We are talking about Article 32 of GDPR: https://gdpr-info.eu/art-32-gdpr/
It basically says that you should have some measures in place in order to protect customer data by reducing the risk of a customer data to be lost or stolen(through a data breach, through classical theft, losing drives, making information public unintentionally an so on).
Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate:
- the pseudonymisation and encryption of personal data;
- the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
- the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident;
- a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.
In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed.
The requirements of Article 32 are relatively vague, but they can be implemented using one of the frameworks below:
ISO 27001 : http://www.iso27001security.com
NIST Cybersecurity Framework : https://www.nist.gov/cyberframework
CMMI : https://cmmiinstitute.com/products/cybermaturity/cmmi-framework
The most commonly used is ISO 27001 because it provides an excellent starting point for organisations looking to implement the technical and organizational measures
necessary to reduce the risk of a data breach:
- It is outlining best practice for implementing an information security management system (ISMS),
- it allows organizations to take a risk-based approach to data protection mandated by the Regulation.
- it is internationally recognized
© Copyright 2019 Sorin Mustaca, All rights Reserved. Written For: Sorin Mustaca on Cybersecurity
Check www.endpoint-cybersecurity.com for seeing the consulting services we offer.
Visit www.itsecuritynews.info for latest security news in English
Besuchen Sie de.itsecuritynews.info für IT Sicherheits News auf Deutsch