& cplSiteName &

Europe's GDPR: Don't Get Lost in Translation

Jeff Harris
7/7/2017
50%
50%

In May 2018, the General Data Protection Regulation (GDPR) will come into effect. The regulation will unify data protection for all individuals within the European Union (EU) as well as EU citizens traveling abroad. Some organizations have already begun transitioning to GDPR compliance -- many since 2016 when the rules were established -- and companies across the globe effectively have another 12 months to fulfill the requirements.

Once enacted, the GDPR will impact organizations in two major ways as it relates to security and visibility. First, any EU-based company will need to ensure that its customers' personal data (at-rest or in-motion) complies with the GDPR, not to mention make sure that no data is transported outside of the EU, except by design.

This will require advanced planning. For instance, if employees of an EU-based company are pointed to non-EU software-as-a-service (SaaS) services, the process will require visibility into the workings of the SaaS application and/or that the SaaS vendor be very transparent with its architecture. Even the terms and definitions are important to track and plan around. The term "personal data" is growing in scope, relating to any private or professional data including names, addresses, photos, email addresses, bank details, social postings, medical information, or even his or her IP address.

Here's what organizations can expect when becoming GDPR compliant and how they can effectively navigate it.

What this means for visibility
At a high level, the GDPR will have a major impact on the kind of data that can be collected and recorded, and how that data is handled and stored. As such, effective visibility architectures must safeguard and keep data within the EU while offering a comprehensive perspective. In the transition, on-premises and private cloud architectures will probably be the easiest to handle.

The public cloud, on the other hand, will require more effort. Despite its wider scope and the seeming lack of control for organizations whose data the public cloud processes, the public cloud will still need regular audits and robust visibility. Additionally, irrespective of environment, one basic precept in the GDPR is that data should always be pseudonymized, which can also limit how much can be seen.

To further complicate matters, the fact that IP addresses are considered personal data under GDPR adds a complexity to the whole process. In some ways, this turns the traditional approach to visibility upside-down. Instead of opening up the network to further analysis with increasingly powerful tools, a balance is now required in restricting the flow of confidential data. In implementing a visibility architecture, IP addresses must be therefore be protected as well.

Seeing what you need to see
The above illustrates a conundrum for many: the need for widespread visibility while also obfuscating sensitive information in private, public and hybrid environments. Fortunately, there are tools and methods that together can make the process much easier.

For instance, data masking, originally developed to secure Personally Identifiable Information (PII) data, is ideal for GDPR compliance. With data masking, administrators can set any data pattern or offset for masking -- credit card records, social security numbers and IP address -- with a simple, effective GUI. Further, a strong visibility architecture that supports geolocation of user data can help identify traffic originating in the EU. When combined, data masking and geo-location (with or without encryption) can help facilitate GDPR compliance.

Do not forget encryption either. Regardless of the efficacy of the first steps, encryption and, in turn, decryption should never be stopped. While SSL encryption protects, decryption is effective for security purposes such as identifying cyber-threats in malicious payloads that take advantage of SSL encryption's prevalence. If and when organizations do not want to have something encrypted, they can simply mask sensitive data instead of encrypting it. But they should not be seen as the same.

Beyond the EU network
Outside of the EU, things get interesting, since any organization touching data belonging to EU citizens must offer the same protection. Processes and technology that comply with the GDPR must be used as a result of the difficulty in segregating customer data so that it corresponds with individuals. This is the case across entire infrastructures. For example, a bank's ATM machine may serve both US and EU citizens.

This step can be exceptionally challenging considering the growth of hybrid cloud environments. Where an organization processes data both on-premises and in a cloud, encryption between the two domains is mandatory. Visibility can be difficult in these circumstances. But again, data masking can help. Extended into the cloud, it can ensure that those responsible for building visibility into a SaaS offering, or within a private cloud, will maintain GDPR compliance. Organizations cannot always control how others handle data, but they can control what they choose to deliver.

Ultimately, compliance will require up-front infrastructure and process planning that ends in "data protection by design and data protection by default." And everyone is implicated, from "data controllers" collecting data to "processors" that process the data on behalf of the controller. What is outlined above can get you started on the road to compliance -- have you started down the right path?

— Jeff Harris, VP Solutions Marketing, Ixia

(0)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
More Blogs from Column
Mobile edge computing (MEC) and a cloud-native core are necessary ingredients for the future 5G NFV network, argues Ian Maclean of Metaswitch.
Once pay-TV providers embrace the idea, they must take a comprehensive, company-wide approach to carry out such fundamental changes.
5G will require a fresh look at RF characteristics as operators deploy next-gen tech on very high-band frequencies.
MVPDs have an opportunity to make digital investments without upending their current business.
VoLTE, in the end, becomes a cloud and NFV story, Metaswitch's Ian Maclean argues.
Featured Video
From The Founder
The 'gleaming city on a hill,' Steve Saunders calls it. But who is going to take us from today's NFV componentry to the grand future of a self-driving network? Here's a look at the vendors hoping to make it happen.
Flash Poll
Upcoming Live Events
September 28, 2017, Denver, CO
October 18, 2017, Colorado Convention Center - Denver, CO
November 1, 2017, The Royal Garden Hotel
November 1, 2017, The Montcalm Marble Arch
November 2, 2017, 8 Northumberland Avenue, London, UK
November 2, 2017, 8 Northumberland Avenue – London
November 10, 2017, The Westin Times Square, New York, NY
November 30, 2017, The Westin Times Square
All Upcoming Live Events
Infographics
With the mobile ecosystem becoming increasingly vulnerable to security threats, AdaptiveMobile has laid out some of the key considerations for the wireless community.
Hot Topics
Could 5G Have Found Its Glass Ceiling?
Dan Jones, Mobile Editor, 9/20/2017
1 Million Pirate Set-Top Boxes Sold in the UK
Aditya Kishore, Practice Leader, Video Transformation, Telco Transformation, 9/20/2017
Comcast Shuts Down OTT Again
Mari Silbey, Senior Editor, Cable/Video, 9/19/2017
Why Amazon May Be Cable's Biggest Threat
Mari Silbey, Senior Editor, Cable/Video, 9/22/2017
Photo Highlights: Operations Transformation Forum 2017
Ray Le Maistre, International Group Editor, 9/17/2017
Animals with Phones
Live Digital Audio

Understanding the full experience of women in technology requires starting at the collegiate level (or sooner) and studying the technologies women are involved with, company cultures they're part of and personal experiences of individuals.

During this WiC radio show, we will talk with Nicole Engelbert, the director of Research & Analysis for Ovum Technology and a 23-year telecom industry veteran, about her experiences and perspectives on women in tech. Engelbert covers infrastructure, applications and industries for Ovum, but she is also involved in the research firm's higher education team and has helped colleges and universities globally leverage technology as a strategy for improving recruitment, retention and graduation performance.

She will share her unique insight into the collegiate level, where women pursuing engineering and STEM-related degrees is dwindling. Engelbert will also reveal new, original Ovum research on the topics of artificial intelligence, the Internet of Things, security and augmented reality, as well as discuss what each of those technologies might mean for women in our field. As always, we'll also leave plenty of time to answer all your questions live on the air and chat board.

Like Us on Facebook
Twitter Feed