What is meant by considering the “state of the art”?
Consensus of security professionals
You should place weight on this sort of industry consensus when determine whether to implement a particular control/systems etc
What is meant by “appropriate technical and organisational measures”?
This can include:
Up to the controller and processor to decide what’s appropriate to their particular circumstances of their processing
the measures should be sufficient to ensure things like:
- Pseudonymisation and Encryption
To ensure
Of the personal data
What kind of risks should you take into account when considering what might be appropriate security measures?
Think about the consequences of the following things happening to the data:
Especially if leads to physical or material damage
Think about
(So if SCD is being processed, this will need enhanced protection and security measures)
What security measures should you have in place?
It has to be appropriate to the risk of processing
Take into account state of the art and cost of implementation
What are security controls?
They are the actual processes used to to ensure the security of an information system
The system must provide prompt notification if a control fails
What are the four main attributes which security controls need to have?
(CIA - is already common in InfoSec practice, but resilience is new)
What are some practical considerations to think about when implementing security controls?
What is a policy framework?
The repository for all the organisation’s rules for confidentiality and security
It contains:
It should be approved by management, communicated to all employees and relevant external parties and should be reviewed periodically
Give some examples of IT security measures that can be used to protect personal data
What is the purpose of incident detection and response?
Regular testing of technical and organisational measures assesses and evaluates their effective
This also helps ensure the ability to restore availablity and access to personal data in a timely manner if it is lost
Article 28 says that controllers should only hire processors who can provide sufficient guarantees to…?
In addition to a contract, the term “sufficient guarantees” covers assurance mechanisms such as appropriate checking and vetting of the processor
(E.g. through a 3rd party assessment of certification validations before and after creating a contract)
(remember the notes around not just relying on contractual assurances in the RTB report)
Under Article 28, what information does a processor contract need to include?
Is the processor liable for non-compliance by their sub-processor?
Yes, they are