Privacy 27701 RMISC
Privacy 27701 RMISC
Tech Day VI 1
Objectives of this Presentation
Top Privacy Risks in the Cloud ISO Standards for Cloud Security and Privacy
-- A Risk Management Dilemma -- ISO 27001 (Information Security Management System)
9/28/2022
Tech Day VI 2
A Writer’s Life –
9/28/2022
Tech Day VI 3
Adding Attributes to Role Based Access Control reaches 500
citations on Google Scholar - https://lnkd.in/ew_BQaF
9/28/2022
Tech Day VI 4
Table of Contents
References + Q&A
5
How we got to the cloud
9/28/2022
Tech Day VI 6
Now What? (Lessons learn from Enterprise Risk Assessment of the
National Science Foundation’s US Antarctic Program)
Virtualization
Encryption
IT 101 – What Problems Are We Trying to Solve?
Identify ‘Fix-It’ areas in the program
Understand Current State (Remediation)
Improve ‘ad hoc’, ‘not my problem’ state
Manage Information Security & Privacy Risk
Improve Continuous Monitoring Process
IT
Governance
9/28/2022
Tech Day VI 7
Risk Management
Process
Use – Lifeto/
Risk Matrix
Cycle
Prioritize actions and
expenditures. Most
economic value for each
risk considered.
Implementation of
critical Infrastructure
https://www.ssh.com/compliance/cybersecurity-framework/
Tech Day VI 8
Big Scary Monsters - Global transformation caused by COVID-19
9/28/2022
Tech Day VI 9
Feeding the ‘Big Scary Monsters’ – PII Examples
Name Address Phone Email address Date of birth Marital status Tax code
number
Bank details Passwords Driving licence Passport Purchase IP address Mobile phone
number history serial number
9/28/2022
Tech Day VI 10
Special categories of PII
9/28/2022
Tech Day VI 12
Managing Privacy Risk in the Cloud (Deloitte)-
Top Privacy Mitigations
9/28/2022
Tech Day VI 13
Privacy Risk in the Data Management Lifecycle
Risk Management
Process – Life /
Cycle
To be able to address the various risks,
business organizations need to
implement a robust data protection
management program including
information security. The management
of personal data within its lifecycle is a
crucial step in the organization's efforts
to ensure the privacy, confidentiality,
availability and integrity of personally
identifiable information.
https://www.dpexnetwork.org/articles/benefits-implementing-isoiec-27701-privacy-information-management-system
Tech Day VI 14
Privacy Risk in the Data Management Lifecycle
Risk Management
Process – Life /
Cycle
Tech Day VI 15
Table of Contents
References + Q&A
16
Cloud Security Alliance – Top Pandemic Threats
https://cloudsecurityalliance.org/
9/28/2022
Tech Day VI 17
Protection of personally identifiable information (PII) in public clouds
acting as PII processors – ISO 27018
9/28/2022
Tech Day VI 18
Cloud Security Alliance CCM4.0 –
Data Security and Privacy Lifecycle Management (18 Controls)
9/28/2022
Tech Day VI 19
ISO 27002:2022 vs :2013
https://www.advantio.com/blog/whats-new-in-iso/iec-27002-2022-updates
9/28/2022
Tech Day VI 20
Table of Contents
References + Q&A
21
Benefits of ISO 27001 - ISO /IEC 27001:2013 Structure and Content
ISO/IEC 27001:2013 Implementation, Certification from a certification body demonstrates that the security
of organization information has been addressed, valuable data and information assets properly controlled.
Also there is List of benefits By achieving certification to ISO/IEC 27001:2013 organization will be able to
acquire numerous benefits including:
9/28/2022
Tech Day VI 22
The ISO/IEC 27001 standard ISO/IEC 27001 Controls v2022 vs 2013
9/28/2022
Tech Day VI 23
ISO 27701 - Privacy Information Management System (PIMS)
https://cloudsecurityalliance.org/blog/2021/11/17/data-security-and-privacy-related-iso-iec-certifications/
9/28/2022
Tech Day VI 24
ISO 27701 - Privacy Information Management System (PIMS)
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701/
9/28/2022
Tech Day VI 25
ISO 27701 - Privacy Information Management System (PIMS)
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701/
9/28/2022
Tech Day VI 26
ISO 27701 - Privacy Information Management System (PIMS)
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701/
9/28/2022
Tech Day VI 27
Table of Contents
References + Q&A
28
CASE Study – Microsoft Supplier Security and Privacy Assurance Program (SSPA).
ISO 27701. Internal Audit – tools and methods - 27701 | A-LIGN
• Leverage ISO 27001 + ISO 27701 to Meet Your Microsoft SSPA Requirements
• Microsoft requires that all vendors meet the requirements within the Supplier Security and Privacy Assurance
Program (SSPA). This program requires that any vendor that collects, stores, or processes customer, partner, or
employee information meet the reporting requirements. https://www.a-lign.com/service/microsoft-sspa.
• A Company operates securely under all Microsoft Data Protection Requirements providing high end support using
Microsoft provided cloud-based services and tools. The sole use of cloud-based tooling allows our team to work
efficiently with end customers while maintaining a low security risk, housing no customer or user data on any
Company systems. Due to the nature of its business, Company assumes the role of, a Processor, as Company might
access customer PII. Company has access to customer data, and potentially PII, but does not download, store or
keep any PII or any other customer data in any direct managed system. However, the protection of customer privacy
data a crucial business requirement as it’s vital to Company to protect its reputation as well as the integrity and
confidentiality of the services it provides to customers.
9/28/2022
Tech Day VI 29
CASE Study – Microsoft Supplier Security and Privacy Assurance Program (SSPA).
ISO 27701 Internal Audit – Criteria and Schedule
Document Name
9 Statement of Applicability
In the Opinion of the Auditor, the organization currently conforms to the ISO 27001 Clause 4-10 / Annex A
generic requirements for an Information Security Management System (ISMS).
In the Opinion of the Auditor, the organization currently conforms to the ISO 27701 applicable clauses 5 and
6 / Annex B guidance for PII Processor (PIMS).
The areas assessed during the course of the visit were found to be very effective, very well controlled and
managed. Company shows continual improvement in managing the ISMS program by communicating core
principles of privacy and information security (protection of confidentiality, integrity and availability) across
the organization.
Non-conformities
No major non-conformities have been identified in the ISMS/PIMS Internal Audit
Minor NCR
Minor Non-Conformity - 01 5.4.1.2 (ISO 27701) - PIMS risk assessment does not include the applicable
ISO 27701 Annex B requirements for a Data Processor (B.8.x)
Minor Non-Conformity - 02 A.12.4.2 Logs must be safeguarded from tampering.
Tech Day VI 32
Summary PIMS Requirements for PII Controllers and Principals
9/28/2022
Tech Day VI 33
Summary PIMS Requirements for PII Controllers and Processors
9/28/2022
Tech Day VI 34
Table of Contents
References + Q&A
35
ISO 27001/27701 Accredited Site List (examples)
Google - https://cloud.google.com/security/compliance/iso-27701
AWS - https://aws.amazon.com/blogs/security/aws-achieves-iso-iec-27701-2019-certification/
https://aws.amazon.com/compliance/iso-certified/
https://next.nutanix.com/community-blog-154/xi-cloud-services-achieve-iso-iec-27701-2019-certification-38471
https://www.tuvsud.com/en-us/services/auditing-and-system-certification/iso-27701
Teleperformance (France)
https://www.teleperformance.com/en-us/insights-list/insightful-articles/global/elevating-data-privacy-around-the-world-with-global-iso-27701-
certification/
https://www.businesswire.com/news/home/20211201005742/en/Teleperformance-A
9/28/2022
Tech Day VI 36
IEEE Digital Privacy Initiative
➢ An IEEE-wide effort focusing on the digital privacy needs of individuals, rather than the security
of data/products/organization
➢ Envision a future in which the capability exists to enable any individual around the world to
privately maintain presence, data, identity, and dignity online
➢ To help achieve this vision, the Initiative seeks the following goals:
➢ Bring the voice of technologists to the digital privacy conversation, incorporating a holistic
approach to address privacy that also includes economic, legal, and social perspectives
➢ Facilitate cross-disciplinary collaboration to advance research, promote standardization and
best practices, and create tools and capabilities to support the privacy needs of individuals,
and
➢ Coordinate efforts across and beyond IEEE with a multicultural lens that are working on
different dimensionns of digital privacy
➢ Feel free to contact/connect with us @ [email protected]
Tech Day VI
Learn more at digitalprivacy.ieee.org
37
Digital Privacy Initiative Working Groups
Framework
and
Foundation
Policies and
Standards Legislations
Healthcare
Connected Conferences
Vehicles Industry and
Workshops
Energy
Education
Publications
and Training
Tech Day VI 38
Assessing Privacy Information Management Requirements – Blue Sky or Rain?
9/28/2022
Tech Day VI 39
Audit and Trainer – ISO 27701 (Privacy Information Management)
9/28/2022
Tech Day VI 40
Thank you for joining us!
http://www.securityfeeds.com - [email protected]
Tech Day VI 41