SilverStorm Blog

GDPR Compliance and Your Zenoss Deployment

Posted by Zenoss on Jun 1, 2018 9:30:37 AM

In the article “Data Masking as Part of Your GDPR Compliant Security Posture” over on DEVOPSdigest, Zenoss talks about how to mitigate your application’s level of compliance by employing data masking or other pseudonymization techniques of personally identifiable information (PII) like names and email addresses. Zenoss suggests giving it a quick read to better understand how that strategy relates to GDPR.

In the article “Data Masking as Part of Your GDPR Compliant Security Posture” over on DEVOPSdigest, Zenoss talks about how to mitigate your application’s level of compliance by employing data masking or other pseudonymization techniques of personally identifiable information (PII) like names and email addresses. Zenoss suggests giving it a quick read to better understand how that strategy relates to GDPR.

Zenoss as an application does not require PII in order to function, and this compliance strategy is a good fit — however, implementation could be a much larger endeavor. If you are leveraging single sign-on (SSO) mechanisms like Lightweight Directory Access Protocol (LDAP) or Security Assertion Markup Language (SAML), a shift to data masking for user IDs or email addresses can be quite a large undertaking depending on your company’s existing security posture with those data sets. If you are simply managing your users directly in Zenoss, you have much more freedom to assign user IDs and leverage obfuscated email aliases or distribution lists instead.

Of course, when introducing a new application to your infrastructure, it is a perfect opportunity to employ data masking strategies as part of the implementation. Converting from a previous standard to a new one can be a challenge. One approach that I’ve seen be effective is implementing on a go-forward basis and through natural churn over a period of time, minimizing the gap and scope of compliance so a final push for compliance is less daunting.

If you’d like to learn more about Zenoss and how we secure the cloud and the perimeter as part of our ever-strengthening and evolving security posture, consider joining me at GalaxZ18.

 zenoss monitoring IT

More information

Source: ServiceNow

Topics: Digitaltransformation, CIO, ServiceNow, servicemanagement, CEO, Technology, Cloud, devops, security, cyber security

SilverStorm Solutions

SilverStorm bridges the gap between the strategy and the transition for business-orientated service management. We listen to what our customers want to achieve; their success is what as a company, and, as an individual, counts.
 
We deliver next-generation service management as part of the digital transformation that our customers wish to achieve. We innovate by adopting disruptive technologies that focus on the business operation and the IT infrastructure. We solve our customers' challenges to create business services that manage heterogeneous environments across a hybrid platform.
 
Our DNA does not permit us to settle for anything less than excellence within every group of the company.

Subscribe to Email Updates

Recent Posts