Chapter 5 - Privacy Operational Lifecycle - Protect Flashcards
What are the 7 foundational principles of PbD
- Proactive not reactive
- Privacy as the default
- Privacy embedded into design
- Full functionality - positive sum not zero sum
- End to end security
- Visibility and transparency
- Respect for user privacy
What is data protection by design and default?
This is the GDPR standard under Article 25 and recital 78. It is similar to PbD
What does Data Protection by Design and Default mandate?
Taking into account state of the art, organisations should implement appropriate technical and organisational measures in order to implement data protection principles. This could include pseudonymisation, transparency, enabling data subject to monitor processing, etc
What are the GDPR Principles
Lawfulness, fairness and transparency
Purpose limitation
Data minimisation
Accuracy
Storage limitation
Integrity and confidentiality
Accountability
LPD ASIA
What are the aims of information security practices
To ensure information is kept with confidentiality, integrity and availability (CIA).
What are listed InfoSec risk as highlighted by Security Boulevard
- Cloud based
- Insider threads
- End point threats
- Deep fakes
- Living off the land attacks
- Ransomware
- Phishing
- Malvertising
- Social media attacks
- IoT
What are the categories of InfoSec controls
- Preventative
- Detective
- Corrective
And
- Physical
- Administrative
- Technical
What are the key InfoSec control measures
- Policies
- Org structure
- Asset management
- Access control
- Cryptography
- Physical security and controls
- Operational security
- Systems acquisition and maintenance
- Communications security
- Supplier relationships
- Compliance program
What are 3 key differences between data privacy and Information Security?
- Infosec concerned about confidential information mostly, whereas data privacy concerned with PII even if public (ie phone booth)
- Data privacy with wider set of responsibilities outside of just security
- At times infosec tools can become overly invasive and limit privacy
What are the basic principles for RBAC
- Segregation of duties
- Least privilege
- Need to know access
What are the principles behind user access management
- Unique ids (no group emails)
- Credentials for ID (ie 2FA)
- Access tied to role
- Formal process for granting and removing
- Password management
- User account review
- User responsibility
- Good security practice
- Clean desk policy
What 4 areas do technical controls to implement privacy measures fall into
- Obfuscation
- Minimisation
- Security
- PETs