Download presentation
Presentation is loading. Please wait.
Published byPhebe Lawson Modified over 8 years ago
1
Technical and organisational measures for protecting data and ensuring data security Simon Rice Group Manager (Technology) 29 May 2014
2
Overview Guidance –ICO guidance –International guidance What are the risks? Where are the threats? What can be done?
3
ICO guidance http://ico.org.uk/for_organisations/guidance_index
4
Cloud guidance Published 27 September 2012 Guidance for data controllers Outlines a number of key risks http://ico.org.uk/cloud
5
BYOD guidance Published 7 March 2013 Guidance for data controllers Outlines a number of key risks http://ico.org.uk/byod
6
App guidance Published 19 December 2013 Guidance for app developers Outlines a number of key risks http://ico.org.uk/for_organisations/data_protection/topic_guid es/online/mobile_apps
7
IT Security Published 12 May 2014 Highlights 8 common failures in IT security http://ico.org.uk/news/latest_news/2014/~/media/documents /library/Data_Protection/Research_and_reports/protecting- personal-data-in-online-services-learning-from-the-mistakes- of-others.pdf
8
International guidance
11
ENISA cloud computing risk assessment
12
What and where is the cloud?
13
So what do we have now?
14
And how does the cloud differ?
15
What does it look like?
17
http://www.google.com/about/datacenters/inside/streetview/
18
A video tour
19
What does the user see?
20
Where is the cloud?
21
What does the user see?
22
Remember, not all clouds are the same!
23
What are the DP/security issues? Who can see the data? Where is the data? Is this really a new problem?
24
Who can see the data? Insiders Authorised Unauthorised Outsiders Authorised Unauthorised
25
Who can see the data? Security –Physical security –Encryption in transit (to and within the cloud provider) at rest –Passwords & remote access Provider access Data disclosure
26
Where is my personal data? Multiple copies in multiple locations –Where are the data centres? –Redundant copies –Back-ups Shared resources –Deletion –Retention Layered services –Is your SaaS provider using a different IaaS provider? Overseas Transfers (Principle 8)
27
Other risks Loss of governance (who has access?) Lock-in (can you transfer to somewhere else?) Isolation failure (eggs in one basket?) Data segregation (who’s data is next to yours?) Regulatory compliance (are you allowed to do it?) Data location (where is your data?) Data recovery (can you get it back?) Staff training (do they know what to do?)
28
More risks… Written contract Monitor performance Access control Connectivity Reliability and resilience Scalability (restricted by contract?)
29
How is the data accessed?
30
What is an ‘own device’?
31
Risks with mobile devices Loss or theft of the device Loss or theft of the data Loss or theft of the access credentials Interception of the data transfer Onward transfer of the data Inappropriate use of the device or data End of life disposal Applicable in BYOD and corporate owned devices
32
Where does data reside? Depends on what types of device do you have? –On the device Internal or external? –Organisation's network Local caching? –Cloud Private Community Public
33
How is the data transferred? How do you transfer data to devices? –3G, Wi-Fi, Wired connection –HTTP, HTTPS, VPN, other encryption –MAC address filtering –IM, Skype, BBM, Facebook, LinkedIn –Cloud, file transfer or email attachment –Direct connection or via proxy –USB or CD
34
How do you control the device How can you control the data on the device? –Who owns the device? –What OS is it running? –Who else has access to it? –What else is it used for? –What if it gets lost? –Onward transfer of data or device?
35
Learning from ICO casework
36
8 common failings 1.Failure to keep software security up to date 2.SQL injection 3.Running unnecessary services 4.Poor decommissioning 5.Insecure storage of passwords 6.Failure to encrypt online communications 7.Processing data in inappropriate areas 8.Default credentials including passwords
37
Software updates
38
SQL injection
39
Unnecessary services
40
Decommissioning
41
Password storage
42
Configuration of SSL / TLS
43
Security architecture
44
Accessible locations
45
Default credentials
46
How will you protect against these?
47
Or these?
48
www.twitter.com/iconews Keep in touch Subscribe to our e-newsletter at www.ico.org.uk or find us on…
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.