Tools Required to Meet GDPR Breach Notification Compliance

With the GDPR going into effect this week, organizations that this new data protection regulation applies to are left with little time to make sure they have completed the preparations needed in order to achieve compliance with all provisions it entails. The GDPR is aimed at protecting consumer data privacy, and organizations that control and manage personal information of EU citizens in any capacity have until May 25th to adjust their procedures with regards to protection against, and respond to data breaches, in accordance with the new legislation.

Specific measures that organizations have to implement include formalized incident response procedures and internal data breach notification processes, along with demonstration of capability to notify authorities and data subjects in the event of a data breach within a strictly specified timeframe. Putting these measures in place can be an expensive and extremely complicated process, but absolutely necessary nonetheless. Therefore organizations can probably use all the help they can get to reduce the costs associated with meeting GDPR breach notification requirements while streamlining their existing processes as much as possible. This is where a host of security tools come into play, with a vast amount of different solutions available to choose from.  While variety and choice is good, on the other hand it can also cause a headache for security professionals, making it difficult for them to make an informed decision and to choose the most cost-effective and relevant solution to cater for their needs.

To make it easier for security professionals to evaluate what they need in order to make sure their organizations are compliant with the upcoming GDPR requirements, this post will offer an overview of the most essential tools and why they are essential for GDPR breach notification compliance.

Incident Response

One of the most important elements of GDPR compliance is how organizations respond to cyber incidents, particularly as it relates to breach notification procedures. Among other things, the GDPR requires that in the event of a data breach that has an impact of data subjects, the affected organization notify the appropriate supervisory authorities within 72 hours of the moment the breach occurred. This is arguably one of the GDPR requirements that organizations are most concerned about, as it involves a short timeframe within which they must not only detect and contain the breach, but be able to fully report on the details while following strict protocols, including documenting the events and making sure the proper incident response and case management procedures have been followed. Failure to comply with these rules can lead to severe and long-lasting consequences, damaging organizations’ reputation as well as their bottom line.

In order to be able to gather evidence and document a data breach and provide proof to authorities that the appropriate formalized procedures have been followed, organizations need a tool that can help make that process as streamlined as possible. That’s exactly the purpose of incident response and case management solutions, which are designed to allow reactions to incidents to be immediate and thorough by following set procedures, processes and workflows. These solutions have the ability to perform effective case management, including creation of an incident record, task assignment and management, evidence collation and analysis, along with data sharing and reporting, all of which are essential elements of meeting various GDPR requirements.

Automated and Orchestrated Response

In addition to case management and incident response procedures, organizations should be looking to automate and orchestrate their response to incidents such as breaches as much as possible.  72 hrs will lapse very fast and it is critical to get these potential incidents under control as soon as possible. With increasing numbers of alerts being received by security teams while usually facing the issue of limited resources, this not only accelerates the mean time to detection and mean time to resolution of potential incidents, but also helps to meet GDPR compliance timeframes.  

Security orchestration, automation and response (SOAR) solutions can do this by providing incident response and breach notification playbooks specifically designed to align an organization’s reaction to these types of events with GDPR best practices in mind. They also entail specific GDPR workflows that can be automatically enforced, repeated and formalized, which is another important aspect of achieving GDPR compliance.

How DFLabs IncMan SOAR Platform Can Help

Meeting GDPR requirements and being able to demonstrate compliance takes a comprehensive approach that inevitably requires the implementation of a set of tools that have the capability to ensure a proper implementation of the required procedures in the event of a data breach impacting data subjects. Having a platform in place to formalize and support these requirements is crucial, so why use multiple tools and solutions when you can just use one?

DFLabs IncMan SOAR platform combines incident response and case management processes with comprehensive automation and orchestration functions. This enables organizations to fully adhere to breach notification requirements by implementing an incident response plan in case of a potential breach, automating associated processes, prioritizing incident response and related enrichment and containment actions, managing notification distribution and subsequent advanced reporting documentation of any incident.

If you would like further information about how DFLabs IncMan SOAR platform can help your security team adhere to these new GDPR requirements, visit our dedicated web page or request a demo.

How to Implement Incident Response Automation the Right Way

One of the most pressing challenges facing cyber security professionals nowadays is probably the sheer number of security incident alerts, which is becoming too high to cope with even for the most expansive and well-equipped security teams. The increased number of alerts is a result of two factors at play, with the exponential boost in cyber attacks in recent years being the more obvious and straightforward one, the other is certainly much more complex and might also seem a bit ironic and surprising, as it arises from the growing use of different tools and devices within an organization, whose original function is to detect and mitigate incidents in the first place.

Security Operations Centers (SOCs) are now utilizing more devices designed to alert security analysts of cyber attacks than ever before, with the side-effect being too many alerts for the security teams to handle. Consequently, some of the most credible threats go by undetected or are simply not acted upon.

Addressing the Threat Noise Issue

With so many systems monitoring potential security threats and incidents creating alerts, and also taking into consideration that in many cases SOCs are severely understaffed, it comes as no surprise that analysts have a hard time staying on top of every single alert and responding to them appropriately and in a timely fashion. Since they don’t have the time or sufficient human resources to handle all alerts, SOCs often choose to disregard some and try to focus on those they deem to be credible, which understandably can lead to real threats slipping through the cracks and inflicting serious and irreparable damage to organizations.

In an effort to address the issue of threat noise, some SOCs opt for either reducing the number of devices generating alerts or expanding their number of staff, but while seemingly simple and straightforward, these options can be both counterproductive and quite costly. However, these are not the only possible solutions to this challenge standing at the disposal of SOCs, as there is another alternative, which would neither allow alerts to go undetected, nor require hiring additional security analysts.

Automating the Most Time-Consuming Parts of the Process

While the number of alerts generated by monitoring devices in some cases doesn’t necessarily have to be a reason for concern for SOCs in itself, the fact that alerts take a significant amount of time to analyze and handle efficiently often makes them an insurmountable challenge for understaffed security teams. One potentially very promising tactics to tackle this challenge effectively, is by enabling an automated response to some specific types of alerts, in an approach that is thought to be able to yield a wide range of benefits to organizations.

The idea is to automate the routine tasks that are repetitive and that do not require a lot of human expertise, but do usually take a lot of time to respond to and handle. By automating the response to these types of alerts, SOC analysts get more time to handle the alerts that pose a greater risk to their organizations, which must be analyzed in a more focused and comprehensive manner.

As noted in a recent SANS Spotlight paper titled “SOC Automation – Disaster or Deliverance”, written by Eric Cole: “The rate at which organizations are attacked is increasing, as is the speed at which those attacks compromise a network – and it is not possible for a human to keep up with the speed of a computer. The only way to beat a computer is with a computer”.

However, it must be noted that the implementation of incident response automation itself brings a certain degree of risk to organizations, as it might produce false positives, with  analysts not being able to determine whether specific alerts are legitimate threats or not. This means that if automation is not properly implemented with predetermined processes and procedures in place, they may end up spending much of their time analyzing alerts that aren’t actual attacks and don’t pose any foreseeable danger. Having said that, organizations should not shy away from automation because of these potential drawbacks, but should instead implement it in a balanced and well thought out manner. The key is to manage and control false positives as oppose to simply eliminating them. It is therefore important to only automate the low-risk alerts that are not expected to have a major impact on an organization and leave the more serious threats to be handled by security professionals who can apply their expertise to resolve them.

When deciding whether to adopt automation or not, organizations need to be aware of its pros and cons, and if this assessment is carried out correctly, they will inevitably realize that the advantages of this approach clearly outweigh the disadvantages, that can also be easily controlled and managed to minimize any potential negative impact.

Looking at the pros and cons of automation, it’s easy to see that the most important benefit is the fact that it allows SOCs to monitor and analyze many more incidents than doing it manually, opening up the security team’s bandwidth to focus on the high-risk and high-impact alerts.  Other key benefits also include: a more consistent response to alerts and tickets, a higher volume of ticket closure and response to incidents, as well as coverage of a larger area and larger number of tickets. On the other hand, automation can yield false positives that for their part can lead to directing time and resources towards resolving alerts that are not legitimate attacks, consequently leading to organizations potentially shutting down operations, having an impact on their business and their bottom line.

All said and done, automated incident response has the potential to bring significant benefits to organizations, provided that it’s implemented properly and cautiously, with a well-thought out strategy.  Overall it should be a serious consideration for any SOC that has to handle large volumes of alerts on a daily basis.

IncMan’s GSN Awards Highlighting the Importance of Intelligence-Driven Security Monitoring, Automation and Orchestration

The cyber security industry today offers a wide variety of solutions aiming to mitigate attacks that are becoming more common and more sophisticated, making it increasingly difficult to detect, manage and respond to breaches as effectively and as efficiently as possible. But, the fact alone that there is no shortage of potential solutions out there to choose from, doesn’t make the challenge of having to deal with the overwhelmingly frequent and complex attacks less grueling. In fact, it can make the task that much more daunting, with the vast pool of tools and platforms available making it difficult for CISOs to decide which solutions to adopt, considering that there is rarely one that addresses all the different security elements required, as well as the specific organizational needs, such as affordability and ease of implementation and management.

With that in mind, it’s safe to say that a solution capable of covering as many angles of the cybersecurity spectrum as possible would serve well to organizations being faced with data breaches on a regular basis. It’s exactly that ability to cover multiple aspects of an organization’s cybersecurity defense that makes DFLabs’ IncMan stand out from the crowd, and one of the factors that helped it to achieve two highly coveted awards at the latest edition of the prestigious GSN Homeland Security Awards.

Holistic Approach to Incident Management and Response

The two platinum awards received by DFLabs were in the Best Continuous Monitoring & Mitigation, and Best Cyber Operational Risk Intelligence Solution categories, respectively. This highlights IncMan’s versatility and ability to save valuable time when responding to an incident and when helping to detect and prevent future attacks.

Computer Security Incident Response Teams (CSIRTs) can benefit immensely from features such as automated collection of threat intelligence, triage, threat containment, as well as processes that help make threat hunting and investigation more efficient. With these types of functionalities, platforms like IncMan help cut incident resolution times drastically and improve the effectiveness of CSIRTs, significantly increasing their incident handling capacity.

Intelligence-Driven Actions

The above capabilities that IncMan boasts are in large part a result of the background in law enforcement and intelligence of the people who were involved in creating the platform. These experiences have allowed them to better understand the challenges security teams face when trying to resolve an incident and address their needs in terms of dealing with continuously increasing number of alerts, underlining the necessity of automating certain tasks and adopting an orchestrated approach to incident response.  As the nature of cyber security attacks continues to evolve over time, so does the sophistication and capabilities of the platform to ensure organizations always remain one step ahead.