Radware GDPR Compliance Report
Radware GDPR Compliance Report
Radware GDPR Compliance Report
A key aspect of the GDPR is a radical revision of what constitutes personal data
and how businesses and other organizations obtain consent for its use. They
will now be legally obligated to obtain verifiable consent from EU residents that
is explicit, informed and freely given. Consent to use of personal data must be
provided by individuals on an opt-in basis, rather than the currently widespread
practice of opting out of providing consent to businesses that ask for personal
data. In addition, residents can withdraw their consent, and even request that their
personal data be deleted within a specified time frame. The regulation goes even
further by requiring that organizations only use personal data for the sole purpose
that was defined when the data was collected from the user.
Many security and legal teams overlook certain technical vulnerabilities in their
data transmission, storage, and processing systems. These vulnerabilities allow
malicious parties (including criminals, businesses and even the governments of
some nations) to deploy bots and malware to steal data from websites and mobile
apps. The stolen data is often sold by criminals via darknet marketplaces or used
to commit theft, fraud, and espionage.
It would be legally and financially prudent for organizations that obtain or handle
EU residents’ personal data to examine some of the various attack vectors which
could expose individual data owners’ privacy to undue risks. While there exists a
multitude of ways for nefarious parties in general to illegally obtain personal data,
this report focuses on the compliance risks posed by malicious bots in particular.
Radware research into malicious bot threats reveals a growing array of threats
that can potentially lead to personal data theft, including:
Fraudsters can potentially reverse-engineer your site URL structure using multiple
scraping tools (such as Firebug, Wireshark, and Charles Proxy) to find vulnerable
pages which may contain PII, even if the information therein is encrypted with
advanced encryption methods such as MD5 (which can be broken). Scraping
tools produce large volumes of automated traffic on web assets, but advanced
bot detection solutions can help identify and block such automated attacks.
While we have listed a few attack vectors often targeted by bots to obtain personal
data, there are many other data sources which can be exploited by bad bots even
if your enterprise follows the security formalities and procedures required by the
GDPR regulations. Robust application security that respects ‘privacy by design’ —
right from the design stage to post-deployment, is one of the first key steps that
your organization can take to ensure the privacy of personal data. Being compliant
with PCI-DSS, HIPAA, SOC-I & II (and other major security regulations on data in-
transit and data at rest) should not lead to a sense of complacency when it comes
to GDPR compliance.
Radware Bot Manager recommends that every type of organization that obtains,
stores, transmits, and uses EU residents’ personal data carry out a holistic security
review to ensure GDPR compliance.
• Confirm that users clearly provide consent to usage of their data, and collect
only data that is required for business purposes.
• Enterprises that use third-party technology platforms (such as e-commerce
platforms, payment processors, geo-location services, etc.) should ensure
that every aspect of their interfacing systems that collect, store, and process
personal data with and through such platforms is protected from bot attacks.
• Inspect for vulnerabilities that can be exploited by bots to steal personal data.
• Securing hardware and software systems from malware in general requires
multiple layers of security protocols and processes, but advanced anti-bot
solutions in particular can be implemented relatively easily using integration
options such as JavaScript, APIs, and VMs.
• Bot threat mitigation to protect against breaches of personal data is one of the
most crucial defenses for enterprises and other organizations to ensure that a
Zero-Day attack doesn’t lead to potential GDPR violations.
Learn More
About
How To
Distinguish
Malicious
Bots From
Good Ones
Radware encourages you to join our community and follow us on: Radware Blog,
LinkedIn, Facebook, Twitter, SlideShare, YouTube, Radware Connect app for iPhone® and
our security center DDoSWarriors.com that provides a comprehensive analysis of DDoS
attack tools, trends and threats.
This document is provided for information purposes only. This document is not warranted to be error-free, nor subject to any other
warranties or conditions, whether expressed orally or implied in law. Radware specifically disclaims any liability with respect to this
document and no contractual obligations are formed either directly or indirectly by this document. The technologies, functionalities,
services or processes described herein are subject to change without notice.
© 2022 Radware Ltd. All rights reserved. The Radware products and solutions mentioned in this document are protected by trademarks,
patents and pending patent applications of Radware in the U.S. and other countries.For more details, please see:https://www.radware.
com/LegalNotice/. All other trademarks and names are property of their respective owners.