGlobal
 
SeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentSeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentUS-Ignite
 
Healthcare & MedTech - Open Source Security & Risk Analysis
Healthcare & MedTech - Open Source Security & Risk AnalysisHealthcare & MedTech - Open Source Security & Risk Analysis
Healthcare & MedTech - Open Source Security & Risk AnalysisBlack Duck by Synopsys
 
Intelligent Protocol Content Analysis - Efficient Data Extraction
Intelligent Protocol Content Analysis - Efficient Data ExtractionIntelligent Protocol Content Analysis - Efficient Data Extraction
Intelligent Protocol Content Analysis - Efficient Data ExtractionBialogics
 
Cloud security monitoring
Cloud security monitoringCloud security monitoring
Cloud security monitoringGabe Akisanmi
 
Factsheet: LifeSphere Reporting and Analytics - Drug Safety Reporting
Factsheet: LifeSphere Reporting and Analytics - Drug Safety ReportingFactsheet: LifeSphere Reporting and Analytics - Drug Safety Reporting
Factsheet: LifeSphere Reporting and Analytics - Drug Safety ReportingArisGlobal
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 
Data Protection Webinar
Data Protection WebinarData Protection Webinar
Data Protection WebinarObserveIT
 

What's hot (20)

Find Out What's New With WhiteSource September 2018- A WhiteSource Webinar
Find Out What's New With WhiteSource September 2018- A WhiteSource WebinarFind Out What's New With WhiteSource September 2018- A WhiteSource Webinar
Find Out What's New With WhiteSource September 2018- A WhiteSource Webinar
 
Proxy
ProxyProxy
Proxy
 
Varhol oracle database_firewall_oct2011
Varhol oracle database_firewall_oct2011Varhol oracle database_firewall_oct2011
Varhol oracle database_firewall_oct2011
 
Redox Overview deck
Redox Overview deckRedox Overview deck
Redox Overview deck
 
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
 
Get to know primero v1.0 may2015
Get to know primero v1.0 may2015Get to know primero v1.0 may2015
Get to know primero v1.0 may2015
 
42396_HP Risk Report App Highlights infographic_042715_D1
42396_HP Risk Report App Highlights infographic_042715_D142396_HP Risk Report App Highlights infographic_042715_D1
42396_HP Risk Report App Highlights infographic_042715_D1
 
Evento - Fintech Districht - Pierguido Iezzi - SWASCAN
Evento - Fintech Districht - Pierguido Iezzi - SWASCANEvento - Fintech Districht - Pierguido Iezzi - SWASCAN
Evento - Fintech Districht - Pierguido Iezzi - SWASCAN
 
20080208 Dia Edm Maximizing Metadata Oberhofer
20080208 Dia Edm Maximizing Metadata Oberhofer20080208 Dia Edm Maximizing Metadata Oberhofer
20080208 Dia Edm Maximizing Metadata Oberhofer
 
Webinar on how to implement hipaa requirements in gx p regulated establishments
Webinar on how to implement hipaa requirements in gx p regulated establishmentsWebinar on how to implement hipaa requirements in gx p regulated establishments
Webinar on how to implement hipaa requirements in gx p regulated establishments
 
Solving Interoperability: The Redox API
Solving Interoperability: The Redox APISolving Interoperability: The Redox API
Solving Interoperability: The Redox API
 
Factsheet - LifeSphere MultiVigilance - Adverse Event Processing Platform
Factsheet - LifeSphere MultiVigilance -  Adverse Event Processing PlatformFactsheet - LifeSphere MultiVigilance -  Adverse Event Processing Platform
Factsheet - LifeSphere MultiVigilance - Adverse Event Processing Platform
 
SeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentSeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application Containment
 
Healthcare & MedTech - Open Source Security & Risk Analysis
Healthcare & MedTech - Open Source Security & Risk AnalysisHealthcare & MedTech - Open Source Security & Risk Analysis
Healthcare & MedTech - Open Source Security & Risk Analysis
 
Intelligent Protocol Content Analysis - Efficient Data Extraction
Intelligent Protocol Content Analysis - Efficient Data ExtractionIntelligent Protocol Content Analysis - Efficient Data Extraction
Intelligent Protocol Content Analysis - Efficient Data Extraction
 
Cloud security monitoring
Cloud security monitoringCloud security monitoring
Cloud security monitoring
 
Factsheet: LifeSphere Reporting and Analytics - Drug Safety Reporting
Factsheet: LifeSphere Reporting and Analytics - Drug Safety ReportingFactsheet: LifeSphere Reporting and Analytics - Drug Safety Reporting
Factsheet: LifeSphere Reporting and Analytics - Drug Safety Reporting
 
DevOps for Database 2015 Survey Infographic
DevOps for Database 2015 Survey InfographicDevOps for Database 2015 Survey Infographic
DevOps for Database 2015 Survey Infographic
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 
Data Protection Webinar
Data Protection WebinarData Protection Webinar
Data Protection Webinar
 

Similar to Lob app-12012018

Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...Sebastien Deleersnyder
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...IJERA Editor
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePodGaret Keller
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps.com
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterAlgoSec
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfErikHof4
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Steven Meister
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Denodo
 
Impact of cloud services on software development life
Impact of cloud services on software development life Impact of cloud services on software development life
Impact of cloud services on software development life Mohamed M. Yazji
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideHCLSoftware
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerHCLSoftware
 
MTX Portland Office 365 Strategic Capabilities Sep2017
MTX Portland Office 365 Strategic Capabilities Sep2017MTX Portland Office 365 Strategic Capabilities Sep2017
MTX Portland Office 365 Strategic Capabilities Sep2017Owen Allen
 
Maturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management StrategyMaturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management StrategyPrivacera
 
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
Eu gdpr technical workflow and productionalization   neccessary w privacy ass...Eu gdpr technical workflow and productionalization   neccessary w privacy ass...
Eu gdpr technical workflow and productionalization neccessary w privacy ass...Steven Meister
 

Similar to Lob app-12012018 (20)

GDPR
GDPRGDPR
GDPR
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdf
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
 
Impact of cloud services on software development life
Impact of cloud services on software development life Impact of cloud services on software development life
Impact of cloud services on software development life
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 
MTX Portland Office 365 Strategic Capabilities Sep2017
MTX Portland Office 365 Strategic Capabilities Sep2017MTX Portland Office 365 Strategic Capabilities Sep2017
MTX Portland Office 365 Strategic Capabilities Sep2017
 
Maturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management StrategyMaturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management Strategy
 
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
Eu gdpr technical workflow and productionalization   neccessary w privacy ass...Eu gdpr technical workflow and productionalization   neccessary w privacy ass...
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
 

Recently uploaded

VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591adityaroy0215
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...Gfnyt.com
 
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMuzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in AnantapurCall Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapurgragmanisha42
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171Call Girls Service Gurgaon
 
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetTirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...Gfnyt.com
 
VIP Call Girl DLF Phase 2 Gurgaon (Noida) Just Meet Me@ 9711199012
VIP Call Girl DLF Phase 2 Gurgaon (Noida) Just Meet Me@ 9711199012VIP Call Girl DLF Phase 2 Gurgaon (Noida) Just Meet Me@ 9711199012
VIP Call Girl DLF Phase 2 Gurgaon (Noida) Just Meet Me@ 9711199012adityaroy0215
 
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Sheetaleventcompany
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Vipesco
 
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetnagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...indiancallgirl4rent
 
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhChandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhSheetaleventcompany
 
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur RajasthanJaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthanindiancallgirl4rent
 
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availableCall Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availablegragmanisha42
 
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetHubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 

Recently uploaded (20)

VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...
 
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMuzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Muzaffarpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in AnantapurCall Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
 
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetTirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
 
VIP Call Girl DLF Phase 2 Gurgaon (Noida) Just Meet Me@ 9711199012
VIP Call Girl DLF Phase 2 Gurgaon (Noida) Just Meet Me@ 9711199012VIP Call Girl DLF Phase 2 Gurgaon (Noida) Just Meet Me@ 9711199012
VIP Call Girl DLF Phase 2 Gurgaon (Noida) Just Meet Me@ 9711199012
 
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510
 
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetnagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
 
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
 
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhChandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
 
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur RajasthanJaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
 
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availableCall Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
 
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetHubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 

Lob app-12012018

  • 1. Line Of Business Application FROM DREAM TO PRODUCTION
  • 2. SOFTWARE .NET ARCHITECT LOB APP INTEGRATOR HIPAA|GPDR-COMPLIANCE CONSULTANT DATA RESEARCHER Yuriy Chudinov
  • 3. Threats types Direct crack Data loss or compromise Crack for publicity
  • 5. Agenda Introduction Few words about the general state of things Physical concept Review of basic and architecture things to be done before On compliance Statistics Review of data types & its growing manner Legal List of required documents to enable compliance Recommendation List of required documents to enable compliance
  • 6. Security Compliance More than software quality factors Information Security never depends on Software quality factors It works to get community better McCall's quality model Boehm quality model Dromey's quality model Compliance Product operation factors Correctness | Reliability | Efficiency | Integrity | Usability Product revision factors Maintainability | Flexibility | Testability Product transition factors Portability | Reusability | Interoperability.
  • 7. GDPR HIPAA|HSS NIST CSF GPDR|HIPAA|HSS|NIST CSF Successful compliance requires deep understanding of whole system and each data chain but not a particular modules or components Key to Save compliance is understanding particular regulator and people that will use it
  • 8. Software Categories There is no software that does not belong to any particular category or a specific domain Clear definition and domain category relation will make easy turn on any compliance regulator type for your software Platform and management Product manufacturing and service delivery Education and reference Home and entertainment Operations and professional Start-ups Content and communications
  • 9. Digital Chains For the successful application of a regulator, not enough understanding of the logic of interaction of individual modules - it is important to understand the whole chain of use 4g/LTEInternet iotBluetooth AWS
  • 10. Physical View SOFTWARE APP Database APP Basis Lab EDR Storage Event Log Uses Stores Data Electronic Data Record Encode|decode request(AppModel) State|Errorresults Saves HIPAA | GDPR CoDec module SOFTWARE APP Database Uses Verifies Shared Secure Lib SSO Server ACL Certificate Lists of ID LPDAP, etc AAI requests over HTTPS Optimization - HIPAA | GDPR module integration Organize - SSO module integration
  • 11. Lob application Operation distribution and data categories Each application category has own operational distribution Representation 26% (print, PDF, diagrams) Storage 32% (archivation) Extraction 8% (from archive) Local operations 34% (actual DB and functional algs) DATA LOGS SECURITY COMPLIANCE OPERATIONAL
  • 12. Lob application Data distribution Risk probability is directly related to the volume of data 3 month after system input 81% 13% 6% 5 year after system input 16% 48% 6% 30% 3 year after system input 20% 9% 30% 41% 1 year after system input 57% 19% 21% sensitive and insensitive data archive (both sensitive and insensitive) operational audit security layer data
  • 13. HIPAA & GDPR Compliance software requires compliance workflows Test DB Test DB Code modification Run Tests Code Analysis Code Commit Run Tests Code Analysis Installer Verification Deploy to UAT Manual Test on UAT HIPAA Validation Certified Version Build Release Report validation Reportvalidation ResetUATtodefault AdminUIinstallationscripts Lead Pull request Build “Release” Reset DB to init state Reset DB to init state Notify Proj. Leader Bins | installer, ops guidelines, validation lists ComplianceVerification Sign assemblies, Generate dll lists Build installer Local dev env. Remote CI dev. env. DTO Customer Env SVC SSL Pull Sources
  • 14. HIPAA & GDPR Project Legal Docs White paper EULA (End User License Agreement) System requirements and functional specification Information security requirements The document describing hazard / toxicity level of the device or gadget used
  • 15. Recommendations Store system security data separate from business data. It’s better to use external secure authorization servers.
  • 16. Recommendations Store the audit data in a separate database, to which no one has direct access (except for the role of the application level) and access to information retrieval is carried out through double authorization.
  • 17. Recommendations Try not to mix sensitive and insensitive information in one repository. Equip digital data extraction modules with automatic authority signing and encrypt with a separate encryption certificate.
  • 18. Recommendations Have a clear and layered hierarchy of data access and give out no more data to each application role that is necessary for its efficient operation with minimal and sufficient access to sensitive data.
  • 19. Recommendations Do not use temporary or public folders for any places where sensitive data is stored. Try to save data in the folder which is authorized only by the specific user who launched the application.
  • 20. Recommendations Don`t store your data in any temporary folders longer than its needed. While deleting a data, use specific tools which provide physical deletion of data, but not just transfering it to your the trash bin.
  • 21. Recommendations If the application works with any sensitive data, try to ensure that the application is launched in the context of a user, on behalf of another system user, who does not have an operating system profile (the user does not allow logging into the system) and the user`s data context is encrypted
  • 22. Recommendations If the application transmits data over the network - use data encryption during the data transfer, provide the authorization modules themselves with white lists of clients and in case of emergency, the app will be able stop the information leak immediately.