SlideShare une entreprise Scribd logo
1  sur  31
GDPR and ISO 27001
Compliance
Assentian
• A London based Cyber Security Practice
• Certified Information Security Auditors
• Certified ISO 27001 Implementors
• Members of the UK Cyber Security Forum
• Dr Ilesh Dattani – Member of the International Standards
Committees on
– Governance and Resilience (information security and business
continuity)
– Big Data – storage, access, use and sharing in a legal and
complaint way.
• Mr Jonathan Gay – CISA (Certified Information Security Auditor)
The changing face of Data Privacy and Information
Security
Traditional View
The domain of a System Administrator
Task of Purchasing a Firewall
Implementing Security Controls was not a compulsion
Modern View
The Domain of the Business Owner
Task of Finding out what is AT RISK and finding right solutions for the same
Business and Security can’t be separated
Security Team Consists of Top Management, IT Managers and a Dedicated
Information Security Manager/DPO
Plan, Do, Check and Act Model
Integration of Quality Systems Like ISO, CMMI etc with Information Security Models
Why is this important
More and More Dependence on Information Systems
Need for a long term and failure proof system for Securing
every form of Information Asset
Theft of Information can cause disasterous results for
companies
Projects are awarded to companies who have a sound
system to protect Information
International Laws like HIPPA and GDPR have set the
benchmark for protecting information being stolen or
tampered.
Type of Information
Information can be:
created
stored
destroyed
Used
Transmitted
Categories – Personal, Financial,
Operational, Client
Information format
Paper
Databases
Disk(ette)s
CD-ROMs
Tapes
(Design) drawings
Films
Conversations
…
Business Requirements for Information Security and
Data Protection
• Commercial requirements
• Legal requirements
• What is information security?
• Basic components
• Managing information
boundaries
• Sharing information with
partners
• Holistic approach
Components of Information Security
Confidentiality
Integrity
Ensuring that information is accessible only to
those authorised to have access.
Safeguarding the accuracy and
completeness of information
and processing methods
Availability
Ensuring that authorised
users have access to
information and associated
assets when required.
Integrity
Availability Confidentiality
In some organisations, integrity and / or
availability
may be more important than confidentiality.
Managing Information Boundaries
Intranet connections to other
business units,
Extranets to business partners,
Remote connections to staff working
off-site,
Virtual Private Networks (VPN’s),
Customer networks,
Supplier chains,
Service Level Agreements,
contracts, outsourcing arrangements,
Third Party access.
Sharing Information
Types of information covered by an information security
management system
Internal - information that you would not want your
competitors to know.
Customer / client / supplier - information that they would
not wish you to divulge.
Information that needs to be shared with other trading
partners.
(This may be one of the above, but may also be specific
information that would not otherwise exist in this
particular form)
It’s a International Standard for Information Security
Management
It consists of various Specification for information Security
Management
Code of Practice for Information Security Management
Basis for contractual relationship
Basis for third party certification
Can be Certified by Certification Bodies
Applicable to all industry Sectors
Emphasis on prevention
Five Mandatory requirements of the
standard
Section 4 – General and Documentation
requirement
- General requirements
- Establishing and maintaining an ISMS
- Documentation Requirements
“The Organization shall develop, implement,
maintain and continually improve a
documented ISMS within the context of the
organisations overall business activities and
risk. For the purposes of this standard the
process used is based on PDCA model…”
Interested
parties
Establish the
ISMS
Plan
Implement and
operate the ISMS
Do
Maintain and
improve the ISMS
Act
Monitor and
review the ISMS
Check
Interested
parties
Section 5 - Management Responsibility
Management Commitment
Resource Management
Section 6 – Internal ISMS Audits
Section 7 - Management Review of the ISMS
Review Input
Review Output
Section 8 - ISMS Improvement
Continual Improvement
Corrective Action
Preventive Action
Important Areas of Concern
ISO27001
Security policy (5)
Organization of information security (6)
Asset management(7)
Human resources security (8)
Physical and environmental security (9)
Communications and operations management (10)
Access control (11)
Information systems acquisition, development and
maintenance (12)
Information security incident management (13)
Business continuity (14) management
Compliance (15)
Asset Management - Data
Objective:
Responsibility for assets
Information classification
Covers:
Inventory of assets
Ownership of assets
Acceptable use of assets
Classification guidelines
Information labelling and handling
Third-Party Relationships
• As part of GDPR an organisation is required
to manage compliance of any suppliers that
it uses – what does that mean ?
– You must audit the supplier to make sure they
meet the requirements within the context of the
service they are providing
– If you are providing a service to a client and part
of that is then sub-contracted – you carry the
laibility and risk of non-compliance on the part of
the sub-contractor
Information Asset Classification
SrSr Asset CategoryAsset Category ClassificationClassification
1 Paper Assets Client Confidential
2 Electronic Data Company Confidential
3 Hardware Commercial in Confidence
4 Software Restricted
5 People Critical & Non Critical
Compliance
Objective
Compliance with legal requirements
Compliance with security policies and standards, and technical compliance
Information Systems audit considerations
Covers:
Identification of applicable legislation
Intellectual property rights (IPR)
Protection of organizational records
Data protection and privacy of personal information
Prevention of misuse of information processing facilities
Regulation of cryptographic controls
Compliance with security policies and standards
Technical compliance checking
Information systems audit controls
Protection of information system audit tools
ISO27001 and GDPR
ISO 27001 and GDPR
How does ISO 27001 Help
• ISO 27001 is a framework for information protection.
• According to GDPR, personal data is critical information
that all organizations need to protect.
• Extra to GDPR - supporting the rights of personal data
subjects: the right to be informed, the right to have their
data deleted, and data portability.
• But, if the implementation of ISO 27001 identifies
personal data as an information security asset, most of
the EU GDPR requirements will be covered.
ISO27001 and GDPR
• Risk Assessment – Because of the high fines defined in EU GDPR and the major financial impact
on organizations, it is only natural that the risk found during risk assessment regarding personal
data is too high not to be dealt with. On the other side, one of the new requirements of the EU
GDPR is the implementation of Data Protection Impact Assessments, where companies will have
to first analyze the risks to their privacy, the same as is required by ISO 27001. Of course, while
implementing ISO 27001, personal data must be classified as high criticality, but according to the
control A.8.2.1 (Classification of information): “Information should be classified in terms of legal
requirements, value, criticality and sensitivity to unauthorized disclosure or modification.”
ISO 27001 and GDPR
• Compliance – By implementing ISO 27001, because of control A.18.1.1
(Identification of applicable legislation and contractual requirements), it is
mandatory to have a list of relevant legislative, statutory, regulatory, and
contractual requirements. If the organization needs to be compliant with EU GDPR
(see section above), this regulation will have to be part of this list. In any case,
even if the organization is not covered by the EU GDPR, control A.18.1.4 (Privacy
and protection of personally identifiable information) of ISO 27001 guides
organizations through the implementation of a data policy and protection of
personally identifiable Information.
ISO 27001 and GDPR
• Breach notification – Companies will have to notify data authorities within 72 hours after a breach of
personal data has been discovered. The implementation of ISO 27001 control A.16.1 (Management
of information security incidents and improvements) will ensure “a consistent and effective approach
to the management of information security incidents, including communication on security events.”
According to EU GDPR, data subjects (“The Data Subject is a living individual to whom personal data
relates.”) will also have to be notified, but only if the data poses a “high risk to data subject’s rights
and freedom.” The implementation of incident management, which results in detection and reporting
of personal data incidents, will bring an improvement to the organization wishing to conform to GDPR.
ISO 27001 and GDPR
• Asset Management – ISO 27001 control
A.8 (Asset Management) leads to
inclusion of personal data as information
security assets and allows organizations
to understand what personal data is
involved and where to store it, how long,
what is its origin, and who has access,
which are all requirements of EU GDPR.
ISO 27001 and GDPR
• Privacy by Design – The adoption of
Privacy by Design, another EU GDPR
requirement, becomes mandatory in the
development of products and systems.
ISO 27001 control A.14 (System
acquisitions, development and
maintenance) ensures that “information
security is an integral part of information
systems across the entire lifecycle.”
ISO 27001 and GDPR
• Supplier Relationships – ISO 27001 control
A.15.1 (Information security in supplier
relationships) requires the “protection of the
organization’s assets that are accessible by
suppliers.” According to GDPR, the
organization delegates suppliers’ processing
and storage of personal data; it shall require
compliance with the requirements of the
regulation through formal agreements.
ISO 27001 and GDPR
• conduct an EU GDPR GAP Analysis to
determine what remains to be done to
meet the EU GDPR requirements, and
then these requirements can be easily
added through the Information Security
Management System that is already set by
ISO 27001.
ISO 27001 and GDPR
• From the ISO 27000 family, ISO/IEC 27018
should also be consulted (Code of practice for
protection of personally identifiable information
(PII) in public clouds acting as PII processors) if
the organization stores/processes personal
data in the cloud. See the article ISO 27001 vs.
ISO 27018 – Standard for protecting privacy in
the cloud to learn more.
Compliance Service Offers
• ISO 27001 Management – Oversee Compliance Process
– Implementation and Certification
• Full ISO 27001 Compliance Service
• ISO 27001 Audit
• GDPR Gap Analysis
• ISO 27001 Default Procedures and Processes –
Advisory Services in implementation
• ISO 27001 and GDPR Training and Awareness

Contenu connexe

Tendances

Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threatsisc2dfw
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001Imran Ahmed
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewNaresh Rao
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Asia Pte Ltd
 

Tendances (20)

Privacy by Design: legal perspective
Privacy by Design: legal perspectivePrivacy by Design: legal perspective
Privacy by Design: legal perspective
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR RACI.pdf
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
Data protection
Data protectionData protection
Data protection
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service
 

Similaire à GDPR and ISO 27001 Compliance

CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRIryna Chekanava
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectJohn Macasio
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information ProtectionPECB
 
Data Protection and Data Privacy
Data Protection and Data PrivacyData Protection and Data Privacy
Data Protection and Data PrivacyIT Governance Ltd
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCapgemini
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
 
GDPR & IBM i Security
GDPR & IBM i SecurityGDPR & IBM i Security
GDPR & IBM i SecurityPrecisely
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standardsautomatskicorporation
 
GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?Patrick Soenen
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRPrecisely
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...IT Governance Ltd
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR ComplianceGabor Farkas
 

Similaire à GDPR and ISO 27001 Compliance (20)

CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
Data Protection and Data Privacy
Data Protection and Data PrivacyData Protection and Data Privacy
Data Protection and Data Privacy
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
GDPR & IBM i Security
GDPR & IBM i SecurityGDPR & IBM i Security
GDPR & IBM i Security
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPR
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 

Dernier

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Dernier (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

GDPR and ISO 27001 Compliance

  • 1. GDPR and ISO 27001 Compliance
  • 2. Assentian • A London based Cyber Security Practice • Certified Information Security Auditors • Certified ISO 27001 Implementors • Members of the UK Cyber Security Forum • Dr Ilesh Dattani – Member of the International Standards Committees on – Governance and Resilience (information security and business continuity) – Big Data – storage, access, use and sharing in a legal and complaint way. • Mr Jonathan Gay – CISA (Certified Information Security Auditor)
  • 3. The changing face of Data Privacy and Information Security Traditional View The domain of a System Administrator Task of Purchasing a Firewall Implementing Security Controls was not a compulsion Modern View The Domain of the Business Owner Task of Finding out what is AT RISK and finding right solutions for the same Business and Security can’t be separated Security Team Consists of Top Management, IT Managers and a Dedicated Information Security Manager/DPO Plan, Do, Check and Act Model Integration of Quality Systems Like ISO, CMMI etc with Information Security Models
  • 4. Why is this important More and More Dependence on Information Systems Need for a long term and failure proof system for Securing every form of Information Asset Theft of Information can cause disasterous results for companies Projects are awarded to companies who have a sound system to protect Information International Laws like HIPPA and GDPR have set the benchmark for protecting information being stolen or tampered.
  • 5. Type of Information Information can be: created stored destroyed Used Transmitted Categories – Personal, Financial, Operational, Client Information format Paper Databases Disk(ette)s CD-ROMs Tapes (Design) drawings Films Conversations …
  • 6. Business Requirements for Information Security and Data Protection • Commercial requirements • Legal requirements • What is information security? • Basic components • Managing information boundaries • Sharing information with partners • Holistic approach
  • 7. Components of Information Security Confidentiality Integrity Ensuring that information is accessible only to those authorised to have access. Safeguarding the accuracy and completeness of information and processing methods Availability Ensuring that authorised users have access to information and associated assets when required.
  • 8. Integrity Availability Confidentiality In some organisations, integrity and / or availability may be more important than confidentiality.
  • 9. Managing Information Boundaries Intranet connections to other business units, Extranets to business partners, Remote connections to staff working off-site, Virtual Private Networks (VPN’s), Customer networks, Supplier chains, Service Level Agreements, contracts, outsourcing arrangements, Third Party access.
  • 10. Sharing Information Types of information covered by an information security management system Internal - information that you would not want your competitors to know. Customer / client / supplier - information that they would not wish you to divulge. Information that needs to be shared with other trading partners. (This may be one of the above, but may also be specific information that would not otherwise exist in this particular form)
  • 11. It’s a International Standard for Information Security Management It consists of various Specification for information Security Management Code of Practice for Information Security Management Basis for contractual relationship Basis for third party certification Can be Certified by Certification Bodies Applicable to all industry Sectors Emphasis on prevention
  • 12. Five Mandatory requirements of the standard Section 4 – General and Documentation requirement - General requirements - Establishing and maintaining an ISMS - Documentation Requirements “The Organization shall develop, implement, maintain and continually improve a documented ISMS within the context of the organisations overall business activities and risk. For the purposes of this standard the process used is based on PDCA model…”
  • 13. Interested parties Establish the ISMS Plan Implement and operate the ISMS Do Maintain and improve the ISMS Act Monitor and review the ISMS Check Interested parties
  • 14. Section 5 - Management Responsibility Management Commitment Resource Management Section 6 – Internal ISMS Audits Section 7 - Management Review of the ISMS Review Input Review Output Section 8 - ISMS Improvement Continual Improvement Corrective Action Preventive Action
  • 15. Important Areas of Concern ISO27001 Security policy (5) Organization of information security (6) Asset management(7) Human resources security (8) Physical and environmental security (9) Communications and operations management (10) Access control (11) Information systems acquisition, development and maintenance (12) Information security incident management (13) Business continuity (14) management Compliance (15)
  • 16. Asset Management - Data Objective: Responsibility for assets Information classification Covers: Inventory of assets Ownership of assets Acceptable use of assets Classification guidelines Information labelling and handling
  • 17. Third-Party Relationships • As part of GDPR an organisation is required to manage compliance of any suppliers that it uses – what does that mean ? – You must audit the supplier to make sure they meet the requirements within the context of the service they are providing – If you are providing a service to a client and part of that is then sub-contracted – you carry the laibility and risk of non-compliance on the part of the sub-contractor
  • 18. Information Asset Classification SrSr Asset CategoryAsset Category ClassificationClassification 1 Paper Assets Client Confidential 2 Electronic Data Company Confidential 3 Hardware Commercial in Confidence 4 Software Restricted 5 People Critical & Non Critical
  • 19. Compliance Objective Compliance with legal requirements Compliance with security policies and standards, and technical compliance Information Systems audit considerations Covers: Identification of applicable legislation Intellectual property rights (IPR) Protection of organizational records Data protection and privacy of personal information Prevention of misuse of information processing facilities Regulation of cryptographic controls Compliance with security policies and standards Technical compliance checking Information systems audit controls Protection of information system audit tools
  • 22. How does ISO 27001 Help • ISO 27001 is a framework for information protection. • According to GDPR, personal data is critical information that all organizations need to protect. • Extra to GDPR - supporting the rights of personal data subjects: the right to be informed, the right to have their data deleted, and data portability. • But, if the implementation of ISO 27001 identifies personal data as an information security asset, most of the EU GDPR requirements will be covered.
  • 23. ISO27001 and GDPR • Risk Assessment – Because of the high fines defined in EU GDPR and the major financial impact on organizations, it is only natural that the risk found during risk assessment regarding personal data is too high not to be dealt with. On the other side, one of the new requirements of the EU GDPR is the implementation of Data Protection Impact Assessments, where companies will have to first analyze the risks to their privacy, the same as is required by ISO 27001. Of course, while implementing ISO 27001, personal data must be classified as high criticality, but according to the control A.8.2.1 (Classification of information): “Information should be classified in terms of legal requirements, value, criticality and sensitivity to unauthorized disclosure or modification.”
  • 24. ISO 27001 and GDPR • Compliance – By implementing ISO 27001, because of control A.18.1.1 (Identification of applicable legislation and contractual requirements), it is mandatory to have a list of relevant legislative, statutory, regulatory, and contractual requirements. If the organization needs to be compliant with EU GDPR (see section above), this regulation will have to be part of this list. In any case, even if the organization is not covered by the EU GDPR, control A.18.1.4 (Privacy and protection of personally identifiable information) of ISO 27001 guides organizations through the implementation of a data policy and protection of personally identifiable Information.
  • 25. ISO 27001 and GDPR • Breach notification – Companies will have to notify data authorities within 72 hours after a breach of personal data has been discovered. The implementation of ISO 27001 control A.16.1 (Management of information security incidents and improvements) will ensure “a consistent and effective approach to the management of information security incidents, including communication on security events.” According to EU GDPR, data subjects (“The Data Subject is a living individual to whom personal data relates.”) will also have to be notified, but only if the data poses a “high risk to data subject’s rights and freedom.” The implementation of incident management, which results in detection and reporting of personal data incidents, will bring an improvement to the organization wishing to conform to GDPR.
  • 26. ISO 27001 and GDPR • Asset Management – ISO 27001 control A.8 (Asset Management) leads to inclusion of personal data as information security assets and allows organizations to understand what personal data is involved and where to store it, how long, what is its origin, and who has access, which are all requirements of EU GDPR.
  • 27. ISO 27001 and GDPR • Privacy by Design – The adoption of Privacy by Design, another EU GDPR requirement, becomes mandatory in the development of products and systems. ISO 27001 control A.14 (System acquisitions, development and maintenance) ensures that “information security is an integral part of information systems across the entire lifecycle.”
  • 28. ISO 27001 and GDPR • Supplier Relationships – ISO 27001 control A.15.1 (Information security in supplier relationships) requires the “protection of the organization’s assets that are accessible by suppliers.” According to GDPR, the organization delegates suppliers’ processing and storage of personal data; it shall require compliance with the requirements of the regulation through formal agreements.
  • 29. ISO 27001 and GDPR • conduct an EU GDPR GAP Analysis to determine what remains to be done to meet the EU GDPR requirements, and then these requirements can be easily added through the Information Security Management System that is already set by ISO 27001.
  • 30. ISO 27001 and GDPR • From the ISO 27000 family, ISO/IEC 27018 should also be consulted (Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors) if the organization stores/processes personal data in the cloud. See the article ISO 27001 vs. ISO 27018 – Standard for protecting privacy in the cloud to learn more.
  • 31. Compliance Service Offers • ISO 27001 Management – Oversee Compliance Process – Implementation and Certification • Full ISO 27001 Compliance Service • ISO 27001 Audit • GDPR Gap Analysis • ISO 27001 Default Procedures and Processes – Advisory Services in implementation • ISO 27001 and GDPR Training and Awareness