0% found this document useful (0 votes)
135 views19 pages

GDPR's Requirements With: How IT Security Solutions Can Help Meet The

The document discusses how IT security solutions from ManageEngine can help organizations meet the requirements of the GDPR. It outlines the key requirements around data security from the GDPR, including principles for processing personal data, responsibilities of controllers, data protection by design, security of processing, and notification of data breaches. It then maps ManageEngine's solutions such as Log360 and DataSecurity Plus to these requirements and how they can help with auditing, monitoring, and ensuring the security of personal data.

Uploaded by

Dragos Coman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
135 views19 pages

GDPR's Requirements With: How IT Security Solutions Can Help Meet The

The document discusses how IT security solutions from ManageEngine can help organizations meet the requirements of the GDPR. It outlines the key requirements around data security from the GDPR, including principles for processing personal data, responsibilities of controllers, data protection by design, security of processing, and notification of data breaches. It then maps ManageEngine's solutions such as Log360 and DataSecurity Plus to these requirements and how they can help with auditing, monitoring, and ensuring the security of personal data.

Uploaded by

Dragos Coman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

How IT security solutions

can help meet the

GDPR's
Requirements
with Ease
- A solution book for IT security admins

www.manageengine.com
Table of Contents

The GDPR and its role in resolving security issues ......................................................................................................... 2

In this solution book ............................................................................................................................................................. 2

Meeting the GDPR's requirements with ManageEngine's solutions ............................................................................. 3

The requirements and feature mapping ............................................................................................................................ 6

Article 5 - Principles relating to the processing of personal data ................................................................................. 6

Article 24 - Responsibility of the controller ....................................................................................................................... 9

Article 25 - Data protection by design and by default ................................................................................................... 10

Article 32 - Security of processing .................................................................................................................................... 11

Article 33 - Notification of data breach ............................................................................................................................ 16

About our GDPR-ready solutions ....................................................................................................................................... 18

About ManageEngine .......................................................................................................................................................... 18

1
itsecurity-solutions@manageengine.com
The GDPR and its role in resolving security issues

With the advent of more sophisticated data breaches targeting enterprises, a stringent regulatory mandate was inevitable. The EU's General

Data Protection Regulation (GDPR) serves this purpose rightfully. The GDPR aims to unify and standardize personal data collection and

processing methods across the EU. The GDPR extends its territorial scope. This regulation is applicable to all the enterprises that collect and

process EU citizen’s personal data, irrespective of its location. Organizations are liable to comply with the GDPR before May 25, 2018, even if

the data processing is happening outside the Union.

What makes the GDPR special?

Apart from the hefty compliance violation penalties, the GDPR' rules on data collection and processing make it one of the most stringent

regulatory mandates. With the advent of zero-day attacks, advanced persistent threats (APT), and other sophisticated attacks, the GDPR

insists that organizations that handle personal data adopt proper technical measures and risk assessment techniques to protect their data.

However, the EU's regulatory bodies have also realized that protecting data from breaches is not always possible. Despite adopting and

deploying proper security measures, there's still a high chance of security attacks happening in network premises. Therefore organizations

must be instructed on what to do and what not to do in the event of a data breach.

In this solution book

This solution book elaborates on the GDPR's requirements concerning the security measures that organizations should adopt while handling

personal data. It also illustrates how solutions from ManageEngine can help organizations fulfill these requirements with ease.

2
itsecurity-solutions@manageengine.com
Meeting the GDPR's requirements with ManageEngine's solutions

Log360 and DataSecurity Plus, two IT security solutions from ManageEngine, help organizations seamlessly meet the requirements

that are concerned with keeping personal data safe and auditing data processing methods

Log360 is a comprehensive SIEM solution that collects, processes, and analyzes log data from sources across a network. It audits

critical changes to Active Directory in real time and notifies administrators instantly about anomalous security incidents, data breach

attempts, or security attacks. Log360 is an integration of two of ManageEngine's powerful auditing tools, EventLog Analyzer and

ADAudit Plus. While EventLog Analyzer resolves any log management woes and helps detect and fight external security attacks,

ADAudit Plus audits Active Directory extensively to monitor user activities and thereby prevent internal threats.

DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and Windows file server 

auditing, alerting, and reporting features. Locate, analyze, and secure sensitive personal data in your files, folders, and shares from 

various insider and external threats. Gain visibility into data usage trends, file access patterns, volume of personal data in files, file 

permission changes, and more. DataSecurity Plus helps you meet multiple compliance regulations and generate clear, concise audit

records as legal evidence.

Apart from these solutions, ManageEngine also has the below solutions that can help enterprises meet the auditing and monitoring

requirements specific to the technology and platforms they use.

3
itsecurity-solutions@manageengine.com
ADManager Plus, a web-based Active Directory management and reporting solution that helps checking the permissions assigned to

users to access the personal data

Exchange Reporter Plus, a comprehensive Exchange server reporting, auditing, and management solution that helps to keep an eye

on the personal data transmission over emails.

O365 Manager Plus, an extensive Office 365 auditing and reporting tool that helps ensuring all activities happening in the Office 365

are in accordance with the requirements of the regulation.

Sneak peek!

ManageEngine's tools help organizations comply with multiple GDPR articles, including:

Chapter 2

- Article 5 - 1(b), 1(d), and 1(f), and 2

Chapter 4

- Article 24 - 1

- Article 25 - 2

- Article 32 - 1(b), 1(d), 2, and 4

- Article 33 - 1, 2, and 3(a)

4
itsecurity-solutions@manageengine.com
Adopting technical measures for the GDPR compliance

The GDPR insists enterprises take "technical measures to ensure data safety." Why is the GDPR's wording is generic here? Because enterprises
don't all have the same network architecture.

Depending on the business, every organization's network is unique. Some may be a Windows shop using Microsoft Active Directory to manage
their computer resources and user accounts, while others may be non-Windows shops as well. Some enterprises may use Exchange servers to
manage their mailboxes, whereas others might host them in the cloud.

Organizational networks can never be generalized. That's why the GDPR states that irrespective of the technology they adopt or systems they
use, enterprises should adopt proper technical measures to ensure personal data safety. Which leaves one option for every enterprise:
monitoring and auditing the systems and processes that store or interact with personal data. But don't worry! We've got you covered.

ManageEngine has a number of solutions that can help organizations meet the auditing and monitoring requirements specific to the technology
and platforms they use.

ADManager Plus, a comprehensive reporting and management tool for Active Directory, helps audit and manage the permissions given

to users to access personal data.

If you use Office 365, then O365 Manager Plus, our extensive Office 365 monitoring and auditing tool, can help you monitor the flow of

personal data to keep it secure.

Are you using Exchange servers to host your emails? Do you want to keep an eye on email transactions and ensure that personal data

is not transferred over email? Exchange Reporter Plus, a complete analysis and reporting solution for Exchange, can help you with that.

5
itsecurity-solutions@manageengine.com
The requirements and feature mapping

This section elaborates on the GDPR's data security requirements, the steps organizations need to take to meet those requirements, and how

ManageEngine's solutions can help.

Article 5 - Principles relating to the processing of personal data

Requirement How to comply How ManageEngine can help

1 (b) "Personal data shall be: In most enterprises, personal data In the case of personal data stored in databases,
Collected for specified, explicit and is collected and stored in a Log360 help enterprises monitor critical changes with
legitimate purposes and not further database or a file server. To ensure its real-time alerting console. With prepackaged alert
processed in a manner that is that the data is being processed profiles, Log360 can generate instant email or SMS
incompatible with those purposes; only for the purpose it had been notifications whenever there's anomalous activity.
further processing for archiving collected for, it is necessary to
purposes in the public interest, monitor accesses to these systems Further, Log360 also has bundled reports that provide
scientific or historical research and to the personal data itself. information on changes to the database table, including:
purposes or statistical purposes Enterprises should watch out for
shall, in accordance with Article anomalous personal data access, . Selection
89(1), not be considered to be modification, and deletion, which . Creation
incompatible with the initial could result in the data being . Alteration
purposes (‘purpose limitation’)..." processed in a way that was not
. Deletion
originally intended.

If the data is stored in any Windows file servers,


Notifications should be sent to
DataSecurity Plus provides access audit reports on:
concerned authorities for such
anomalous activities.

6
itsecurity-solutions@manageengine.com
Content and location changes (created, modi- fied,
overwritten, moved, restored, renamed, and deleted
files/folders).

Security permission changes (changes to file/folder


permissions, owner, and SACL).

Failed access attempts (file/folder read, write, or


delete).

DataSecurity Plus' reports help detect unsanctioned


data processing.

1 (d) "Personal data shall be Enterprises should gather insights DataSecurity Plus provides information on old files with
accurate and, where necessary, on their data storage. That includes its File Analysis and Storage Analysis reports
kept up to date; every reasonable implementing proper systems that that ensure data accuracy as well as help with the
step must be taken to ensure that provide information on how long erasure process stated in requirement 1 (d).
personal data that are inaccurate, data has been stored so it can be
Further, Log360 helps monitor the “accuracy” of the
having regard to the purposes for deleted as soon as the threshold
personal data stored in databases and alert
which they are processed, are time period for storage is reached.
administrators in real time if the data is tampered with.
erased or rectified without delay
(‘accuracy’)..." DataSecurity Plus’ reports, mentioned above, and
Log360’s database auditing capability help ensure the
accuracy of personal data and watch out for any
unauthorized modifications to personal data stored in
file servers (including EMC servers and NetApp filers)
and databases (including Oracle and MS SQL).

7
itsecurity-solutions@manageengine.com
1 (f) "Personal data shall be Deploy solutions that warn data Log360 helps confirm the integrity and confidentiality of
processed in a manner that protection officers or security collected and stored personal data. With prede fined
ensures appropriate security of the administratorswhenever the alert profiles, Log360 sends out real-time alert
personal data, including protection integrity of personal data is notifications whenever the file, folder, or database table
against unauthorised or unlawful compromised. in which the personal data is stored is:
processing and against accidental
loss, destruction or damage, using Accessed in an unau thorized way (unauthor ized login
appropriate technical or failures, permission changes, database server account
organisational measures (‘integrity creation, or database schema changes).
and confidentiality’)." Modified.
Deleted.

Further, Log360 provides detailed information on who


did the unauthorized change, when, and from where.
This helps in submitting an incident report if necessary.

Related reports in Log360:


. File access
. File modified
. File deletion
. Database table deleted
. Modified (DDL query execution)
. Unauthorized login failures
. Permission changes for file or folder
. Database account creation
. Database schema change

8
itsecurity-solutions@manageengine.com
Article 24 - Responsibility of the controller

If you are a controller (a person, public authority, agency, or other body who can determine the purpose and means of processing the personal

data), then you must meet the following data processing requirements of the GDPR.

Requirement How to comply How ManageEngine can help

1. "Taking into account the nature, Ensure that you: If you're a Windows shop, then you probably use
scope, context and purposes of Provide access to personal data Active Directory to grant users permissions to resources
processing as well as the risks of only to those who are intended to and data.
varying likelihood and severity for access it.
the rights and freedoms of natural ADManager Plus can help manage and audit the
persons, the controller shall Allow only authorized users to permission granting process. The following ADManager
Plus reports provide insights on who can access
implement appropriate technical access systems or services in
personal data and also help identify any unauthorized
and organisational measures to which the personal data is
access to the personal data that might disrupt its
ensure and to be able to stored. integrity:
demonstrate that processing is
performed in accordance with this And to prove there's no unlawful or . Users in groups
regulation. Those measures shall unauthorized access or . Groups for users
be reviewed and updated where mishandling of data, controllers
. Shares in the servers
necessary." need to perform extensive and
continuous auditing.
. Permissions for folders
. Folders accessible by accounts
Monitor user activities and deploy . Servers accessible by accounts
solutions that demonstrate that . Server permissions
only users with valid permissions These reports also help review the process of
are accessing personal data.
permission granting whenever it's required.

9
itsecurity-solutions@manageengine.com
Article 25 - Data protection by design and by default

Requirement How to comply How ManageEngine can help

2 "The controller shall implement Deploy solutions to validate the Workflow in ADManager Plus helps with this.
appropriate technical and access permissions granted to ADManager Plus also has notification rules which
organisational measures for users. update the workflow agents on requests that have been
ensuring that, by default, only raised, reviewed, or approved. Basically, ADManager
personal data which are necessary Audit permission change events in Plus maps the type of action (request is created,
for each specific purpose of the order to identify illegal or reviewed, approved, or executed) to workflow agents for
processing are processed. That unauthorized permission changes notification reasons. It also allows you to communicate
obligation applies to the amount of related to personal data. request information to technicians and other
personal data collected, the extent stakeholders through email and SMS.
of their processing, the period of
their storage, and their
accessibility. In particular, such
measures shall ensure that by
default personal data are not made
accessible without the individual’s
intervention to an indefinite number
of natural persons."

10
itsecurity-solutions@manageengine.com
Article 32 - Security of processing

Requirement How to comply How ManageEngine can help

1(b) "The ability to ensure the Continuously monitor and audit the If you store personal data in databases such as MS SQL
ongoing confidentiality, integrity, storage systems that store and Oracle, Log360 can help detect any anomalies in
availability and resilience of personal data as well as the your databases to identify:
processing systems and services..." services (or applications) that - Unauthorized access attempts to the database servers
process personal data. or any server wherein the personal data is stored.
- Privileged user account changes on the system wherein
Watch out for unauthorized access confidential data is stored.
attempts and anomalies in user
activities on these systems and If you store personal data in any Windows file servers,
services. then DataSecurity Plus can help ensure the integrity of
these systems by watching out for:
- Permission changes to files and folders.
- File server storage and disk space to ensure availability.

These reports ensure that only authorized users access


the personal data. That way, they help maintain the
integrity and availability of the systems and services in
which the data is stored.

11
itsecurity-solutions@manageengine.com
1(d) "...a process for regularly To ensure the security of As a comprehensive SIEM solution, Log360 collects log
testing, assessing and evaluating processing, enterprises should data from all devices including firewalls, vulnerability
the e�ectiveness of technical and watch out for any network scanners, b u s i n e s s - c r i t i c a l applications that
organisational measures for anomalies that could turn out to be processes personal data, file servers, databases,
ensuring the security of the a potential data breach. Linux/Unix machines, IBM AS400 systems, and more. It
processing." correlates collected data and generates real-time alerts
Deploy security solutions that can: for any potential data breach events. Security
1. Audit and send out real-time administrators can then mitigate the attack or take
alerts when any changes to critical proper steps to prevent data loss.
resources such as firewalls, Active
Directory, databases, and file Log360 also provides reports and real-time alerts on:
servers are detected. - Firewall configuration changes, which could cause a
data breach.
2. Centralize and correlate security - Unauthorized access to file servers, databases, and
data from di�erent sources to other critical servers.
identify potential data breaches - Critical changes to Active Directory, including changes
instantly andavoid data loss. to attributes, GPOs, and security groups, that can result
in unauthorized access to personal data.
- Permission changes to the files/folders wherein the
personal data is stored.
- Anomalous user activities including user logon/logo�
activities during non-business hours, logon failures, and
more.

12
itsecurity-solutions@manageengine.com
2. "In assessing the appropriate Deploy solutions and audit changes If you store personal data in a Windows file server, use
level of security account shall be to personal data (e.g. modification, DataSecurity Plus to generate detailed reports and
taken in particular of the risks that deletion, renaming, or even real-time alerts on:
are presented by processing, in permission changes). - File access/change events.
particular from accidental or - Content and location changes (modified, overwritten,
unlawful destruction, loss, Keep an eye on mailboxes to detect moved, restored, renamed, and deleted files/folders).
alteration, unauthorised disclosure when personal data is transmitted - Security permission changes (changes to
of, or access to personal data via email. ile/folder permissions, owner, and SACL).
transmitted, stored or otherwise - Failed file/folder process or access attempts (file/folder
processed." read, write, or delete).

For personal data stored in a database


Enterprises using MS SQL or Oracle databases to store
personal data need to audit any changes or access to
those databases. With Log360, get exhaustive
predefined reports for database change auditing—who
did what change, when, and from where. Quickly
generate incident reports from predefined change report
templates. Get real-time alerts for any unauthorized or
unlawful activities such as:

. Database table deleted


. Database table modified (DDL query execution)
. Unauthorized login failures
. Permission changes for files or folders
. Database account creation
. Database schema changes

13
itsecurity-solutions@manageengine.com
Further, enterprises that use other file servers such as
NetApp filers, EMC cluster, and file server cluster, can
also get information on critical file and folder changes
(including changes to folder permissions) from Log360.

Log360's reports and real-time alerts help organizations


detect unauthorized access and disclosure, as well as
data loss.

Auditing data transmission via email


Enterprises using Exchange servers for mail
communication can use Exchange Reporter Plus to
detect and report on unauthorized or unlawful
transmission of personal data. Identify personal data
sent via email using the Attachment by Filename
Keyword report and the Attachment by File Extension
Keyword report.

View permission changes using the Mailbox Permission


Changes report.

Use the Mails Deleted or Moved report to identify any


breach of your data protection policies. This report
shows details such as the subject of the message.

14
itsecurity-solutions@manageengine.com
4 "The controller and processor Deploy solutions that help detect Use ADManager Plus to keep track of permission
shall take steps to ensure that any when users access personal data records. Review the permission given to users using
natural person acting under the without proper permissions. reports that provide information on:
authority of the controller or the
processor who has access to
. Users in groups
personal data does not process . Groups for users
them except on instructions from . Shares in the servers
the controller, unless he or she is . Permissions for folders
required to do so by Union or . Folders accessible by accounts
Member State law." . Servers accessible by accounts
. Server permissions

Generate alerts if any person who does not have explicit


permission attempts to access the data.

15
itsecurity-solutions@manageengine.com
Article 33 - Notification of data breach
1. "In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having

become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal

data breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the notification to the supervisory authority is not

made within 72 hours, it shall be accompanied by reasons for the delay."

2. "The processor shall notify the controller without undue delay after becoming aware of a personal data breach."

3. "Controller shall document any personal data breaches, comprising the facts relating to the personal data breach, its effects and the remedial

action taken. That documentation shall enable the supervisory authority to verify compliance with this Article."

ManageEngine's SIEM solution, Log360, can help organizations meet all the above requirements. With a built-in real-time alerting console and
correlation engine, Log360 detects any data breach in the network instantly.

With predefined alert profiles and correlation rules, Log360 can detect and contain known attack patterns such as:

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks that bring down the system or services that contain
personal data.

SQL injection attacks that can alter, expose, or delete personal data stored in SQL databases.

Ransomware attacks that can expose or transmit personal data without proper permissions.

In addition, Log360 also comes with an intuitive custom correlation rule builder and alert profile creator that can create new correlation rules
and alert profiles for detecting unknown attack patterns, keeping personal data safe.

16
itsecurity-solutions@manageengine.com
Incident report extraction with Log360

As per the requirement outlined in Article 33 #5, the controller is liable to document the data breach providing information on the impact of the
breach and the remedial action taken.

Log360 caters to this need with its powerful log search engine that helps perform forensic analysis. Log360 comes with various search
options, including boolean, range, group, and wildcard searches, that help enterprises narrow down the root cause of a breach with ease.
Forensic analysis provides information on:

When the breach occurred.

Systems that were affected by the data breach.

Data that was tampered, deleted, exposed, or transmitted.

Who was responsible for the breach.

Further, all this forensic information can be exported as reports, helping organizations construct an incident report to be submitted to the ICO
in case of a breach.

Brace yourself for the implementation of the GDPR with ManageEngine's IT security solutions Audit your network, detect breaches, and prove
that you're on track with the regulation's requirements. For more information on deploying any of the solutions mentioned in this guide, please
feel free to write to us at itsecurity-solutions@manageengine.com

17
itsecurity-solutions@manageengine.com
ManageEngine's IT Security Solutions for GDPR Compliance

Log360 DataSecurity Plus ADManager Plus


An integrated SIEM solution that DataSecurity Plus is a data visibility and A simple yet efficient solution to manage
combines ADAudit Plus and  security solution that offers data and report on your Windows Active
EventLog Analyzer, our  two most discovery, file storage analysis, and  Directory environment. Ensure that only
powerful auditing tools, to resolve real-time Windows file server auditing, specific users get access to personal
all log management and network alerting, and reporting.  It also helps  data with this solution's carefully
security challenges. Thwart internal meet multiple compliance requirements structured workflow and automation
security attacks, defend your and generates instant, user-defined capabilities. Manage and track the
network from external attacks, email alerts while carrying out automatic permissions granted to and revoked 
protect confidential information, and predefined responses when potential from users and ensure that the personal
meet the demanding growth of security threats occur.  data is securely processed.
compliance.
Get 30-day free trial Know more Get 30-day free trial Know more
Get 30-day free trial Know more

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size
or budget. ManageEngine crafts comprehensive IT management software with a focus on making your job easier. Our over 90 products and
free tools cover everything your IT needs, at prices you can a�ord. From network and device management to security and service desk software,
we're bringing IT together for an integrated, overarching approach to optimize your IT.

You might also like