- Security TWENTY
- Women in Security
The new EU Data Directive will prove a turning point for security, says Shaul Efraim Vice President of products, marketing and business development at Tufin Technologies.
The European Commission is planning a raft of new directives on data security that commentators say will come to be seen as an important turning point. The New 24-hour data breach disclosure rules are a golden opportunity for organizations willing to embrace automation.
The Directive includes a number of tough new provisions on data handling, but the element that will give security professionals the most immediate anxiety is the insistence that organizations doing business in the 27-nation EU zone inform national information commissioners of data breaches affecting consumers or citizens within 24 hours, or risk heavy fines for not doing so.
This is a radical jump. Having been under little or no obligation to formally disclose a data breach in most EU countries, companies will suddenly be required not only to inform the authorities but do so in some detail on an accelerated timescale. Moreover, the change will affect not only companies in the EU but those doing business in it, making the Directive the first de facto global data breach law.
Informing the authorities that a breach has been discovered sounds straightforward but is anything but. Assuming administrators have evidence that something has gone awry do they have the tools to say precisely what without delay? What sort of reporting systems do they have to explain the extent of a breach? Do possible security failures have any regulatory and legal consequences and if so, what?
A major consequence of this development is that old-fashioned periodic, manual security audits and the manual configuration processes that underlie them should be viewed heading for obsolescence.
Currently, security is often measured for regulatory and compliance purposes through an external audit that takes place quarterly or annually, depending on the business sector. Some organisations also perform more regular internal checks, but the design of these is open to interpretation and their frequency varies from organization to organization.
The reality of the data breach Directive is that administrators could be asked to audit their security stance at any moment in time as a breach is uncovered, with only a few hours notice. Referring back to an audit possibly months or weeks in the past will be useless; CISOs will require an overview of security policies, compliance and data protection that reflects what is happening at the moment the request is made.
This makes complete sense – can any company possibility understand its security state using an audit that is possibly months out of date? Here the Directive imposes an important level of discipline organisations should welcome.
What such continuous auditing does do is render manual assessment impractical. The solution – automated auditing in real time – goes from being a useful convenience to an essential component of any security infrastructure.
Today, realtime security and auditing requires that organizations integrate information from multiple types of hardware system, and across a range of vendors that generate reports through proprietary management consoles. On top of this any reporting infrastructure must also make sense of the flow of security data from different elements of the system, comparing this to a set of security policies. At any moment, security managers must be able to react quickly when a particular setting infringes the policy and have the means to describe what action was taken and why.
Although new reporting systems will be needed to build such an infrastructure, a key issue is whether this change from causal to mandatory and continuous auditing will be viewed positively by the people tasked with putting it into practice, the security professionals themselves. This is the biggest unknown of the data breach Directive – how will professionals interpret and react to it?
A recent survey of 100 network managers by Tufin Technologies sheds some light, finding 42 percent believing that the Data Breach Directive would lead to an increased risk-awareness within their organisation. A third believed that their attitude towards continuous compliance had changed as a result of the new regime, with just over half convinced that automated audits would make it easier to comply with the Directive.
Close up, attitudes probably vary from individual to individual, organization to organization, some seeing the Directive as more of an aspiration, others as the medicine needed by an industry that even after a swathe of data breaches remains complacent.
According Jericho Forum board member, Andrew Yeomans, the Directive serves to focus security professionals on data security over systems.
“From a Jericho Forum viewpoint, any strengthening of regulations is an incentive to implement pervasive data-centric security, so the data is protected wherever it is,” says Yeomans.
“The Jericho Forum has highlighted that the ‘perimeterized’ [that is, traditional] model misses many possible breaches, especially data that has been intentionally passed to other organisations, which subsequently suffer a breach.”
His worry remains ‘false positives’ which underlines the need for accurate realtime auditing and monitoring. “The regulators may also get overloaded with potential data breach reports that turn out to be false alarms, if only 24 hours is allowed for any initial investigation,” he warns.
Far from being an imposition, the arrival of the EU Data Breach Directive could serve as a huge opportunity to impose a rational design on security that rewards the best practices and the companies willing to bring them into effect.
As daunting as it appears, the Directive’s biggest plus is its scope, which imposes the same rules across the 27-nation EU zone and beyond. This creates short-term hurdles but the pay-off is potentially huge. For the first time, multi-national organizations will no longer have to interpret a confusing array of data breach and protection rules in different territories, allowing for the sort of policy centralisation that can enhance security. For the first time everyone will be playing by the same rules based on a swift response.
The world of manual, ad-hoc auditing was always one based on assumptions about risk that now, suddenly, much less certainty attached to them. In a world of uncertain security there is no longer time to waste. It is critical that organizations approach the toughness of the directive head on using the right tools and processes, with automated auditing to the fore.