privacy engineering

31
Privacy Engineering Closing the gap between Privacy by Design and implementation Tomi Mikkonen | CTO Privaon Corp [email protected] @tmikkone Antti Vähä-Sipilä | Software Security Guy F-Secure [email protected] @anttivs IAPP Europe Data Protection Congress 2014 BRUSSELS | 18–20 NOVEMBER

Upload: tomi-mikkonen

Post on 02-Jul-2015

482 views

Category:

Software


0 download

DESCRIPTION

Closing the gap between Privacy by Design and implementation. If Privacy by Design provides the “what” to do, then privacy engineering provides the “how” to do it. (Ann Cavokian)

TRANSCRIPT

Page 1: Privacy Engineering

Privacy Engineering

Closing the gap betweenPrivacy by Design and implementation

Tomi Mikkonen | CTOPrivaon [email protected]@tmikkone

Antti Vähä-Sipilä | Software Security GuyF-Secure

[email protected]@anttivs

IAPP Europe Data Protection Congress 2014BRUSSELS | 18–20 NOVEMBER

Page 2: Privacy Engineering

Context

Privacy Program

Strategy

Governance

Principles

RequirementsImplementation

Assurance

Monitoring

Privacy Engineering

Page 3: Privacy Engineering

Privacy by Design

“Privacy by Design (PbD) refers to the philosophy and approach of embedding privacy into the design specifications of various technologies”

Ann Cavoukian, Information and Privacy Commissioner, Ontario

Proactive, not reactive Privacy as defaultEmbedded into design Full functionalityEnd-to-end security Visibility and transparencyRespect for user privacy

7 foundational principles

Page 4: Privacy Engineering

Privacy Program

Strategy

Governance

Principles

RequirementsImplementation

Assurance

Monitoring

The Gap

The Gap of PbD

Page 5: Privacy Engineering

Processes

Policies

Implementation

Disconnect

Disconnect

Page 6: Privacy Engineering

“Organisations are often uncertain how to implement systems that comply with data protection law, and are left to manage privacy in accordance with ‘best efforts’, with each system approaching the issue on a case-by-case basis. There are no internationally-recognized standards to guide organisations in implementing privacy controls.”

“’Privacy by Design’ consists of a number of principles that can be applied from the onset of systems development to mitigate privacy concerns and achieve data protection compliance. However, these principles remain vague and leave many open questions about their application when engineering systems.”

ICO Privacy by Design report, 2008

Engineering Privacy by Design. Gürses et al., 2011

Page 7: Privacy Engineering

Privacy Engineering

• Activities and tools to build privacy into products

• Produce evidence for assurance

• Communication between governance and development functions

• More “how” than “what” to do

Page 8: Privacy Engineering

Fundamentals

• No best practice / guideline to implement privacy

• “Privacy must be built-in, not bolted on” – Integral part of product development

– There is no coding guideline for privacy

– Privacy cannot be “tested into” product

• Privacy does not prevent cool things from happening. The implementation just needs to be done “in right way”

Page 9: Privacy Engineering

Who defines the “right way”?

Security

Marketing AnalyticsDesign

Legal Sourcing

Acceptable privacy design

Compliance-based strategies

Risk-based strategies

Page 10: Privacy Engineering

Dramatis personae

Legal Developers

Security Auditors

Quality Assurance

Architects Analytics

Business

Page 11: Privacy Engineering

Business (functional)

requirements

Development& testing

Go / No Go

Business

Developers Quality Assurance

Architects

Page 12: Privacy Engineering

Business (functional)

requirements

Development& testing

Go / No Go

Business / compliance privacy

requirements

Triage and business-level PIABusiness, legal, analytics, architects

Page 13: Privacy Engineering

Business (functional)

requirements

Development& testing

Go / No Go

Business / compliance privacy

requirements

Security controls,privacy acceptance

criteria & PETs

Technical PIA(part of threat modelling)Architects, developers, security

Triage and business-level PIABusiness, legal, analytics, architects

Page 14: Privacy Engineering

Business (functional)

requirements

Development

& testing

Go / No Go

Business / compliance privacy

requirements

Security controls,privacy acceptance

criteria & PETs Implementation of privacy-related test casesDevelopers, QA

Technical PIA(part of threat modelling)Architects, developers, security

Triage and business-level PIABusiness, legal, analytics, architects

Page 15: Privacy Engineering

Business (functional)

requirements

Development& testing

Go / No Go

Business / compliance privacy

requirements

Security controls,privacy acceptance

criteria & PETs

Privacyassuranceevidence

Evaluating evidenceBusiness, legal, auditors

Implementation of privacy-related test casesDevelopers, QA

Technical PIA(part of threat modelling)Architects, developers, security

Triage and business-level PIABusiness, legal, analytics, architects

Page 16: Privacy Engineering

Summary this far

1. High-level privacy principles do not necessarily tell exactly what to do

2. Privacy engineering enables communications between governance and R&D functions

3. In a modern software development model, privacy engineering needs to be iterative and the evidence needs to be continuous

Page 17: Privacy Engineering

CASE: COOKIES AND AN ONLINE MARKETING CAMPAIGN

Privacy Engineering in Practice

Page 18: Privacy Engineering

Cookies & privacy

Design notices

Create cookiepolicy

Conduct PIA

Implementation

Cookie inventory Cookie inventory

Time

Page 19: Privacy Engineering

“Modern” software development

• All work is on a prioritised backlog

• Incremental development

• Test automation

– Quality assurance in dev team

• Continuous Integration

• Automated deployment

Page 20: Privacy Engineering

Modern development

Time

Implementation Implementation Implementation Implementation

Continuous testing

Continuous deployment

Requirement Requirement RequirementRequirement

Page 21: Privacy Engineering

Not modern

Design notices

Create cookiepolicy

Conduct PIA

Implementation

Cookie inventory Cookie inventory

Time

Page 22: Privacy Engineering

Online Marketing Campaign

Short-term

Purchases through third party web shops

Campaign performance must be measurable:1. How many visitors clicked the ad?2. How many visitors bough the product?

Implemented by digital marketing agency

Page 23: Privacy Engineering

Technical PIA with an MSC

Browser

URLshortener Analytics Affiliate Web shop

Set cookie & redirect

Purchase

Click ad

Redirect

Page 24: Privacy Engineering

Recall modern development

Implementation Implementation Implementation Implementation

Continuous testing

Continuous deployment

Requirement

Time

Requirement RequirementRequirement

Page 25: Privacy Engineering
Page 26: Privacy Engineering

Tests pass ok

Implementation Implementation Implementation Implementation

Continuous testing

Continuous deployment

Requirement

Time

Requirement RequirementRequirement

Page 27: Privacy Engineering

ALL OK!

Page 28: Privacy Engineering

Test failures stop deployment

Implementation Implementation Implementation Implementation

Continuous testing

Continuous deployment

Requirement

Time

Requirement Requirement“Add banner”

NOT OK

Depl.

Page 29: Privacy Engineering

NOTOK

Page 30: Privacy Engineering

Non-modern systemdoesn’t even see it happening

Design notices

Create cookiepolicy

Conduct PIA

Implementation

Cookie inventory Cookie inventory

Time

Add banner

Remove banner

Page 31: Privacy Engineering

Non-modern developmentdoesn’t even see it happening

Design notices

Create cookiepolicy

Conduct PIA

Implementation

Cookie inventory Cookie inventory

Time

Add banner

Remove banner

Non-compliantbut nobody notices!