Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 30 May, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Cracks in the cloud supply chain could represent a threat to GDPR compliance

by The Gurus
October 5, 2016
in Editor's News
Share on FacebookShare on Twitter

In the wake of changes to data liability regulations as part of the GDPR, companies face the challenge of unravelling their cloud supply chains in order to get the information they require to ensure compliance. A failure to audit suppliers regularly and probe the supply chain will have severe consequences. Transparency is therefore a key factor in ensuring that all parties involved have the required security mechanisms in place, says The Bunker.

One of the most impactful changes included in the GDPR is the expansion of the breadth of customer data that an organisation is liable for. Unlike the previous legislative framework, both data controllers and data processors have potential liabilities towards any customer data. This means that any organisation that passes data over to a service provider for any kind of processing therefore still bears the brunt of exposure in the case of a data breach – including organisations that use cloud service providers (CSPs).

Phil Bindley, CTO at The Bunker, comments on the implications for organisations: “When the GDPR comes into effect in May 2018, it will be incumbent on any organisation who uses a CSP to ensure that everything the provider does is technically, organisationally, and culturally in-line with the new regulations. It’s no longer enough to rely solely on a supplier’s word – one of the biggest shifts in the GDPR is that organisations have to demonstrate that suppliers have proved their compliance. In all likelihood, an organisation is not just dealing with one supplier; CSPs often have complex supply chains involving several providers who are all part of the process of providing cloud services. There’s only one way to guarantee compliance across this chain: ensuring that the relationship with the cloud supplier is grounded in complete transparency.

“Organisations will have to audit and test their CSPs in order to ensure that they’re compliant, and this will rely on suppliers being open about what’s happening to the data. For many organisations, this will involve developing a more meticulous approach to their suppliers than they are otherwise accustomed to. Rigorously auditing, testing, and establishing suppliers’ compliance with security regulations is part of The Bunker’s DNA, but for many this level of precision will be unfamiliar. Moreover, it’s not good enough to do this only at the contract stage – to secure continued GDPR compliance, this level of testing will have to become part of the lifecycle of the supplier relationship.”

According to Bindley, this has implications for how organisations choose CSPs: “The path to GDPR compliance in the cloud is a two-way street. Suppliers have to be open to testing and cooperating with audits; establishing the level of transparency required for compliance is a joint mission. When choosing a CSP or working with existing suppliers, IT professionals should take this into account – and any obstructionism or opaque practices from suppliers should be taken as red flags.”         

 The Bunker have produced a series of videos tackling the issues of GDPR compliance, which can be found here: http://www.thebunker.net/videos/

FacebookTweetLinkedIn
ShareTweet
Previous Post

4 easy ways to be more mindful online

Next Post

Growing Concerns Over Security In A Digital World

Recent News

SnapDragon Monitoring scam advice

Tips to Protect Against Holiday and Airline Scams

May 25, 2023
Access Segmentation & Encryption Management from MyCena

New security model launched to eliminate 95% of cyber breaches

May 25, 2023
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

May 25, 2023
Purple Logo, capitalised letters: SALT.

Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated

May 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information