16

3 oraclex evento reg puglia_v2017-09-14-2

Embed Size (px)

Citation preview

Page 1: 3 oraclex evento reg puglia_v2017-09-14-2
Page 2: 3 oraclex evento reg puglia_v2017-09-14-2

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

Security Framework:Aspetti tecnologici, giuridici e normativi

Come proteggere la propria organizzazione attraverso una consapevole attuazione delle misure tecnologiche del GDPR

Angelo Bosis

Sales Consulting Director Oracle ItaliaFiera del Levante, Bari14 Settembre 2017

2

Page 3: 3 oraclex evento reg puglia_v2017-09-14-2

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

Safe Harbor StatementThe following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Not all technologies identified are available for all cloud services.

DisclaimerThe information in this document may not be construed or used as legal advice about the content, interpretation or application of any law, regulation or regulatory guideline. Customers and prospective customers must seek their own legal counsel to understand the applicability of any law or regulation on their processing of personal data, including through the use of any vendor’s products or services.

3

Page 4: 3 oraclex evento reg puglia_v2017-09-14-2

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

• Guarantee compliance

• But also:– Reduce risk– Protect brand and reputation– Reduce cost of controls

According to a study led by Clusit and PMI (NIC Northern Italy Chapter) in 2015 the investments in security were due: - 47.8% of the cases for compliance and - 48.0% for risk reduction

• ...and to enable business and digital transformation

Innovation is not possible without security

4

Importance of investing in IT security

Page 5: 3 oraclex evento reg puglia_v2017-09-14-2

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

• Compliances protect third parties rights– i.e. the patients of the hospital, the

account owners of the bank etc.

• Not the rights of the company itself – i.e. not your secrets and intellectual

property...

• They are more mature now than in the past– They refer to “Best Practices”, “Risk

Analysis” and “State of the Art”...

• Therefore modern compliances require to evaluate Security Controls through Risk Analisys that allow to comply and to reduce the risk at the same time

5

A comment on Compliances

Page 6: 3 oraclex evento reg puglia_v2017-09-14-2

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

Understanding the GDPR: good IT and good Security

The protection of natural persons, in relation to the processing of personal data, is a fundamental right that necessarily goes through Information Technology (IT).

In modern society, IT is ubiquitous and many GDPR requirements

imply good IT and good Security

6

Page 7: 3 oraclex evento reg puglia_v2017-09-14-2

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

• Oracle has been assessing our customer security posture for years with a practice called Security Assessment or Security Maturity Evaluation

• We have collected IT “Most Common Mistakes” for example:– Sharing passwords– No logging– Poor patching– No encryption– Eccessive privileges

• You hardly comply if you do not have a basic security

Read about the Most Common Mistake on Rapporto Clusit 2016--FOCUS ON: Sicurezza del Database: a che punto siamo?Check this video for the DBSecurity http://bit.ly/29GIYF3

7

We have evidence that there is often a lack of basic security

Page 8: 3 oraclex evento reg puglia_v2017-09-14-2

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

• Protecting the data requires knowing–Where data resides – Risk exposure

• Some obligations can/must be fulfilled – Leveraging the IT Architecture – Through application modifications

8

Understanding the GDPR: GDPR and IT

APPLICATIONS ARCHITECTURE

RISK AWARENESS

DATA INVENTORY

Page 9: 3 oraclex evento reg puglia_v2017-09-14-2

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

EnforcementImplement Appropriate Security Measures

(A.32, A.25)Discovery

A path towards GDPR – tasks and activities

9

DOCUMENT AND KEEP TRACK (A.24)

ADAPT INCIDENT RESPONSE PROCESS (A.33; A.34) AND COMPANY RISK PRACTICES INCLUDING DPIA (A.35)

Enrichment Evaluate required application modifications to garantee rights of data subjects (A.15-20)

Foundation Enforce good IT and good Security across the stack (A.32, A.25)

Availability Architecture

Identity and Access

Monitoring and Auditing

Data ProtectionData InventoryData Discovery

Page 10: 3 oraclex evento reg puglia_v2017-09-14-2

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

EnforcementImplement Appropriate Security Measures

(A.32, A.25)Discovery

A path towards GDPR – tasks and activities

10

DOCUMENT AND KEEP TRACK (A.24)

ADAPT INCIDENT RESPONSE PROCESS (A.33; A.34) AND COMPANY RISK PRACTICES INCLUDING DPIA (A.35)

Enrichment Evaluate required application modifications to garantee rights of data subjects (A.15-20)

Foundation Enforce good IT and good Security across the stack (A.32, A.25)

Availability Architecture

Identity and Access

Monitoring and Auditing

Data ProtectionData InventoryData Discovery

Identity SOC

Database Security

Page 11: 3 oraclex evento reg puglia_v2017-09-14-2

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

Redaction (Dynamic Masking)

Database Encryption

EVALUATE

Comprehensive Database Security Controls

PREVENT DETECT

Security Configuration

Sensitive Data Discovery

Privilege Analysis

DBA & Operation Controls

Database Auditing

Database / SQL Firewall

Centralized Monitoring

Security Assessment

Alerting & Reporting

Key Management

Masking and Subsetting

Customers need defense-in-depth security

11

Page 12: 3 oraclex evento reg puglia_v2017-09-14-2

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

Security Intelligence Delivered with Identity

Prevent

Detect

Predict

Respond

NetworkUsers

Content

Identity

12Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

Page 13: 3 oraclex evento reg puglia_v2017-09-14-2

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

New Generation Identity SOC Framework

13

Threatintelligence CASB UEBA

Identity Management

SIEM

Automated remediation

Page 14: 3 oraclex evento reg puglia_v2017-09-14-2

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

oracle.com/goto/gdpr

14

Page 15: 3 oraclex evento reg puglia_v2017-09-14-2

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | 15

Page 16: 3 oraclex evento reg puglia_v2017-09-14-2